id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
57.2k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2006-6596
HyperAccess 8.4 allows user-assisted remote attackers to execute arbitrary vbscript and commands via a session (HAW) file, which can be automatically opened using Internet Explorer.
[ "cpe:2.3:a:hilgraeve:hyperaccess:8.4:*:*:*:*:*:*:*" ]
null
null
null
6.8
RHSA-2015:2536
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3 security update
apache-commons-collections: InvokerTransformer code execution during deserialisation
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5", "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6", "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7" ]
null
null
null
null
CVE-2022-2302
LENZE: Missing password verification in authorisation procedure
Multiple Lenze products of the cabinet series skip the password verification upon second login. After a user has been logged on to the device once, a remote attacker can get full access without knowledge of the password.
[ "cpe:2.3:o:lenze:c520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenze:c520:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenze:c550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenze:c550:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenze:c750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenze:c750:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2024-12268
Responsive Blocks – WordPress Gutenberg Blocks <= 1.9.7 - Authenticated (Contributor+) Stored Cross-Site Scripting
The Responsive Blocks – WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'responsive-block-editor-addons/portfolio' block in all versions up to, and including, 1.9.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
GHSA-jw9j-cq4m-p2mp
A memory corruption issue was addressed with improved state management. This issue is fixed in Xcode 11.0. Processing a maliciously crafted file may lead to arbitrary code execution.
[]
null
null
null
null
CVE-2009-3269
Opera 9.52 and earlier allows remote attackers to cause a denial of service (CPU consumption) via a series of automatic submissions of a form containing a KEYGEN element, a related issue to CVE-2009-1828.
[ "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:1.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:2.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:2.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:2.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:2.10:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:2.10:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:2.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:3.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:3.00:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:3.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:3.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:3.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:3.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:3.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:3.61:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:3.62:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:3.62:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:4.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:4.00:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:4.00:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:4.00:beta4:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:4.00:beta5:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:4.00:beta6:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:4.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:4.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2024-28388
SQL injection vulnerability in SunnyToo stproductcomments module for PrestaShop v.1.0.5 and before, allows a remote attacker to escalate privileges and obtain sensitive information via the StProductCommentClass::getListcomments method.
[ "cpe:2.3:a:sunnytoo:stproductcomments:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-mh49-rqvq-cjxg
The POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘device’ header in all versions up to, and including, 2.8.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
7.2
null
null
CVE-2021-3790
A buffer overflow was reported in the local web server of some Motorola-branded Binatone Hubble Cameras that could allow an unauthenticated attacker on the same network to perform a denial-of-service attack against the device.
[ "cpe:2.3:o:binatoneglobal:halo\\+_camera_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:halo\\+_camera:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:comfort_85_connect_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:comfort_85_connect:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:mbp3855_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:mbp3855:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:focus_68:v100:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:focus_68:v200:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:focus_72r:v100:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:focus_72r:v200:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:cn28_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:cn28:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:cn50_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:cn50:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:comfort_40_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:comfort_40:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:comfort_50_connect_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:comfort_50_connect:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:mbp4855_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:mbp4855:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:mbp3667_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:mbp3667:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:mbp669_connect_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:mbp669_connect:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:lux_64_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:lux_64:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:lux_65_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:lux_65:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:connect_view_65_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:connect_view_65:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:lux_85_connect_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:lux_85_connect:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:ease44_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:ease44:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:connect_20_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:connect_20:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:mbp6855_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:mbp6855:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:cn40_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:cn40:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:cn75_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:cn75:-:*:*:*:*:*:*:*" ]
null
6.5
null
null
CVE-2025-1148
GNU Binutils ld ldelfgen.c link_order_scan memory leak
A vulnerability was found in GNU Binutils 2.43 and classified as problematic. Affected by this issue is the function link_order_scan of the file ld/ldelfgen.c of the component ld. The manipulation leads to memory leak. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: "I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master."
[]
2.3
3.1
3.1
2.6
CVE-2003-0581
X Fontserver for Truetype fonts (xfstt) 1.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a (1) FS_QueryXExtents8 or (2) FS_QueryXBitmaps8 packet, and possibly other types of packets, with a large num_ranges value, which causes an out-of-bounds array access.
[ "cpe:2.3:a:xfstt:xfstt:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:xfstt:xfstt:1.4:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-r33x-hqm4-h3rc
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Server-Side Request Forgery (SSRF) vulnerability in Room 34 Creative Services, LLC ICS Calendar ics-calendar allows Absolute Path Traversal, : Server Side Request Forgery.This issue affects ICS Calendar: from n/a through 10.12.0.3.
[]
null
8.2
null
null
CVE-2017-7519
In Ceph, a format string flaw was found in the way libradosstriper parses input from user. A user could crash an application or service using the libradosstriper library.
[ "cpe:2.3:a:ceph:ceph:-:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
null
2.3
null
GHSA-xcj5-5h7j-93q8
An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an Invalid Read in exif_process_SOFn.
[]
null
7.5
null
null
GHSA-2gwx-jm42-4548
kodbox 1.44 is vulnerable to Cross Site Scripting (XSS). Customizing global HTML results in storing XSS.
[]
null
5.4
null
null
GHSA-6c73-5xh3-xq69
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Rich Text Editor). Supported versions that are affected are 8.57, 8.58 and 8.59. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[]
null
null
null
null
CVE-2023-32666
On-chip debug and test interface with improper access control in some 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:o:intel:e3-1220l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1226_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1230l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1231_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1241_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1246_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1265l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1271_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1275l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1276_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1281_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1285l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1286_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1286l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-1428l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-1620_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-1630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-1650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-1660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-1680_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2408l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2418l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2428l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2438l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2603_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2608l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2609_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2618l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2620_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2623_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2628l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2630l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2637_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2640_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2643_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2648l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2650l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2658a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2658_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2667_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2670_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2680_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2683_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2687w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2690_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2695_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2697_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2698_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2699_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4610_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4620_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4627_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4640_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4648_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4655_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4667_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4669_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-4809_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-4820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-4830_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-4850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8860_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8867_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8870_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8880_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8880l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8890_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8891_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8893_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_3040_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_3050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_3060_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_3065_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_3070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_3104_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_3106_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_3204_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_3206r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4108_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4109t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4110_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4112_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4114_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4114t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4116_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4116t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4208_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4208r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4209t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4210r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4214c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4214_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4214r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4214y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4215_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4216_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4216r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5030_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5040_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5060_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5063_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5080_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5110_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5115_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5118_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5119t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5120_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5120t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5122_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5140_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5160_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5215_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5215l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5215m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5215r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5217_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5218b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5218_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5218n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5218t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5220_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5220r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5220s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5220t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5222_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6126f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6126_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6126t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6128_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6130f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6130t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6132_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6134_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6134m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6136_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6138f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6138_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6138t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6140_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6140m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6142f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6142_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6142m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6144_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6146_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6148f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6148_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6152_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6154_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6222v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6226_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6230_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6230n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6230t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6234_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6238_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6238l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6238m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6238t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6240_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6240l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6240m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6240y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6242_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6244_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6246_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6248_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6252_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6252n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6254_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6262v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_7020_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_7030_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_7040_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_7041_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_7110m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_7110n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_7120m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_7120n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_7130m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_7130n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_7140m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_7140n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_7150n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8153_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8156_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8158_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8160f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8160_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8160m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8160t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8164_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8168_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8170_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8170m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8176f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8176_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8176m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8180_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8180m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8253_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8256_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8260_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8260l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8260m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8260y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8268_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8270_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8276_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8276l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8276m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8280_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8280l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8280m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_9220_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_9221_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_9222_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_9242_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_9282_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_bronze_3104_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_bronze_3106_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_bronze_3204_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_bronze_3206r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_bronze_3408u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_bronze_processors_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1513n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1518_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1520_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1521_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1523n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1524n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1527_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1528_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1529_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1531_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1533n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1537_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1539_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1540_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1541_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1543n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1548_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1553n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1557_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1559_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1563n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1564n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1567_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1573n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1577_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1581_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1587_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1602_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1612_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1622_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1623n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1627_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1632_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1633n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1637_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1649n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1653n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d1700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1702_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1712tr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1713nte_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1713nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1714_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1715ter_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1718t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1722ne_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1726_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1731nte_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1732te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1733nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1734nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1735tr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1736_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1736nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1739_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1746ter_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1747nte_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1748te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1749nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2191_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d2700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2712t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2733nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2738_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2745nx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2752nte_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2752ter_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2753nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2757nx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2766nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2775te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2776nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2777nx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2779_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2786nte_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2795nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2796nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2796te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2798nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2798nx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2799_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-1105c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2104g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:windows:*:*", "cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:windows:*:*", "cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*" ]
null
7.2
null
null
GHSA-7j4g-23pf-vp65
In Exponent CMS before 2.4.1 Patch #6, certain admin users can elevate their privileges.
[]
null
null
7.2
null
CVE-2004-1689
sudoedit (aka sudo -e) in sudo 1.6.8 opens a temporary file with root privileges, which allows local users to read arbitrary files via a symlink attack on the temporary file before quitting sudoedit.
[ "cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*" ]
null
null
null
2.1
GHSA-xvcp-85rr-xfr8
A remote command injection vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.
[]
null
null
null
null
GHSA-r73g-hmmg-cj3m
Multiple PHP remote file inclusion vulnerabilities in Redaction System 1.0000 allow remote attackers to execute arbitrary PHP code via a URL in the (1) lang_prefix parameter to (a) conn.php, (b) sesscheck.php, (c) wap/conn.php, or (d) wap/sesscheck.php, or the (2) lang parameter to (e) index.php.
[]
null
null
null
null
CVE-2004-2238
Format string vulnerability in vsybase.c in vpopmail 5.4.2 and earlier has unknown impact and attack vectors. NOTE: in a followup post, it was observed that the source code used constants that, when compiled, became static format strings. Thus this is not a vulnerability
[ "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):3.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):3.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):3.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):3.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):3.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):3.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):3.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):3.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):3.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):3.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):3.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):3.4.11e:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):4.5:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):4.6:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):4.7:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):4.8:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):4.9:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):4.9.10:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):4.10:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):5.3.20:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):5.3.21:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):5.3.22:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):5.3.23:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):5.3.24:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):5.3.25:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):5.3.26:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):5.3.27:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):5.3.28:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):5.3.29:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):5.3.30:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):5.4:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):5.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:inter7:vpopmail_\\(vchkpw\\):5.4.2:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-xgr9-8q24-v4ph
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the ASN.1 BER dissector could crash. This was addressed in epan/dissectors/packet-ber.c by ensuring that length values do not exceed the maximum signed integer.
[]
null
null
7.5
null
GHSA-f5rq-9wm5-93cx
Buffer overflow in client/server Doom (csDoom) 0.7 and earlier allows remote attackers to (1) cause a denial of service via a long nickname or teamname to the SV_SetupUserInfo function or (2) execute arbitrary code via a long string sent when joining a match or a long chat message to the SV_BroadcastPrintf function.
[]
null
null
null
null
RHSA-2024:3411
Red Hat Security Advisory: glibc security update
glibc: Out of bounds write in iconv may lead to remote code execution glibc: stack-based buffer overflow in netgroup cache glibc: null pointer dereferences after failed netgroup cache insertion glibc: netgroup cache may terminate daemon on memory allocation failure glibc: netgroup cache assumes NSS callback uses in-buffer strings
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
4
null
null
CVE-2007-6017
The PVATLCalendar.PVCalendar.1 ActiveX control in pvcalendar.ocx in the scheduler component in the Media Server in Symantec Backup Exec for Windows Server (BEWS) 11d 11.0.6235 and 11.0.7170, and 12.0 12.0.1364, exposes the unsafe Save method, which allows remote attackers to cause a denial of service (browser crash), or create or overwrite arbitrary files, via string values of the (1) _DOWText0, (2) _DOWText1, (3) _DOWText2, (4) _DOWText3, (5) _DOWText4, (6) _DOWText5, (7) _DOWText6, (8) _MonthText0, (9) _MonthText1, (10) _MonthText2, (11) _MonthText3, (12) _MonthText4, (13) _MonthText5, (14) _MonthText6, (15) _MonthText7, (16) _MonthText8, (17) _MonthText9, (18) _MonthText10, and (19) _MonthText11 properties. NOTE: the vendor states "Authenticated user involvement required," but authentication is not needed to attack a client machine that loads this control.
[ "cpe:2.3:a:symantec:backup_exec_for_windows_server:11d:11.0.6235:*:*:*:*:*:*", "cpe:2.3:a:symantec:backup_exec_for_windows_server:11d:11.0.7170:*:*:*:*:*:*", "cpe:2.3:a:symantec:backup_exec_for_windows_server:12.0:12.0.1364:*:*:*:*:*:*" ]
null
null
null
5.1
GHSA-c335-grgp-6vgc
Ubuntu Linux 6.10 for the PowerPC (PPC) allows local users to cause a denial of service (resource consumption) by using the (1) sys_get_robust_list and (2) sys_set_robust_list functions to create processes that cannot be killed.
[]
null
5.5
null
null
CVE-2020-3178
Cisco Content Security Management Appliance Open Redirect Vulnerabilities
Multiple vulnerabilities in the web-based GUI of Cisco AsyncOS Software for Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerabilities are due to improper input validation of the parameters of an HTTP request. An attacker could exploit these vulnerabilities by intercepting an HTTP request and modifying it to redirect a user to a specific malicious URL. A successful exploit could allow the attacker to redirect a user to a malicious web page or to obtain sensitive browser-based information. This type of attack is commonly referred to as an open redirect attack and is used in phishing attacks to get users to unknowingly visit malicious sites.
[ "cpe:2.3:a:cisco:content_security_management_appliance:*:*:*:*:*:*:*:*" ]
null
null
6.1
null
GHSA-5pv7-hx9m-8jh3
Missing permission checks in Jenkins Publish Over FTP Plugin
Missing permission checks in Jenkins Publish Over FTP Plugin prior to 1.17 allow attackers with Overall/Read permission to connect to an FTP server using attacker-specified credentials.
[]
null
4.3
null
null
CVE-2023-38155
Azure DevOps Server Remote Code Execution Vulnerability
Azure DevOps Server Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:azure_devops_server:2019.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:azure_devops_server:2019.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:azure_devops_server:2020.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:azure_devops_server:2022.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:azure_devops_server:2022.0.2:*:*:*:*:*:*:*" ]
null
7
null
null
CVE-2018-19980
Anker Nebula Capsule Pro NBUI_M1_V2.1.9 devices allow attackers to cause a denial of service (reboot of the underlying Android 7.1.2 operating system) via a crafted application that sends data to WifiService.
[ "cpe:2.3:o:anker:nebula_capsule_projector_firmware:nbui_m1_v2.1.9:*:*:*:*:*:*:*", "cpe:2.3:h:anker:nebula_capsule_projector:-:*:*:*:*:*:*:*", "cpe:2.3:a:anker:nebula_capsule_projector:7.1.2:*:*:*:*:android:*:*" ]
null
null
7.5
7.8
CVE-2023-37957
A cross-site request forgery (CSRF) vulnerability in Jenkins Pipeline restFul API Plugin 0.11 and earlier allows attackers to connect to an attacker-specified URL, capturing a newly generated JCLI token.
[ "cpe:2.3:a:jenkins:pipeline_restful_api:*:*:*:*:*:jenkins:*:*" ]
null
8.8
null
null
GHSA-f499-3q8w-php5
Multiple SQL injection vulnerabilities in the All In One WP Security & Firewall plugin before 3.8.3 for WordPress allow remote authenticated users to execute arbitrary SQL commands via the (1) orderby or (2) order parameter in the aiowpsec page to wp-admin/admin.php. NOTE: this can be leveraged using CSRF to allow remote attackers to execute arbitrary SQL commands.
[]
null
null
null
null
CVE-2020-29383
An issue was discovered on V-SOL V1600D4L V1.01.49 and V1600D-MINI V1.01.48 OLT devices. A hardcoded RSA private key (specific to V1600D4L and V1600D-MINI) is contained in the firmware images.
[ "cpe:2.3:o:vsolcn:v1600d4l_firmware:1.01.49:*:*:*:*:*:*:*", "cpe:2.3:h:vsolcn:v1600d4l:-:*:*:*:*:*:*:*", "cpe:2.3:o:vsolcn:v1600d-mini_firmware:1.01.48:*:*:*:*:*:*:*", "cpe:2.3:h:vsolcn:v1600d-mini:-:*:*:*:*:*:*:*" ]
null
7.8
null
2.1
GHSA-wf5x-cr3r-xr77
vm2 before 3.6.11 vulnerable to sandbox escape
This affects the package vm2 before 3.6.11. It is possible to trigger a RangeError exception from the host rather than the "sandboxed" context by reaching the stack call limit with an infinite recursion. The returned object is then used to reference the mainModule property of the host code running the script allowing it to spawn a child_process and execute arbitrary code.
[]
null
8.3
null
null
GHSA-g4w4-j7c8-4xwx
Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "MSEARCH_HIGHLIGHT_ENABLE_TITLE[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.
[]
null
8.8
null
null
CVE-2020-36237
Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to view custom field options via an Information Disclosure vulnerability in the /rest/api/2/customFieldOption/ endpoint. The affected versions are before version 8.15.0.
[ "cpe:2.3:a:atlassian:data_center:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*" ]
null
5.3
null
5
CVE-2002-0362
Buffer overflow in AOL Instant Messenger (AIM) 4.2 and later allows remote attackers to execute arbitrary code via a long AddExternalApp request and a TLV type greater than 0x2711.
[ "cpe:2.3:a:aol:instant_messenger:4.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-j965-m9vq-3cg5
A vulnerability was found in McKesson Cardiology product 13.x and 14.x. Insecure file permissions in the default installation may allow an attacker with local system access to execute unauthorized arbitrary code.
[]
null
7.8
null
null
CVE-2024-38793
WordPress Best Restaurant Menu by Pricelisto plugin <= 1.4.1 - SQL Injection vulnerability
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in PriceListo Best Restaurant Menu by PriceListo allows SQL Injection.This issue affects Best Restaurant Menu by PriceListo: from n/a through 1.4.1.
[ "cpe:2.3:a:pricelisto:great_restaurant_menu_wp:*:*:*:*:*:wordpress:*:*" ]
null
8.5
null
null
GHSA-wvm7-3w38-f5p6
Vulnerability in the Oracle CRM Technical Foundation product of Oracle E-Business Suite (component: Preferences). Supported versions that are affected are 12.2.3 - 12.2.10. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle CRM Technical Foundation. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle CRM Technical Foundation accessible data as well as unauthorized access to critical data or complete access to all Oracle CRM Technical Foundation accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N).
[]
null
null
null
null
CVE-2022-39856
Improper access control vulnerability in imsservice application prior to SMR Oct-2022 Release 1 allows local attackers to access call information.
[ "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*" ]
null
4
null
null
ICSA-19-190-01
Emerson DeltaV Distributed Control System
The Smart Switch Command Center does not change the DeltaV Smart Switch management account password upon commissioning as expected, leaving the default password in effect indefinitely.CVE-2018-11691 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H).
[]
null
null
6.1
null
CVE-2021-45527
Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects D6220 before 1.0.0.68, D6400 before 1.0.0.102, D7000v2 before 1.0.0.66, D8500 before 1.0.3.58, DC112A before 1.0.0.54, EX7000 before 1.0.1.94, EX7500 before 1.0.0.72, R6250 before 1.0.4.48, R6300v2 before 1.0.4.52, R6400 before 1.0.1.70, R6400v2 before 1.0.4.102, R6700v3 before 1.0.4.102, R7000 before 1.0.11.116, R7100LG before 1.0.0.64, R7850 before 1.0.5.68, R7900 before 1.0.4.30, R7960P before 1.4.1.68, R8000 before 1.0.4.52, RAX200 before 1.0.2.88, RBS40V before 2.6.2.4, RS400 before 1.5.1.80, XR300 before 1.0.3.56, R7000P before 1.3.2.124, R8000P before 1.4.1.68, R8500 before 1.0.2.144, RAX80 before 1.0.3.102, R6900P before 1.3.2.124, R7900P before 1.4.1.68, R8300 before 1.0.2.144, RAX75 before 1.0.3.102, RBR750 before 3.2.17.12, RBR850 before 3.2.17.12, RBS750 before 3.2.17.12, RBS850 before 3.2.17.12, RBK752 before 3.2.17.12, and RBK852 before 3.2.17.12.
[ "cpe:2.3:o:netgear:rbk752_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbk752:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbr750:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbs750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbs750:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbk852_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbk852:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbr850:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbs850_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbs850:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d6220_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d6220:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d6400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d6400:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d7000v2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d7000v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d8500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d8500:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:dc112a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:dc112a:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:ex7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:ex7000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:ex7500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:ex7500:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6250:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6300v2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6300v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6400v2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6400v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6700v3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6700v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7850_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7850:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7960p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7960p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax200:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax75_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax75:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax80_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax80:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbs40v_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbs40v:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:xr300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:xr300:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rs400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rs400:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8000p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8000p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7900p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7900p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8300:-:*:*:*:*:*:*:*" ]
null
9.6
null
null
GHSA-p2v6-569j-46gm
Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd e_l, at 0x9d016cf0, the value for the `grp` key is copied using `strcpy` to the buffer at `$sp+0x1b4`.This buffer is 8 bytes large, sending anything longer will cause a buffer overflow.
[]
null
9.9
null
null
GHSA-w28x-jp4q-gc53
A vulnerability was found in Axiomatic Bento4. It has been rated as critical. Affected by this issue is some unknown functionality of the component mp42aac. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-216170 is the identifier assigned to this vulnerability.
[]
null
8.8
null
null
GHSA-mv9h-j372-56jj
The DAP to Autoresponders Email Syncing plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0 through the publicly accessible phpinfo.php script. This makes it possible for unauthenticated attackers to view potentially sensitive information contained in the exposed file.
[]
null
5.3
null
null
CVE-2020-4383
IBM Spectrum Scale for IBM Elastic Storage Server 5.3.0 through 5.3.5 could allow an authenticated user to cause a denial of service during deployment while configuring some of the network services. IBM X-Force ID: 179165.
[ "cpe:2.3:a:ibm:elastic_storage_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
null
5.3
null
GHSA-xr7h-8r7p-xpv9
PAX Android based POS devices allow for escalation of privilege via improperly configured scripts.An attacker must have shell access with system account privileges in order to exploit this vulnerability. A patch addressing this issue was included in firmware version PayDroid_8.1.0_Sagittarius_V11.1.61_20240226.
[]
null
6.7
null
null
CVE-2024-25993
In tmu_reset_tmu_trip_counter of , there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
8.4
null
null
GHSA-4h2p-5cf9-5j8f
A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function j1939_session_destroy of the file net/can/j1939/transport.c of the component IPsec. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211932.
[]
null
3.3
null
null
CVE-2001-0669
Various Intrusion Detection Systems (IDS) including (1) Cisco Secure Intrusion Detection System, (2) Cisco Catalyst 6000 Intrusion Detection System Module, (3) Dragon Sensor 4.x, (4) Snort before 1.8.1, (5) ISS RealSecure Network Sensor 5.x and 6.x before XPU 3.2, and (6) ISS RealSecure Server Sensor 5.5 and 6.0 for Windows, allow remote attackers to evade detection of HTTP attacks via non-standard "%u" Unicode encoding of ASCII characters in the requested URL.
[ "cpe:2.3:a:cisco:catalyst_6000_intrusion_detection_system_module:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_intrusion_detection_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:iss:realsecure_network_sensor:5.x:*:*:*:*:*:*:*", "cpe:2.3:a:iss:realsecure_network_sensor:6.x:*:*:*:*:*:*:*", "cpe:2.3:a:iss:realsecure_server_sensor:5.5:*:*:*:*:*:*:*", "cpe:2.3:a:iss:realsecure_server_sensor:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:snort:snort:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:h:enterasys:dragon:4.x:*:*:*:*:*:*:*" ]
null
null
null
7.5
RHSA-2022:8543
Red Hat Security Advisory: thunderbird security update
Mozilla: Service Workers might have learned size of cross-origin media files Mozilla: Fullscreen notification bypass Mozilla: Use-after-free in InputStream implementation Mozilla: Use-after-free of a JavaScript Realm Mozilla: Fullscreen notification bypass via windowName Mozilla: Use-after-free in Garbage Collection Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy Mozilla: Cross-Site Tracing was possible via non-standard override headers Mozilla: Symlinks may resolve to partially uninitialized buffers Mozilla: Keystroke Side-Channel Leakage Mozilla: Custom mouse cursor could have been drawn over browser UI Mozilla: Iframe contents could be rendered outside the iframe Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
8.8
6.1
null
GHSA-36c8-x5g7-w9x4
Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
[]
null
6.5
null
null
CVE-2021-34567
WAGO I/O-Check Service prone to Out-of-bounds Read
In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service and an limited out-of-bounds read.
[ "cpe:2.3:o:wago:750-8100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8100_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8100_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8100_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8100:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8101:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101\\/025-000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101\\/025-000_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101\\/025-000_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101\\/025-000_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8101\\/025-000:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8102:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102\\/025-000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102\\/025-000_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102\\/025-000_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102\\/025-000_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8102\\/025-000:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-011_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-011_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-011_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-011_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/000-011:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-012_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-012_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-012_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-012_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/000-012:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-022_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-022_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-022_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-022_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/000-022:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-000_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-000_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-000_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/025-000:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/025-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/025-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-000_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-000_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-000_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/040-000:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/040-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:752-8303\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4101_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4101_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4101_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4101_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4101:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4102_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4102_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4102_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4102_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4102:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4103_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4103_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4103_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4103_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4103:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4104_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4104_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4104_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4104_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4104:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4201\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4201\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4201\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4201\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4201\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4202\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4202\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4202\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4202\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4202\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4203\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4203\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4203\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4203\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4203\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4204\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4204\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4204\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4204\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4204\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4205\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4205\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4206\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4206\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4301\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4301\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4301\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4301\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4301\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4302\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4302\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4302\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4302\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4302\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4303\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4303\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4303\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4303\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4303\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4304\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4304\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4304\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4304\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4304\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4305\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4305\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4305\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4305\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4305\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4306\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4306\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4306\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4306\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4306\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5203\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5203\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5203\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5203\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5203\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5204\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5204\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5204\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5204\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5204\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5205\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5205\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5205\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5205\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5205\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5206\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5206\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5206\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5206\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5206\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5303\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5303\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5303\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5303\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5303\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5304\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5304\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5304\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5304\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5304\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5305\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5305\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5305\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5305\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5305\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5306\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5306\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5306\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5306\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5306\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6201\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6201\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6201\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6201\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6201\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6202\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6202\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6202\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6202\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6202\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6203\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6203\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6203\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6203\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6203\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6204\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6204\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6204\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6204\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6204\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6301\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6301\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6301\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6301\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6301\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6302\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6302\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6302\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6302\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6302\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6303\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6303\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6303\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6303\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6303\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6304\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6304\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6304\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6304\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6304\\/8000-002:-:*:*:*:*:*:*:*" ]
null
8.2
null
null
GHSA-65jc-f2w3-r364
Gesior-AAC before 2019-05-01 allows ServiceCategoryID SQL injection in shop.php.
[]
null
null
9.8
null
GHSA-w4g5-v736-j48g
An out-of-bounds read issue was discovered in the HTTP/2 protocol decoder in HAProxy 1.8.x and 1.9.x through 1.9.0 which can result in a crash. The processing of the PRIORITY flag in a HEADERS frame requires 5 extra bytes, and while these bytes are skipped, the total frame length was not re-checked to make sure they were present in the frame.
[]
null
null
7.5
null
CVE-2019-18450
An issue was discovered in GitLab Community and Enterprise Edition before 12.4 in the Project labels feature. It has Insecure Permissions.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ]
null
4.3
null
4
RHSA-2005:410
Red Hat Security Advisory: gftp security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
CVE-2017-3531
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Servlet Runtime). Supported versions that are affected are 12.1.3.0, 12.2.1.0, 12.2.1.1 and 12.2.1.2. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. While the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle WebLogic Server. CVSS 3.0 Base Score 7.2 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L).
[ "cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:12.2.1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:12.2.1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:12.2.1.2.0:*:*:*:*:*:*:*" ]
null
null
7.2
6.4
GHSA-47xf-g9q2-hc3g
A buffer overflow vulnerability exists in the ArubaOS command line interface. Successful exploitation of this vulnerability results in a denial of service on the affected system.
[]
null
6.5
null
null
GHSA-v9mf-jgq3-c28h
Data Amplification in Play Framework
An issue was discovered in Play Framework 2.8.0 through 2.8.4. Carefully crafted JSON payloads sent as a form field lead to Data Amplification. This affects users migrating from a Play version prior to 2.8.0 that used the Play Java API to serialize classes with protected or private fields to JSON.
[]
null
2.7
null
null
CVE-2010-0112
Multiple SQL injection vulnerabilities in the Administrative Interface in the IIS extension in Symantec IM Manager before 8.4.16 allow remote attackers to execute arbitrary SQL commands via (1) the rdReport parameter to rdpageimlogic.aspx, related to the sGetDefinition function in rdServer.dll, and SQL statements contained within a certain report file; (2) unspecified parameters in a DetailReportGroup (aka DetailReportGroup.lgx) action to rdpageimlogic.aspx; the (3) selclause, (4) whereTrendTimeClause, (5) TrendTypeForReport, (6) whereProtocolClause, or (7) groupClause parameter in a SummaryReportGroup (aka SummaryReportGroup.lgx) action to rdpageimlogic.aspx; the (8) loginTimeStamp, (9) dbo, (10) dateDiffParam, or (11) whereClause parameter in a LoggedInUsers (aka LoggedInUSers.lgx) action to (a) rdpageimlogic.aspx or (b) rdPage.aspx; the (12) selclause, (13) whereTrendTimeClause, (14) TrendTypeForReport, (15) whereProtocolClause, or (16) groupClause parameter to rdpageimlogic.aspx; (17) the groupList parameter to IMAdminReportTrendFormRun.asp; or (18) the email parameter to IMAdminScheduleReport.asp.
[ "cpe:2.3:a:symantec:im_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:im_manager:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:im_manager:6.5:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:im_manager:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:im_manager:7.5:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:im_manager:8.3:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:im_manager:8.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:im_manager:8.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:im_manager:8.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:im_manager:8.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:im_manager:8.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:im_manager:8.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:im_manager:8.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:im_manager:8.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:im_manager:8.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:im_manager:8.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:im_manager:8.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:im_manager:8.4.13:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2008-3545
Unspecified vulnerability in ovtopmd in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to cause a denial of service via unknown vectors, a different vulnerability than CVE-2008-3536, CVE-2008-3537, and CVE-2008-3544. NOTE: due to insufficient details from the vendor, it is not clear whether this is the same as CVE-2008-1853.
[ "cpe:2.3:a:hp:openview_network_node_manager:7.01:*:*:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.53:*:*:*:*:*:*:*" ]
null
null
null
7.8
GHSA-64f8-99rg-qfh2
Multiple cross-site scripting (XSS) vulnerabilities in the administrative backend in MyBB (aka MyBulletinBoard) before 1.8.4 allow remote authenticated users to inject arbitrary web script or HTML via the (1) MIME-type field in an add action in the config-attachment_types module to admin/index.php; (2) title or (3) short description field in an add action in the (a) config-mycode or (b) user-groups module to admin/index.php; (4) title field in an add action in the (c) forum-management or (d) tool-tasks module to admin/index.php; (5) name field in an add_set action in the style-templates module to admin/index.php; (6) title field in an add_template_group action in the style-templates module to admin/index.php; (7) name field in an add action in the config-post_icons module to admin/index.php; (8) "title to assign" field in an add action in the user-titles module to admin/index.php; or (9) username field in the config-banning module to admin/index.php.
[]
null
null
null
null
GHSA-m4mc-3422-gjpv
Missing Authorization vulnerability in XSERVER Inc. TypeSquare Webfonts allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects TypeSquare Webfonts: from n/a through 2.0.7.
[]
null
5.3
null
null
GHSA-q99j-qx5r-8mf7
SeaCMS v13.3 was discovered to contain a remote code execution (RCE) vulnerability via the component admin_files.php.
[]
null
5.1
null
null
GHSA-vrgq-j293-jcx7
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WP Travel Engine.This issue affects WP Travel Engine: from n/a through 5.7.9.
[]
null
7.6
null
null
GHSA-6mww-crx3-87xv
The WP Hotel Booking plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.10.1. This is due to missing or incorrect nonce validation on the admin_add_order_item() function. This makes it possible for unauthenticated attackers to add an order item via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
4.3
null
null
CVE-2020-7579
A vulnerability has been identified in Spectrum Power™ 5 (All versions < v5.50 HF02). The web server could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into accessing a malicious link. User interaction is required for a successful exploitation. If deployed according to recommended system configuration, Siemens consideres the environmental vector as CR:L/IR:M/AR:H/MAV:A (4.1).
[ "cpe:2.3:a:siemens:spectrum_power_5:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:spectrum_power_5:5.50:hf01:*:*:*:*:*:*" ]
null
6.1
null
4.3
CVE-2008-1243
Cross-site scripting (XSS) vulnerability on the Linksys WRT300N router with firmware 2.00.20, when Mozilla Firefox or Apple Safari is used, allows remote attackers to inject arbitrary web script or HTML via the dyndns_domain parameter to the default URI.
[ "cpe:2.3:h:linksys:wrt300n:*:*:2.00.20:*:*:*:*:*" ]
null
null
null
4.3
GHSA-2v24-jcvm-2w9j
In LLVM, there is a possible ineffective stack cookie placement due to stack frame double reservation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-139666480
[]
null
null
null
null
CVE-2024-38697
WordPress Goftino plugin <= 1.6 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ali Rahimi Goftino allows Stored XSS.This issue affects Goftino: from n/a through 1.6.
[]
null
6.5
null
null
GHSA-v4qv-9qrx-24c7
SQL injection in the getip function in conn/function.php in ??100-???????? 1.1 allows remote attackers to inject arbitrary SQL commands via the X-Forwarded-For header to admin/product_add.php.
[]
null
7.2
null
null
CVE-2023-21956
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Container). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*" ]
null
6.1
null
null
GHSA-xj4v-gp4q-h6qq
qcubed reflected cross-site scripting (XSS) vulnerability
A reflected cross-site scripting (XSS) vulnerability in qcubed (all versions including 3.1.1) in profile.php via the stQuery-parameter allows unauthenticated attackers to steal sessions of authenticated users.
[]
null
6.1
null
null
GHSA-2g58-2x39-qh45
OFCMS V1.1.2 is vulnerable to SQL Injection via the new table function.
[]
null
9.8
null
null
GHSA-q2mx-gpjf-3h8x
1Panel vulnerable to command injection when adding container repositories
ImpactThe authenticated attacker can craft a malicious payload to achieve command injection when adding container repositories.Vulnerability analysis.![image](https://user-images.githubusercontent.com/46734380/249118560-8c20dac6-d1be-49d2-b2b2-9a4df9b7cd04.png)![image](https://user-images.githubusercontent.com/46734380/249118639-37b7a1e9-08a9-4316-8beb-39beefdceb33.png)vulnerability reproduction.Using update can be triggered multiple times.Affected versions: <= 1.3.5PatchesThe vulnerability has been fixed in v1.3.6.WorkaroundsIt is recommended to upgrade the version to v1.3.6.ReferencesIf you have any questions or comments about this advisory:Open an issue in https://github.com/1Panel-dev/1Panel Email us at [email protected]
[]
null
6.3
null
null
CVE-2021-20322
A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:solidfire\\,_enterprise_sds_\\&_hci_storage_node:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:fas_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:fas_baseboard_management_controller:8300:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:fas_baseboard_management_controller:8700:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:aff_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:aff_baseboard_management_controller:a400:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:aff_a700s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:aff_a700s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:hci_compute_node_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.2.0:*:*:*:*:*:*:*" ]
null
7.4
null
5.8
RHSA-2022:0553
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.3 R20 security and bug fix update
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer
[ "cpe:/a:redhat:jboss_amq:6.3" ]
null
8.8
null
null
GHSA-66rx-339r-mm8j
CRMEB 4.4.4 is vulnerable to Any File download.
[]
null
7.5
null
null
GHSA-m3mq-x6x3-4537
A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can cause memory to be lost when allocating data to handle specific optional TLVs, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
[]
null
7.5
null
null
ICSA-23-012-06
Johnson Controls Metasys
Under certain circumstances, the affected versions of Johnson Controls Metasys ADS/ADX/OAS Servers could expose plaintext credentials through application programmable interface (API) calls.-CVE-2021-36204 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
[]
null
null
7.8
null
GHSA-x4qp-j8r7-f2wx
A vulnerability classified as critical was found in linlinjava litemall up to 1.8.0. Affected by this vulnerability is an unknown functionality of the file AdminGoodscontroller.java. The manipulation of the argument goodsId/goodsSn/name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-270235.
[]
5.3
6.3
null
null
PYSEC-2008-14
null
Multiple cross-site request forgery (CSRF) vulnerabilities in Plone CMS 3.0.5 and 3.0.6 allow remote attackers to (1) add arbitrary accounts via the join_form page and (2) change the privileges of arbitrary groups via the prefs_groups_overview page.
[]
null
null
null
null
GHSA-2jqv-6gjj-98r2
Windows Telephony Service Remote Code Execution Vulnerability
[]
null
8.8
null
null
RHSA-2019:1502
Red Hat Security Advisory: systemd security and bug fix update
systemd: Insufficient input validation in bus_process_object() resulting in PID 1 crash
[ "cpe:/o:redhat:rhel_eus:7.4::computenode", "cpe:/o:redhat:rhel_eus:7.4::server" ]
null
null
7
null
CVE-2018-10139
The PAN-OS response for GlobalProtect Gateway in Palo Alto Networks PAN-OS 6.1.21 and earlier, PAN-OS 7.1.18 and earlier, PAN-OS 8.0.11 and earlier may allow an unauthenticated attacker to inject arbitrary JavaScript or HTML. PAN-OS 8.1 is NOT affected.
[ "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
GHSA-f4w6-wh8p-6rgp
Directory Traversal vulnerability in Webport CMS 1.19.10.17121 via the file parameter to file/download.
[]
null
null
null
null
CVE-2019-0858
A spoofing vulnerability exists in Microsoft Exchange Server when Outlook Web Access (OWA) fails to properly handle web requests, aka 'Microsoft Exchange Spoofing Vulnerability'. This CVE ID is unique from CVE-2019-0817.
[ "cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_22:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_11:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_12:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2019:-:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_1:*:*:*:*:*:*" ]
null
6.1
null
4.3
CVE-2022-0121
Cross-site Scripting in hoppscotch/hoppscotch
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in hoppscotch hoppscotch/hoppscotch.This issue affects hoppscotch/hoppscotch before 2.1.1.
[ "cpe:2.3:a:hoppscotch:hoppscotch:*:*:*:*:*:*:*:*" ]
null
8
null
null
GHSA-mhx3-6rjm-4cmc
In Joomla Component GMapFP Version J3.5 and J3.5free, an attacker can access the upload function without authenticating to the application and can also upload files which due to issues of unrestricted file uploads which can be bypassed by changing the content-type and name file too double extensions.
[]
null
null
null
null
CVE-2014-100025
Cross-site request forgery (CSRF) vulnerability in index.php/user_data/insert_user in Savsoft Quiz allows remote attackers to hijack the authentication of administrators for requests that create an administrator account via a crafted request.
[ "cpe:2.3:a:savsoft_technologies:savsoft_quiz:-:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-m2jr-hqxr-7x3f
In the Linux kernel, the following vulnerability has been resolved:nouveau/dmem: handle kcalloc() allocation failureThe kcalloc() in nouveau_dmem_evict_chunk() will return null if the physical memory has run out. As a result, if we dereference src_pfns, dst_pfns or dma_addrs, the null pointer dereference bugs will happen.Moreover, the GPU is going away. If the kcalloc() fails, we could not evict all pages mapping a chunk. So this patch adds a __GFP_NOFAIL flag in kcalloc().Finally, as there is no need to have physically contiguous memory, this patch switches kcalloc() to kvcalloc() in order to avoid failing allocations.
[]
null
null
null
null
CVE-2020-2883
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
[ "cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*" ]
null
null
9.8
null
GHSA-jvrx-2595-gvqf
Lead Management System v1.0 is vulnerable to SQL Injection via the customer_id parameter in ajax_represent.php.
[]
null
9.8
null
null
CVE-2025-31762
WordPress Sheet2Site plugin <= 1.0.18 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in andreyazimov Sheet2Site allows Stored XSS. This issue affects Sheet2Site: from n/a through 1.0.18.
[]
null
6.5
null
null
CVE-2024-8164
Chengdu Everbrite Network Technology BeikeShop FileManagerController.php rename unrestricted upload
A vulnerability, which was classified as critical, has been found in Chengdu Everbrite Network Technology BeikeShop up to 1.5.5. Affected by this issue is the function rename of the file /Admin/Http/Controllers/FileManagerController.php. The manipulation of the argument new_name leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:beikeshop:chengdu_everbrite_network_technology:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:beikeshop:beikeshop:*:*:*:*:*:*:*:*" ]
5.3
6.3
6.3
6.5
GHSA-8j7c-jhc4-6fcv
Symantec Altiris Deployment Solution before 6.9.164 stores the Deployment Solution Agent (aka AClient) password in cleartext in memory, which allows local users to obtain sensitive information by dumping the AClient.exe process memory.
[]
null
null
null
null
GHSA-wfjp-4mpm-mr6x
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Anurag Deshmukh CPT Shortcode Generator plugin <= 1.0 versions.
[]
null
5.9
null
null