id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-cqvg-wfh9-39xv | An issue was discovered in Fimer Aurora Vision before 2.97.10. An attacker can (in the WebUI) obtain plant information without authentication by reading the response of APIs from a kiosk view of a plant. | [] | null | null | null | null |
|
GHSA-fm48-g92r-6m48 | Multiple cross-site scripting (XSS) vulnerabilities in chathead.php in MM Chat 1.5 allow remote attackers to inject arbitrary web script or HTML via the (1) sitename and (2) wmessage parameters. | [] | null | null | null | null |
|
CVE-2024-51516 | Permission control vulnerability in the ability module
Impact: Successful exploitation of this vulnerability may cause features to function abnormally. | [
"cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*"
] | null | 6.2 | null | null |
|
CVE-2008-5995 | Cross-site scripting (XSS) vulnerability in the freeCap CAPTCHA (sr_freecap) extension before 1.0.4 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:typo3:freecap_captcha_extension:*:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:freecap_captcha_extension:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:freecap_captcha_extension:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:freecap_captcha_extension:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2017-12117 | An exploitable improper authorization vulnerability exists in miner_start API of cpp-ethereum's JSON-RPC (commit 4e1015743b95821849d001618a7ce82c7c073768). A JSON request can cause an access to the restricted functionality resulting in authorization bypass. An attacker can send JSON to trigger this vulnerability. | [
"cpe:2.3:a:ethereum:cpp-ethereum:-:*:*:*:*:*:*:*"
] | null | null | 4 | null |
|
CVE-2009-5042 | python-docutils allows insecure usage of temporary files | [
"cpe:2.3:a:python-docutils_project:python-docutils:0.5-2:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 9.1 | null | 6.4 |
|
CVE-2013-5167 | CFNetwork in Apple Mac OS X before 10.9 does not properly support Safari's deletion of session cookies in response to a reset operation, which makes it easier for remote web servers to track users via Set-Cookie HTTP headers. | [
"cpe:2.3:o:apple:mac_os_x:*:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.5:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-5x9j-ccgm-3qhv | The issue was addressed with improved checks. This issue is fixed in iOS 16.5 and iPadOS 16.5, iOS 15.7.6 and iPadOS 15.7.6. Shake-to-undo may allow a deleted photo to be re-surfaced without authentication | [] | null | 2.4 | null | null |
|
GHSA-r7c5-pm6v-r8j9 | The "lost password" functionality in b2evolution before 6.7.9 allows remote attackers to reset arbitrary user passwords via a crafted request. | [] | null | null | 7.5 | null |
|
CVE-2016-3054 | Cross-site scripting (XSS) vulnerability in IBM FileNet Workplace 4.0.2 allows remote authenticated users to inject arbitrary web script or HTML by uploading a file. | [
"cpe:2.3:a:ibm:filenet_workplace:4.0.2:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 |
|
GHSA-qw32-4rhp-3985 | A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master and classified as problematic. Affected by this issue is the function swf_svg_add_iso_sample of the file src/filters/load_text.c of the component MP4Box. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as 31e499d310a48bd17c8b055a0bfe0fe35887a7cd. It is recommended to apply a patch to fix this issue. VDB-268790 is the identifier assigned to this vulnerability. | [] | 4.8 | 3.3 | null | null |
|
CVE-2024-10879 | ForumWP – Forum & Discussion Board <= 2.1.2 - Reflected Cross-Site Scripting | The ForumWP – Forum & Discussion Board plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.1.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] | null | 6.1 | null | null |
CVE-2018-10891 | A flaw was found in moodle before versions 3.5.1, 3.4.4, 3.3.7, 3.1.13. When a quiz question bank is imported, it was possible for the question preview that is displayed to execute JavaScript that is written into the question bank. | [
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*"
] | null | null | 6.3 | null |
|
CVE-2018-11958 | Insufficient protection of keys in keypad can lead HLOS to gain access to confidential keypad input data in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in MDM9206, MDM9607, MDM9650, MDM9655, Qualcomm 215, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016 | [
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qm215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_412:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_427:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_435:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_high_med_2016_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_high_med_2016:-:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.9 |
|
RHSA-2023:5174 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.3 security update | envoy: gRPC access log crash caused by the listener draining | [
"cpe:/a:redhat:service_mesh:2.4::el8"
] | null | 6.5 | null | null |
CVE-2024-52332 | igb: Fix potential invalid memory access in igb_init_module() | In the Linux kernel, the following vulnerability has been resolved:
igb: Fix potential invalid memory access in igb_init_module()
The pci_register_driver() can fail and when this happened, the dca_notifier
needs to be unregistered, otherwise the dca_notifier can be called when
igb fails to install, resulting to invalid memory access. | [] | null | null | null | null |
CVE-2022-49365 | drm/amdgpu: Off by one in dm_dmub_outbox1_low_irq() | In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: Off by one in dm_dmub_outbox1_low_irq()
The > ARRAY_SIZE() should be >= ARRAY_SIZE() to prevent an out of bounds
access. | [] | null | null | null | null |
GHSA-xx5p-xxfc-ccvw | Unrestricted file upload vulnerability in administrer/produits.php in PEEL, possibly 3.x and earlier, allows remote authenticated administrators to upload and execute arbitrary PHP files via a modified content type in an ajout action, as demonstrated by (1) image/gif and (2) application/pdf. | [] | null | null | null | null |
|
CVE-2022-21490 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.35 and prior, 7.5.25 and prior, 7.6.21 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
] | null | 6.3 | null | null |
|
GHSA-v9gx-fc3p-gr4x | TP-Link Archer C5 devices through V2_160201_US allow remote command execution via shell metacharacters on the wan_dyn_hostname line of a configuration file that is encrypted with the 478DA50BF9E3D2CF key and uploaded through the web GUI by using the web admin account. The default password of admin may be used in some cases. | [] | null | null | 7.2 | null |
|
GHSA-cxw7-q566-ccx6 | Cross Site Request Forgery found in yzCMS v.2.0 allows a remote attacker to execute arbitrary code via the token check function. | [] | null | 6.5 | null | null |
|
CVE-2016-7099 | The tls.checkServerIdentity function in Node.js 0.10.x before 0.10.47, 0.12.x before 0.12.16, 4.x before 4.6.0, and 6.x before 6.7.0 does not properly handle wildcards in name fields of X.509 certificates, which allows man-in-the-middle attackers to spoof servers via a crafted certificate. | [
"cpe:2.3:a:nodejs:node.js:0.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.11:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.12:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.13:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.14:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.15:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.16:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.16-isaacs-manual:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.17:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.18:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.19:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.20:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.21:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.22:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.23:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.24:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.25:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.26:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.27:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.28:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.29:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.30:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.31:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.32:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.33:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.34:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.35:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.36:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.37:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.38:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.39:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.40:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.41:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.42:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.43:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.44:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.45:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.46:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:6.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:6.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:6.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.4:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.5:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.6:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.7:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.8:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.9:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.10:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.11:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.12:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.13:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.14:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.15:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.5.0:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 |
|
CVE-2006-0064 | PHP remote file include vulnerability in includes/orderSuccess.inc.php in CubeCart allows remote attackers to execute arbitrary PHP code via a URL in the glob[rootDir] parameter. | [
"cpe:2.3:a:devellion:cubecart:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2023-29757 | An issue found in Blue Light Filter v.1.5.5 for Android allows unauthorized apps to cause escalation of privilege attacks by manipulating the SharedPreference files. | [
"cpe:2.3:a:leap:blue_light_filter:1.5.5:*:*:*:*:android:*:*"
] | null | 7.8 | null | null |
|
CVE-2022-4351 | Qe SEO Handyman <= 1.0 - Admin+ SQLi | The Qe SEO Handyman WordPress plugin through 1.0 does not properly sanitize and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin | [
"cpe:2.3:a:qe_seo_handyman_project:qe_seo_handyman:*:*:*:*:*:wordpress:*:*"
] | null | 7.2 | null | null |
CVE-2018-20643 | PHP Scripts Mall Entrepreneur Job Portal Script 3.0.1 has directory traversal via a direct request for a listing of an image directory such as an assets/ directory. | [
"cpe:2.3:a:entrepreneur_job_portal_script_project:entrepreneur_job_portal_script:3.0.1:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4 |
|
GHSA-pc25-5426-q5x9 | Illustrator versions 28.5, 27.9.4 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to an application denial-of-service (DoS). An attacker could exploit this vulnerability to crash the application, resulting in a denial of service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | 5.5 | null | null |
|
CVE-2015-0728 | Cross-site scripting (XSS) vulnerability in Cisco Access Control Server (ACS) 5.5(0.1) allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCuu11002. | [
"cpe:2.3:a:cisco:secure_access_control_system:5.5\\(0.1\\):*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2024-3782 | Cross-Site Request Forgery (CSRF) vulnerability in WBSAirback | Cross-Site Request Forgery vulnerability in WBSAirback 21.02.04, which could allow an attacker to create a manipulated HTML form to perform privileged actions once it is executed by a privileged user. | [
"cpe:2.3:a:wbsairback:white_bear_solutions:21.02.04:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
CVE-2019-13531 | In Medtronic Valleylab FT10 Energy Platform (VLFT10GEN) version 2.1.0 and lower and version 2.0.3 and lower, and Valleylab LS10 Energy Platform (VLLS10GEN—not available in the United States) version 1.20.2 and lower, the RFID security mechanism used for authentication between the FT10/LS10 Energy Platform and instruments can be bypassed, allowing for inauthentic instruments to connect to the generator. | [
"cpe:2.3:o:medtronic:valleylab_ft10_energy_platform_firmware:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronic:valleylab_ft10_energy_platform_firmware:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:valleylab_ft10_energy_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronic:valleylab_ls10_energy_platform_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:valleylab_ls10_energy_platform:-:*:*:*:*:*:*:*"
] | null | 4.6 | null | 2.1 |
|
GHSA-gpw7-r879-cvvq | _account_forgot_password.ajax.php in MFScripts YetiShare 3.5.2 through 4.5.3 displays a message indicating whether an email address is configured for the account name provided. This can be used by an attacker to enumerate accounts by guessing email addresses. | [] | null | null | null | null |
|
CVE-2021-47611 | mac80211: validate extended element ID is present | In the Linux kernel, the following vulnerability has been resolved:
mac80211: validate extended element ID is present
Before attempting to parse an extended element, verify that
the extended element ID is present. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2019-16651 | An issue was discovered on Virgin Media Super Hub 3 (based on ARRIS TG2492) devices. Because their SNMP commands have insufficient protection mechanisms, it is possible to use JavaScript and DNS rebinding to leak the WAN IP address of a user (if they are using certain VPN implementations, this would decloak them). | [
"cpe:2.3:o:virginmedia:super_hub_3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:virginmedia:super_hub_3:-:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 |
|
CVE-2010-1213 | The importScripts Web Worker method in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 does not verify that content is valid JavaScript code, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted HTML document. | [
"cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0a1pre:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-wjm3-wg2w-w85x | Support Assistant in NCP Secure Enterprise Client before 12.22 allows attackers to delete arbitrary files on the operating system by creating a symbolic link. | [] | null | 8.1 | null | null |
|
GHSA-gw4x-3jgm-3945 | Bugzilla/Attachment.pm in attachment.cgi in Bugzilla 2.x and 3.x before 3.6.12, 3.7.x and 4.0.x before 4.0.9, 4.1.x and 4.2.x before 4.2.4, and 4.3.x and 4.4.x before 4.4rc1 allows remote attackers to read attachment descriptions from private bugs via an obsolete=1 insert action. | [] | null | null | null | null |
|
CVE-2021-32712 | Information leakage in Error Handler | Shopware is an open source eCommerce platform. Versions prior to 5.6.10 are vulnerable to system information leakage in error handling. Users are recommend to update to version 5.6.10. You can get the update to 5.6.10 regularly via the Auto-Updater or directly via the download overview. | [
"cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
CVE-2017-3026 | Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable use after free vulnerability when manipulating an internal data structure. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
CVE-2024-25468 | An issue in TOTOLINK X5000R V.9.1.0u.6369_B20230113 allows a remote attacker to cause a denial of service via the host_time parameter of the NTPSyncWithHost component. | [
"cpe:2.3:o:totolink:x5000r_firmware:9.1.0u.6369_b20230113:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-g364-c7w5-93wh | Jenkins Delivery Pipeline Plugin Cross-site Scripting vulnerability | The Jenkins Delivery Pipeline Plugin version 1.0.7 and earlier used the unescaped content of the query parameter 'fullscreen' in its JavaScript, resulting in a cross-site scripting vulnerability through specially crafted URLs. Version 1.0.8 of the plugin converts the value to a boolean (true/false) and inserts that into the page instead. | [] | null | null | 6.1 | null |
GHSA-245r-96m5-w336 | Gnome gdk-pixbuf 2.36.8 and older is vulnerable to several integer overflow in the gif_get_lzw function resulting in memory corruption and potential code execution | [] | null | null | 8.8 | null |
|
CVE-2017-1000029 | Oracle, GlassFish Server Open Source Edition 3.0.1 (build 22) is vulnerable to Local File Inclusion vulnerability, that makes it possible to include arbitrary files on the server, this vulnerability can be exploited without any prior authentication. | [
"cpe:2.3:a:oracle:glassfish_server:3.0.1:*:*:*:open_source:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2018-1232 | RSA Authentication Agent version 8.0.1 and earlier for Web for both IIS and Apache Web Server are impacted by a stack-based buffer overflow which may occur when handling certain malicious web cookies that have invalid formats. The attacker could exploit this vulnerability to crash the authentication agent and cause a denial-of-service situation. | [
"cpe:2.3:a:rsa:authentication_agent_for_web:*:*:*:*:*:apache_web_server:*:*",
"cpe:2.3:a:rsa:authentication_agent_for_web:*:*:*:*:*:iis:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2007-0489 | PHP remote file inclusion vulnerability in includes/functions.visohotlink.php in VisoHotlink 1.01 and possibly earlier allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. | [
"cpe:2.3:a:visohotlink:visohotlink:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-v8hf-qmfq-rrhf | Cross-site request forgery (CSRF) vulnerability in McAfee Network Data Loss Prevention (NDLP) before 9.3 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. | [] | null | null | null | null |
|
CVE-2022-0965 | Stored XSS viva .ofd file upload in star7th/showdoc | Stored XSS viva .ofd file upload in GitHub repository star7th/showdoc prior to 2.10.4. | [
"cpe:2.3:a:showdoc:showdoc:*:*:*:*:*:*:*:*"
] | null | null | 9 | null |
CVE-2014-9768 | IBM Tivoli NetView Access Services (NVAS) allows remote authenticated users to gain privileges by entering the ADM command and modifying a "page ID" field to the EMSPG2 transaction code. NOTE: the vendor's perspective is that configuration and use of available security controls in the NVAS product mitigates the reported vulnerability | [
"cpe:2.3:a:ibm:tivoli_netview_access_services:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9 |
|
GHSA-89mf-f6pj-p9h8 | Some Huawei wearables have a permission management vulnerability. | [] | null | 7.7 | null | null |
|
CVE-2022-49419 | video: fbdev: vesafb: Fix a use-after-free due early fb_info cleanup | In the Linux kernel, the following vulnerability has been resolved:
video: fbdev: vesafb: Fix a use-after-free due early fb_info cleanup
Commit b3c9a924aab6 ("fbdev: vesafb: Cleanup fb_info in .fb_destroy rather
than .remove") fixed a use-after-free error due the vesafb driver freeing
the fb_info in the .remove handler instead of doing it in .fb_destroy.
This can happen if the .fb_destroy callback is executed after the .remove
callback, since the former tries to access a pointer freed by the latter.
But that change didn't take into account that another possible scenario is
that .fb_destroy is called before the .remove callback. For example, if no
process has the fbdev chardev opened by the time the driver is removed.
If that's the case, fb_info will be freed when unregister_framebuffer() is
called, making the fb_info pointer accessed in vesafb_remove() after that
to no longer be valid.
To prevent that, move the expression containing the info->par to happen
before the unregister_framebuffer() function call. | [] | null | 7.8 | null | null |
CVE-2024-24855 | Race condition vulnerability in Linux kernel scsi device driver lpfc_unregister_fcf_rescan() | A race condition was found in the Linux kernel's scsi device driver in lpfc_unregister_fcf_rescan() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.
| [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.34:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:*"
] | null | 5 | null | null |
CVE-2019-15729 | An issue was discovered in GitLab Community and Enterprise Edition 8.18 through 12.2.1. An internal endpoint unintentionally disclosed information about the last pipeline that ran for a merge request. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-hmpx-mhc7-wxwr | Multiple buffer overflows in Cyrus SASL library 2.1.9 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) long inputs during user name canonicalization, (2) characters that need to be escaped during LDAP authentication using saslauthd, or (3) an off-by-one error in the log writer, which does not allocate space for the null character that terminates a string. | [] | null | 9.8 | null | null |
|
GHSA-jqfg-7337-c7c8 | Microsoft Internet Explorer allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code by instantiating certain Windows 2000 ActiveX COM Objects including (1) ciodm.dll, (2) myinfo.dll, (3) msdxm.ocx, and (4) creator.dll. | [] | null | null | null | null |
|
CVE-2020-15412 | An issue was discovered in MISP 2.4.128. app/Controller/EventsController.php lacks an event ACL check before proceeding to allow a user to send an event contact form. | [
"cpe:2.3:a:misp:misp:2.4.128:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4 |
|
RHSA-2023:7840 | Red Hat Security Advisory: gstreamer1-plugins-bad-free security update | gstreamer: MXF demuxer use-after-free vulnerability | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb"
] | null | 8.8 | null | null |
RHSA-2020:2474 | Red Hat Security Advisory: libexif security update | libexif: several buffer over-reads in EXIF MakerNote handling can lead to information disclosure and DoS | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 9.1 | null | null |
GHSA-m96m-qc9m-gfxj | In all Qualcomm products with Android releases from CAF using the Linux kernel, during DMA allocation, due to wrong data type of size, allocation size gets truncated which makes allocation succeed when it should fail. | [] | null | null | 7.8 | null |
|
GHSA-gqm5-4x4w-m9wr | Cross-Site Request Forgery (CSRF) vulnerability in Themeisle Multiple Page Generator Plugin – MPG plugin <= 3.3.9 versions. | [] | null | 8.8 | null | null |
|
CVE-2021-44278 | Librenms 21.11.0 is affected by a path manipulation vulnerability in includes/html/pages/device/showconfig.inc.php. | [
"cpe:2.3:a:librenms:librenms:21.11.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-rfv8-g2v3-qfj9 | SQL injection vulnerability in gallery.php in Gallarific PHP Photo Gallery script 2.1 and possibly other versions allows remote attackers to execute arbitrary SQL commands via the id parameter. | [] | null | null | null | null |
|
CVE-2023-22709 | WordPress SRS Simple Hits Counter Plugin <= 1.1.0 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in Atif N SRS Simple Hits Counter plugin <= 1.1.0 versions. | [
"cpe:2.3:a:srs_simple_hits_counter_project:srs_simple_hits_counter:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
GHSA-qrj9-3rq9-c254 | Simple Customer Relationship Management System v1.0 as discovered to contain a SQL injection vulnerability via the address parameter in the user profile update function. | [] | null | 8.8 | null | null |
|
GHSA-5h6g-m5wf-gj86 | Adobe Acrobat and Reader versions , 2019.021.20056 and earlier, 2017.011.30152 and earlier, 2017.011.30155 and earlier version, 2017.011.30152 and earlier, and 2015.006.30505 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . | [] | null | null | null | null |
|
CVE-2004-0885 | The mod_ssl module in Apache 2.0.35 through 2.0.52, when using the "SSLCipherSuite" directive in directory or location context, allows remote clients to bypass intended restrictions by using any cipher suite that is allowed by the virtual host configuration. | [
"cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-8h4q-hf82-q8rj | The 3Com TippingPoint IPS do not properly handle certain full-width and half-width Unicode character encodings in an HTTP POST request, which might allow remote attackers to evade detection of HTTP traffic. | [] | null | null | null | null |
|
CVE-2023-32755 | e-Excellence U-Office Force - Error Message Leakage |
e-Excellence U-Office Force generates an error message in webiste service. An unauthenticated remote attacker can obtain partial sensitive system information from error message by sending a crafted command.
| [
"cpe:2.3:a:edetw:u-office_force:20.0.7668d:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
RHSA-2019:1325 | Red Hat Security Advisory: java-1.8.0-ibm security update | OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453) JDK: Unspecified vulnerability fixed in 7u221 and 8u211 (2D) OpenJDK: Font layout engine out of bounds access setCurrGlyphID() (2D, 8219022) JDK: Read beyond the end of bytecode array causing JVM crash | [
"cpe:/a:redhat:network_satellite:5.8::el6"
] | null | null | 7.5 | null |
CVE-2014-2875 | The session.lua library in CGILua 5.2 alpha 1 and 5.2 alpha 2 uses weak session IDs generated based on OS time, which allows remote attackers to hijack arbitrary sessions via a brute force attack. NOTE: CVE-2014-10399 and CVE-2014-10400 were SPLIT from this ID. | [
"cpe:2.3:a:keplerproject:cgilua:*:*:*:*:*:*:*:*",
"cpe:2.3:a:keplerproject:cgilua:5.2:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:keplerproject:cgilua:5.2:alpha2:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2010-1113 | Cross-site scripting (XSS) vulnerability in the forum page in Web Server Creator - Web Portal 0.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors to index.php. | [
"cpe:2.3:a:comscripts:web_server_creator_web_portal:0.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2024-33377 | LB-LINK BL-W1210M v2.0 was discovered to contain a clickjacking vulnerability via the Administrator login page. Attackers can cause victim users to perform arbitrary operations via interaction with crafted elements on the web page. | [
"cpe:2.3:h:lb-link:bl-w1210m:2.0:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
|
GHSA-j75x-vr7m-9cch | OpenAFS before 1.6.24 and 1.8.x before 1.8.5 is prone to information leakage upon certain error conditions because uninitialized RPC output variables are sent over the network to a peer. | [] | null | null | null | null |
|
GHSA-37q9-236v-5578 | Buffer overflow in AOL Instant Messenger before 4.3.2229 allows remote attackers to execute arbitrary commands via a long "goim" command. | [] | null | null | null | null |
|
CVE-2022-25989 | An authentication bypass vulnerability exists in the libxm_av.so getpeermac() functionality of Anker Eufy Homebase 2 2.1.8.5h. A specially-crafted DHCP packet can lead to authentication bypass. An attacker can DHCP poison to trigger this vulnerability. | [
"cpe:2.3:o:anker:eufy_homebase_2_firmware:2.1.8.5h:*:*:*:*:*:*:*",
"cpe:2.3:h:anker:eufy_homebase_2:-:*:*:*:*:*:*:*"
] | null | null | 7.1 | null |
|
CVE-2021-24341 | Xllentech English Islamic Calendar < 2.6.8 - Authenticated SQL Injection | When deleting a date in the Xllentech English Islamic Calendar WordPress plugin before 2.6.8, the year_number and month_number POST parameters are not sanitised, escaped or validated before being used in a SQL statement, leading to SQL injection. | [
"cpe:2.3:a:xllentech:english_islamic_calendar:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | 6.5 |
CVE-2007-1556 | SQL injection vulnerability in kommentare.php in Creative Files 1.2 allows remote attackers to execute arbitrary SQL commands via the dlid parameter. | [
"cpe:2.3:a:thecreativeheads.de:creative_files:1.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2024:4367 | Red Hat Security Advisory: pki-core security update | ca: token authentication bypass vulnerability | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
GHSA-j9v5-795f-r585 | Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used. | [] | null | null | null | null |
|
GHSA-5v72-g8c6-fhcj | Panda Security Dome Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Panda Security Dome. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the PSANHost executable. By creating a junction, an attacker can abuse the service to delete arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-23402. | [] | null | null | 7.8 | null |
|
CVE-2024-12696 | Picture Gallery – Frontend Image Uploads, AJAX Photo List <= 1.5.22 - Authenticated (Contributor+) Stored Cross-Site Scripting via videowhisper_picture_upload_guest Shortcode | The Picture Gallery – Frontend Image Uploads, AJAX Photo List plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's videowhisper_picture_upload_guest shortcode in all versions up to, and including, 1.5.22 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
GHSA-929w-cxfv-hxfm | Multiple cross-site scripting (XSS) vulnerabilities in cryptographp/admin.php in the Cryptographp 1.2 and earlier plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) cryptwidth, (2) cryptheight, (3) bgimg, (4) charR, (5) charG, (6) charB, (7) charclear, (8) tfont, (9) charel, (10) charelc, (11) charelv, (12) charnbmin, (13) charnbmax, (14) charspace, (15) charsizemin, (16) charsizemax, (17) charanglemax, (18) noisepxmin, (19) noisepxmax, (20) noiselinemin, (21) noiselinemax, (22) nbcirclemin, (23) nbcirclemax, or (24) brushsize parameter to wp-admin/options-general.php. | [] | null | null | null | null |
|
GHSA-r33r-j3c5-f2xq | Buffer overflow in Xen 4.7.x and earlier allows local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update. | [] | null | null | 4.1 | null |
|
GHSA-rh3g-x45r-f376 | The SeaMicro provisioning of Ubuntu MAAS logs credentials, including username and password, for the management interface. This issue affects Ubuntu MAAS versions prior to 1.9.2. | [] | null | null | 9.8 | null |
|
CVE-2024-56438 | Vulnerability of improper memory address protection in the HUKS module
Impact: Successful exploitation of this vulnerability may affect availability. | [
"cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*"
] | null | 6 | null | null |
|
cisco-sa-sbr042-multi-vuln-ej76Pke5 | Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers Vulnerabilities | Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow a remote attacker to bypass authentication or execute arbitrary commands on the underlying operating system of an affected device.
For more information about these vulnerabilities, see the Details ["#details"] section of this advisory.
Cisco has not released software updates to address the vulnerabilities described in this advisory. There are no workarounds that address these vulnerabilities.
| [] | null | 6.5 | null | null |
CVE-2023-21905 | Vulnerability in the Oracle Banking Virtual Account Management product of Oracle Financial Services Applications (component: Routing Hub). Supported versions that are affected are 14.5, 14.6 and 14.7. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Banking Virtual Account Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Virtual Account Management accessible data as well as unauthorized access to critical data or complete access to all Oracle Banking Virtual Account Management accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N). | [
"cpe:2.3:a:oracle:banking_virtual_account_management:14.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_virtual_account_management:14.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_virtual_account_management:14.7:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
GHSA-jrcp-p4m6-q89q | import.php (aka the Phonebook import feature) in PlaySMS 1.4 allows remote code execution via vectors involving the User-Agent HTTP header and PHP code in the name of a file. | [] | null | null | 9.8 | null |
|
CVE-2021-21645 | Jenkins Config File Provider Plugin 3.7.0 and earlier does not perform permission checks in several HTTP endpoints, attackers with Overall/Read permission to enumerate configuration file IDs. | [
"cpe:2.3:a:jenkins:config_file_provider:*:*:*:*:*:jenkins:*:*"
] | null | 4.3 | null | 4 |
|
CVE-2015-1573 | The nft_flush_table function in net/netfilter/nf_tables_api.c in the Linux kernel before 3.18.5 mishandles the interaction between cross-chain jumps and ruleset flushes, which allows local users to cause a denial of service (panic) by leveraging the CAP_NET_ADMIN capability. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.9 |
|
CVE-2023-50639 | Cross Site Scripting (XSS) vulnerability in CuteHttpFileServer v.1.0 and v.2.0 allows attackers to obtain sensitive information via the file upload function in the home page. | [
"cpe:2.3:a:iscute:cute_http_file_server:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:iscute:cute_http_file_server:2.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
|
CVE-2020-14161 | It is possible to inject HTML and/or JavaScript in the HTML to PDF conversion in Gotenberg through 6.2.1 via the /convert/html endpoint. | [
"cpe:2.3:a:thecodingmachine:gotenberg:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-r62h-rf3r-q857 | The onReadyRead function in core/coreauthhandler.cpp in Quassel before 0.12.4 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via invalid handshake data. | [] | null | null | 7.5 | null |
|
CVE-2018-5784 | In LibTIFF 4.0.9, there is an uncontrolled resource consumption in the TIFFSetDirectory function of tif_dir.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted tif file. This occurs because the declared number of directory entries is not validated against the actual number of directory entries. | [
"cpe:2.3:a:libtiff:libtiff:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
GHSA-mhwm-h446-pq2w | Cross Site Request Forgery (CSRF) exists in RSVP Invitation Online 1.0 via function/account.php, as demonstrated by modifying the admin password. | [] | null | null | 8.8 | null |
|
CVE-2024-26186 | Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability | Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:sql_2016_azure_connect_feature_pack:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*"
] | null | 8.8 | null | null |
CVE-2017-15781 | XnView Classic for Windows Version 2.43 allows attackers to execute arbitrary code or cause a denial of service via a crafted .dwg file, related to a "Read Access Violation on Control Flow starting at CADImage+0x0000000000286a76." | [
"cpe:2.3:a:xnview:xnview:2.43:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 |
|
GHSA-45mv-5p9c-6w7c | The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension. | [] | null | null | 7.8 | null |
|
CVE-2005-1374 | Multiple cross-site scripting (XSS) vulnerabilities in Claroline 1.5.3 through 1.6 Release Candidate 1, and possibly Dokeos, allow remote attackers to inject arbitrary web script or HTML via (1) exercise_result.php, (2) exercice_submit.php, (3) agenda.php, (4) learningPathList.php, (5) learningPathAdmin.php, (6) learningPath.php, (7) userLog.php, (8) tool parameter to toolaccess_details.php, (9) data parameter to user_access_details.php, or (10) coursePath parameter to myagenda.php. | [
"cpe:2.3:a:claroline:claroline:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:claroline:claroline:1.6_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:claroline:claroline:1.6_rc1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2007-0481 | Cisco IOS allows remote attackers to cause a denial of service (crash) via a crafted IPv6 Type 0 Routing header. | [
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0da:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0db:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0dc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0s:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0sc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0sl:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0sp:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0st:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0sx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0sy:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0sz:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0t:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0w:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0wc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0wt:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xa:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xd:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xe:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xf:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xg:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xh:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xi:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xj:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xk:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xl:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xm:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xq:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xr:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xs:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xv:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xw:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1aa:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ax:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ay:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1az:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1cx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1da:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1db:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1dc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1e:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ea:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1eb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ec:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1eo:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1eu:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ev:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ew:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ex:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ey:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ez:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1t:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1x:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xa:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xd:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xe:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xf:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xg:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xh:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xi:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xj:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xl:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xp:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xq:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xr:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xs:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xt:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xu:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xv:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xw:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xy:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xz:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ya:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yd:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ye:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yf:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yh:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yi:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yj:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2b:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2bc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2bw:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2by:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2bz:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2cx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2cy:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2cz:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2da:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2dd:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2dx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2eu:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ew:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ewa:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ex:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ey:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ez:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2fx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2fy:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2fz:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ixa:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ixb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ixc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ja:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2jk:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2mb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2mc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2s:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sbc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2se:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sea:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2seb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sec:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sed:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2see:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sef:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2seg:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sg:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sga:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2so:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sra:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2srb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2su:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sv:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sw:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sxa:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sxb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sxd:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sxe:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sxf:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sy:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sz:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2t:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2tpc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xa:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xd:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xe:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xf:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xg:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xh:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xi:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xj:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xk:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xl:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xm:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xn:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xq:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xr:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xs:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xt:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xu:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xv:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xw:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ya:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yd:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ye:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yf:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yg:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yh:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yj:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yk:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yl:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ym:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yn:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yo:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yp:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yq:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yr:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ys:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yt:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yu:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yv:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yw:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yy:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yz:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2za:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zd:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ze:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zf:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zg:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zh:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zj:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zl:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zn:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zp:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3b:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3bc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3bw:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3ja:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3jea:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3jeb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3jk:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3jx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3t:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3tpc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xa:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xd:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xe:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xf:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xg:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xh:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xi:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xj:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xk:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xq:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xr:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xs:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xu:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xw:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xy:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3ya:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yd:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yf:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yg:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yh:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yi:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yj:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yk:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3ym:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yq:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3ys:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yt:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yu:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yz:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.4:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.4mr:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.4sw:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.4t:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.4xa:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.4xb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.4xc:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
GHSA-pg97-ww7h-5mjr | XSS in dojox due to insufficient escape in dojox.xmpp.util.xmlEncode | Impact_What kind of vulnerability is it? Who is impacted?_Potential XSS vulnerability for users of `dojox/xmpp` and `dojox/dtl`.Patches_Has the problem been patched? What versions should users upgrade to?_Yes, patches are available for the 1.11 through 1.16 versions. Users should upgrade to one of these versions of Dojo:1.16.11.15.21.14.51.13.61.12.71.11.9Users of Dojo 1.10.x and earlier should review this change and determine if it impacts them, and backport the change as appropriate.Workarounds_Is there a way for users to fix or remediate the vulnerability without upgrading?_The change applied in https://github.com/dojo/dojox/pull/315 could get added separately as a patch.For more informationIf you have any questions or comments about this advisory:Open an issue in [dojo/dojox](https://github.com/dojo/dojox/) | [] | null | 6.1 | null | null |
CVE-2023-45483 | Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the time parameter in the function compare_parentcontrol_time. | [
"cpe:2.3:o:tenda:ac10_firmware:16.03.10.13:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac10:4.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
Subsets and Splits