id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
57.2k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2019-8605 | A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1. A malicious application may be able to execute arbitrary code with system privileges. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 9.3 |
|
CVE-2023-38379 | The web interface on the RIGOL MSO5000 digital oscilloscope with firmware 00.01.03.00.03 allows remote attackers to change the admin password via a zero-length pass0 to the webcontrol changepwd.cgi application, i.e., the entered password only needs to match the first zero characters of the saved password. | [
"cpe:2.3:h:rigol:mso5000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:rigol:mso5000_firmware:00.01.03.00.03:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-pf5g-348r-59jm | A vulnerability in the web-based GUI of Cisco Integrated Management Controller (IMC) 3.0(1c) could allow an authenticated, remote attacker to perform a cross-site scripting (XSS) attack. The vulnerability is due to insufficient validation of user-supplied input by the affected software. An attacker could exploit this vulnerability by persuading an authenticated user of the web-based GUI on an affected system to follow a malicious link. A successful exploit could allow the attacker to execute arbitrary code in the context of the web-based GUI on the affected system. Cisco Bug IDs: CSCvd14587. | [] | null | null | 5.4 | null |
|
GHSA-9gwg-cvv6-vjxh | In versions 4.18 and earlier of the Eclipse Platform, the Help Subsystem does not authenticate active help requests to the local help web server, allowing an unauthenticated local attacker to issue active help commands to the associated Eclipse Platform process or Eclipse Rich Client Platform process. | [] | null | null | null | null |
|
CVE-2023-35848 | VirtualSquare picoTCP (aka PicoTCP-NG) through 2.1 lacks certain size calculations before attempting to set a value of an mss structure member. | [
"cpe:2.3:a:virtualsquare:picotcp:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2024-30552 | WordPress Responsive flipbook plugin <= 1.0.0 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wppdf.Org Responsive flipbook allows Stored XSS.This issue affects Responsive flipbook: from n/a through 1.0.0.
| [] | null | 6.5 | null | null |
RHSA-2024:0951 | Red Hat Security Advisory: postgresql security update | postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 8 | null | null |
CVE-2022-34608 | H3C Magic R200 R200V200R004L02 was discovered to contain a stack overflow via the ajaxmsg parameter at /AJAX/ajaxget. | [
"cpe:2.3:o:h3c:magic_r200_firmware:r200v200r004l02:*:*:*:*:*:*:*",
"cpe:2.3:h:h3c:magic_r200:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2024-42150 | net: txgbe: remove separate irq request for MSI and INTx | In the Linux kernel, the following vulnerability has been resolved:
net: txgbe: remove separate irq request for MSI and INTx
When using MSI or INTx interrupts, request_irq() for pdev->irq will
conflict with request_threaded_irq() for txgbe->misc.irq, to cause
system crash. So remove txgbe_request_irq() for MSI/INTx case, and
rename txgbe_request_msix_irqs() since it only request for queue irqs.
Add wx->misc_irq_domain to determine whether the driver creates an IRQ
domain and threaded request the IRQs. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-363q-54cj-prgf | Pacemaker before 1.1.6 configure script creates temporary files insecurely | [] | null | 5.5 | null | null |
|
CVE-2021-46149 | An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. A denial of service (resource consumption) can be accomplished by searching for a very long key in a Language Name Search. | [
"cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-fgjp-x7x2-6wf6 | Cross-site request forgery (CSRF) vulnerability on Cisco TelePresence Serial Gateway devices with software 1.0(1.42) allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuu90728. | [] | null | null | null | null |
|
GHSA-qj6m-6wr4-jg9x | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Howard Ehrenberg Custom Post Carousels with Owl allows Stored XSS.This issue affects Custom Post Carousels with Owl: from n/a through 1.4.6. | [] | null | 6.5 | null | null |
|
GHSA-r7fj-4mq2-8v24 | All versions up to BD_R218V2.4 of ZTE MF920 product are impacted by information leak vulnerability. Due to some interfaces can obtain the WebUI login password without login, an attacker can exploit the vulnerability to obtain sensitive information about the affected components. | [] | null | 7.5 | null | null |
|
GHSA-rj5f-vm79-5j84 | OctoPrint vulnerable to Special Element Injection | OctoPrint prior to 1.8.3 is vulnerable to Special Element Injection. | [] | 6.1 | null | 6 | null |
GHSA-42r5-3wrh-vr57 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Antoine Hurkmans Football Pool allows Stored XSS.This issue affects Football Pool: from n/a through 2.11.9. | [] | null | 6.5 | null | null |
|
GHSA-xpf3-7cmq-j53r | An issue was discovered on Epson WorkForce WF-2861 10.48 LQ22I3, 10.51.LQ20I6 and 10.52.LQ17IA devices. On the 'Air Print Setting' web page, if the data for 'Bonjour Service Location' at /PRESENTATION/BONJOUR is more than 251 bytes when sending data for Air Print Setting, then the device no longer functions until a reboot. | [] | null | null | 7.5 | null |
|
CVE-2015-6946 | Multiple stack-based buffer overflows in the Reprise License Manager service in Borland AccuRev allow remote attackers to execute arbitrary code via the (1) akey or (2) actserver parameter to the activate_doit function or (3) licfile parameter to the service_startup_doit functionality. | [
"cpe:2.3:a:microfocus:accurev:-:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-wrgm-p49w-3hh3 | ASUSTek ZenBook Pro Due 15 UX582 laptop firmware through 203 has Insecure Permissions that allow attacks by a physically proximate attacker. | [] | null | null | null | null |
|
GHSA-c7v4-r383-g2wj | In the Linux kernel, the following vulnerability has been resolved:drm/xe/oa: Fix "Missing outer runtime PM protection" warningFix the following drm_WARN:[953.586396] xe 0000:00:02.0: [drm] Missing outer runtime PM protection
...
<4> [953.587090] ? xe_pm_runtime_get_noresume+0x8d/0xa0 [xe]
<4> [953.587208] guc_exec_queue_add_msg+0x28/0x130 [xe]
<4> [953.587319] guc_exec_queue_fini+0x3a/0x40 [xe]
<4> [953.587425] xe_exec_queue_destroy+0xb3/0xf0 [xe]
<4> [953.587515] xe_oa_release+0x9c/0xc0 [xe](cherry picked from commit b107c63d2953907908fd0cafb0e543b3c3167b75) | [] | null | 5.5 | null | null |
|
GHSA-cfm9-vqrr-p3x8 | A vulnerability, which was classified as critical, has been found in Softwin WMX3 3.1. This issue affects the function ImageAdd of the file /ImageAdd.ashx. The manipulation of the argument File leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] | 5.3 | 6.3 | null | null |
|
GHSA-93gw-3vmv-ggm8 | Unspecified vulnerability in the PeopleSoft Enterprise Campus Solutions component in Oracle PeopleSoft and JDEdwards Suite Campus Solutions 9.0 Bundle #17 allows remote authenticated users to affect confidentiality via unknown vectors. | [] | null | null | null | null |
|
CVE-2020-14962 | Multiple XSS vulnerabilities in the Final Tiles Gallery plugin before 3.4.19 for WordPress allow remote attackers to inject arbitrary web script or HTML via the Title (aka imageTitle) or Caption (aka description) field of an image to wp-admin/admin-ajax.php. | [
"cpe:2.3:a:machothemes:image_photo_gallery_final_tiles_grid:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | 3.5 |
|
CVE-2006-6334 | Heap-based buffer overflow in the SendChannelData function in wfica.ocx in Citrix Presentation Server Client before 9.230 for Windows allows remote malicious web sites to execute arbitrary code via a DataSize parameter that is less than the length of the Data buffer. | [
"cpe:2.3:a:citrix:presentation_server_client:*:*:windows:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-qfv9-4gwp-p4m6 | The CGI modules in the server in Trend Micro OfficeScan 8.0 SP1 before build 2439 and 8.0 SP1 Patch 1 before build 3087 allow remote attackers to cause a denial of service (NULL pointer dereference and child process crash) via crafted HTTP headers, related to the "error handling mechanism." | [] | null | null | null | null |
|
CVE-2005-0537 | Multiple SQL injection vulnerabilities in page.php for iGeneric (iG) Shop 1.2 may allow remote attackers to execute arbitrary SQL statements via the (1) cats, (2) l_price, or (3) u_price parameters. | [
"cpe:2.3:a:igeneric:free_shopping_cart:1.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-c83f-hh9v-g4f8 | A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'. This CVE ID is unique from CVE-2019-0831. | [] | null | null | 5.4 | null |
|
CVE-2022-38231 | XPDF commit ffaf11c was discovered to contain a heap-buffer overflow via DCTStream::getChar() at /xpdf/Stream.cc. | [
"cpe:2.3:a:xpdf_project:xpdf:3.04:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-cmw6-v57x-fm5v | A vulnerability in the web UI of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to inject arbitrary code and execute arbitrary commands at the underlying operating system level. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to inject and execute arbitrary commands at the underlying operating system level. | [] | null | null | null | null |
|
GHSA-96fq-wh7q-8hhv | core/email_api.php in MantisBT before 1.2.12 does not properly manage the sending of e-mail notifications about restricted bugs, which might allow remote authenticated users to obtain sensitive information by adding a note to a bug before losing permission to view that bug. | [] | null | null | null | null |
|
CVE-2016-7867 | Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable buffer overflow / underflow vulnerability in the RegExp class related to bookmarking in searches. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-vg6r-6h68-4g26 | Sourcecodester Faculty Evaluation System v1.0 is vulnerable to arbitrary code execution via ip/eval/ajax.php?action=update_user. | [] | null | 7.2 | null | null |
|
CVE-2006-1112 | Aztek Forum 4.0 allows remote attackers to obtain sensitive information via a long login value in a register form, which displays the installation path in a MySQL error message. | [
"cpe:2.3:a:aztek_forum:aztek_forum:4.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-6c6r-7283-r9ph | An issue was discovered in Smiths-Medical CADD-Solis Medication Safety Software, Version 1.0; 2.0; 3.0; and 3.1. The affected software does not verify the identities at communication endpoints, which may allow a man-in-the-middle attacker to gain access to the communication channel between endpoints. | [] | null | null | 8.5 | null |
|
GHSA-mjmf-7wjw-f5xx | Jenkins Code Dx Plugin missing permission checks | Jenkins Code Dx Plugin 3.1.0 and earlier does not perform permission checks in several HTTP endpoints.This allows attackers with Overall/Read permission to connect to an attacker-specified URL.Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.Code Dx Plugin 4.0.0 requires POST requests and the appropriate permissions for the affected HTTP endpoints. | [] | null | 4.3 | null | null |
GHSA-xfrr-5gq4-4j32 | The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the mailchimp_api_key_manage function in all versions up to, and including, 2.0.10. This makes it possible for authenticated attackers, with Contributor-level access and above, to set the MailChimp API key. | [] | null | 4.3 | null | null |
|
GHSA-6732-rrr9-72hv | In ih264d_parse_ave of ih264d_sei.c, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-152895390 | [] | null | null | null | null |
|
CVE-2001-1101 | The Log Viewer function in the Check Point FireWall-1 GUI for Solaris 3.0b through 4.1 SP2 does not check for the existence of '.log' files when saving files, which allows (1) remote authenticated users to overwrite arbitrary files ending in '.log', or (2) local users to overwrite arbitrary files via a symlink attack. | [
"cpe:2.3:a:checkpoint:firewall-1:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:firewall-1:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:firewall-1:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:firewall-1:4.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:firewall-1:4.1:sp2:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
GHSA-rj6h-jm72-xm2v | A remote code injection vulnerability was discovered in HPE KVM IP Console Switches version(s): G2 4x1Ex32 Prior to 2.8.3. | [] | null | null | null | null |
|
CVE-2007-0242 | The UTF-8 decoder in codecs/qutfcodec.cpp in Qt 3.3.8 and 4.2.3 does not reject long UTF-8 sequences as required by the standard, which allows remote attackers to conduct cross-site scripting (XSS) and directory traversal attacks via long sequences that decode to dangerous metacharacters. | [
"cpe:2.3:a:qt:qt:3.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:4.2.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2022-28622 | A potential security vulnerability has been identified in HPE StoreOnce Software. The SSH server supports weak key exchange algorithms which could lead to remote unauthorized access. HPE has made the following software update to resolve the vulnerability in HPE StoreOnce Software 4.3.2. | [
"cpe:2.3:o:hpe:storeonce_3640_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:storeonce_3640:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2020-16273 | In Arm software implementing the Armv8-M processors (all versions), the stack selection mechanism could be influenced by a stack-underflow attack in v8-M TrustZone based processors. An attacker can cause a change to the stack pointer used by the Secure World from a non-secure application if the stack is not initialized. This vulnerability affects only the software that is based on Armv8-M processors with the Security Extension. | [
"cpe:2.3:o:arm:armv8-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arm:armv8-m:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
GHSA-7jmh-j86x-rh3q | Buffer overflow due to improper validation of buffer size while IPA driver processing to perform read operation in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9607, MDM9650, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24 | [] | null | 7.8 | null | null |
|
GHSA-rvc8-582x-4cgg | NETGEAR R7800 devices before 1.0.2.60 are affected by command injection by an authenticated user. | [] | null | null | null | null |
|
CVE-2010-4740 | Stack-based buffer overflow in WTclient.dll in SCADA Engine BACnet OPC Client before 1.0.25 allows user-assisted remote attackers to execute arbitrary code via a crafted .csv file, related to a status log message. | [
"cpe:2.3:a:scadaengine:bacnet_opc_client:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
RHSA-2020:4946 | Red Hat Security Advisory: libX11 security update | libX11: integer overflow leads to double free in locale handling | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 7.8 | null | null |
GHSA-m5mh-rmcg-x9pm | Missing Authorization vulnerability in Prasad Kirpekar WP Meta and Date Remover allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Meta and Date Remover: from n/a through 2.3.0. | [] | null | 5.4 | null | null |
|
CVE-2015-0644 | AppNav in Cisco IOS XE 3.8 through 3.10 before 3.10.3S, 3.11 before 3.11.3S, 3.12 before 3.12.1S, 3.13 before 3.13.0S, 3.14 before 3.14.0S, and 3.15 before 3.15.0S allows remote attackers to execute arbitrary code or cause a denial of service (device reload) via a crafted TCP packet, aka Bug ID CSCuo53622. | [
"cpe:2.3:o:cisco:ios_xe:3.8s.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8s.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8s.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8s_base:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9s.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9s.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9s.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10s.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10s.0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10s.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10s.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11s.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11s.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11s.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12s.0:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
GHSA-6h2m-2j87-hjv5 | The driver_override implementation in drivers/base/platform.c in the Linux kernel before 4.12.1 allows local users to gain privileges by leveraging a race condition between a read operation and a store operation that involve different overrides. | [] | null | null | 7 | null |
|
GHSA-qgqr-xgpp-pcg3 | Unspecified vulnerability in Opera before 9.60 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a redirect that specifies a crafted URL. | [] | null | null | null | null |
|
CVE-2024-13315 | Shopwarden – Automated WooCommerce monitoring & testing <= 1.0.11 - Cross-Site Request Forgery to Arbitrary Options Update | The Shopwarden – Automated WooCommerce monitoring & testing plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.11. This is due to missing or incorrect nonce validation on the save_setting() function. This makes it possible for unauthenticated attackers to update arbitrary options and achieve privilege escalation via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] | null | 8.8 | null | null |
GHSA-54h3-2qjf-7vmr | Insufficient input validation in installer in Intel Rapid Store Technology (RST) before version 16.7 may allow an unprivileged user to potentially elevate privileges or cause an installer denial of service via local access. | [] | null | 7.8 | null | null |
|
GHSA-r44v-cp4f-j8gv | The Spaces OG submodule in the Spaces module 6.x-3.x before 6.x-3.7 for Drupal does not properly delete organic group group spaces content when using the option to move to a new group, which causes the content to be "orphaned" and allows remote authenticated users with the "access content" permission to obtain sensitive information via vectors involving a rebuild access for the site or content. | [] | null | null | null | null |
|
GHSA-w6fq-mgc2-38mc | Buffer overflow in the XnsSdkDeviceIpInstaller.ocx ActiveX control in Samsung iPOLiS Device Manager 1.12.2 allows remote attackers to execute arbitrary code via a long string in the first argument to the (1) ReadConfigValue or (2) WriteConfigValue function. | [] | null | null | null | null |
|
CVE-2019-8459 | Check Point Endpoint Security Client for Windows, with the VPN blade, before version E80.83, starts a process without using quotes in the path. This can cause loading of a previously placed executable with a name similar to the parts of the path, instead of the intended one. | [
"cpe:2.3:a:checkpoint:jumbo_hotfix_for_endpoint_security_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:endpoint_security_server_package:*:*:*:*:gaia:*:*:*",
"cpe:2.3:a:checkpoint:smartconsole_for_endpoint_security_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:smartconsole_for_endpoint_security_server:e80.83:*:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:endpoint_security_clients:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:checkpoint:remote_access_clients:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:checkpoint:capsule_docs_standalone_client:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-96rr-jvj7-x24m | drivers/hid/hid-cp2112.c in the Linux kernel 4.9.x before 4.9.9 uses a spinlock without considering that sleeping is possible in a USB HID request callback, which allows local users to cause a denial of service (deadlock) via unspecified vectors. | [] | null | null | 5.5 | null |
|
GHSA-j2pq-xrmc-f4r4 | On Schneider Electric ConneXium Tofino Firewall TCSEFEA23F3F22 before 03.23, TCSEFEA23F3F20/21, and Belden Tofino Xenon Security Appliance, an arbitrary firmware image can be loaded because firmware signature verification (for a USB stick) can be bypassed. NOTE: this issue exists because of an incomplete fix of CVE-2017-11400. | [] | null | 6.8 | null | null |
|
GHSA-6w67-9j44-fxm4 | The Languages selection in the admin interface in Kailash Nadh boastMachine (formerly bMachine) 3.1 and earlier allows remote authenticated administrators to upload files with arbitrary extensions to the bmc/Inc/Lang directory. NOTE: because the uploaded files cannot be accessed through HTTP, this issue is a vulnerability only if there is a likely usage pattern in which the files would be opened or executed by local users, e.g., malware files with names that entice local users to open the files. | [] | null | null | null | null |
|
CVE-2021-23271 | TIBCO EBX Cross Site Scripting (XSS) | The TIBCO EBX Web Server component of TIBCO Software Inc.'s TIBCO EBX contains a vulnerability that theoretically allows a low privileged attacker with network access to execute a Stored Cross Site Scripting (XSS) attack on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO EBX: versions 5.9.12 and below. | [
"cpe:2.3:a:tibco:ebx:*:*:*:*:*:*:*:*"
] | null | 8 | null | null |
CVE-2024-56602 | net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() | In the Linux kernel, the following vulnerability has been resolved:
net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()
sock_init_data() attaches the allocated sk object to the provided sock
object. If ieee802154_create() fails later, the allocated sk object is
freed, but the dangling pointer remains in the provided sock object, which
may allow use-after-free.
Clear the sk pointer in the sock object on error. | [] | null | 7.8 | null | null |
GHSA-f594-ww3c-wm8g | Unspecified vulnerability in the Oracle Field Service component in Oracle E-Business Suite 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, and 12.2.5 allows remote attackers to affect integrity via unknown vectors related to Field Service Map. | [] | null | null | null | null |
|
GHSA-qwx7-fp8p-2j3c | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts). | [] | null | null | 6.5 | null |
|
GHSA-4vg9-ppq4-4286 | Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name. | [] | null | null | 6.5 | null |
|
CVE-2021-32285 | An issue was discovered in gravity through 0.8.1. A NULL pointer dereference exists in the function list_iterator_next() located in gravity_core.c. It allows an attacker to cause Denial of Service. | [
"cpe:2.3:a:creolabs:gravity:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
GHSA-pw59-xgg6-xjqh | In mgm_alloc_page of memory_group_manager.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-201677538References: N/A | [] | null | null | null | null |
|
CVE-2018-21100 | NETGEAR R7800 devices before 1.0.2.60 are affected by command injection by an authenticated user. | [
"cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*"
] | null | null | 7.6 | null |
|
RHSA-2013:0565 | Red Hat Security Advisory: Red Hat Enterprise MRG Grid 2.3 security update | condor: DoS when removing jobs via jobcontrol.py when job id is in square brackets | [
"cpe:/a:redhat:enterprise_mrg:2:computenode:el6",
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
CVE-2018-18943 | An issue was discovered in baserCMS before 4.1.4. In the Register New Category feature of the Upload menu, the category name can be used for XSS via the data[UploaderCategory][name] parameter to an admin/uploader/uploader_categories/edit URI. | [
"cpe:2.3:a:basercms:basercms:*:*:*:*:*:*:*:*"
] | null | null | 4.8 | 3.5 |
|
CVE-2024-7987 | Rockwell Automation ThinManager® ThinServer™ Information Disclosure and Remote Code Execution Vulnerabilities | A remote code execution vulnerability exists in the Rockwell Automation ThinManager® ThinServer™
that allows a threat actor to execute arbitrary code with System privileges. To exploit this vulnerability and a threat actor must abuse the ThinServer™ service by creating a junction and use it to upload arbitrary files. | [
"cpe:2.3:a:rockwellautomation:thinmanager_thinserver:*:*:*:*:*:*:*:*"
] | 8.5 | null | null | null |
GHSA-5hp5-786f-7wc8 | Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution. | [] | null | null | null | null |
|
GHSA-jjrx-x5mm-p728 | The "Buy Me a Coffee – Button and Widget Plugin" plugin for WordPress is vulnerable to unauthorized modification of data due to missing capability checks on the recieve_post, bmc_disconnect, name_post, and widget_post functions in versions up to, and including, 3.7. This makes it possible for authenticated attackers, with minimal permissions such as subscribers, to update the plugins settings. CVE-2023-25030 may be a duplicate of this issue. | [] | null | 7.3 | null | null |
|
GHSA-7c4r-p7c4-2rmg | A vulnerability classified as critical has been found in Totolink N200RE 9.3.5u.6139_B20201216. Affected is the function main of the file /cgi-bin/cstecgi.cgi. The manipulation leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-252270 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | null | 7.2 | null | null |
|
CVE-2023-49178 | WordPress HDW Player Plugin (Video Player & Video Gallery) Plugin <= 5.0 is vulnerable to Cross Site Scripting (XSS) | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mr. Hdwplayer HDW Player Plugin (Video Player & Video Gallery) allows Reflected XSS.This issue affects HDW Player Plugin (Video Player & Video Gallery): from n/a through 5.0.
| [
"cpe:2.3:a:hdwplayer:hdw_player:*:*:*:*:*:wordpress:*:*"
] | null | 7.1 | null | null |
CVE-2008-3876 | Apple iPhone 2.0.2, in some configurations, allows physically proximate attackers to bypass intended access restrictions, and obtain sensitive information or make arbitrary use of the device, via an Emergency Call tap and a Home double-tap, followed by a tap of any contact's blue arrow. | [
"cpe:2.3:h:apple:iphone:2.0.2:*:*:*:*:*:*:*"
] | null | null | null | 1.9 |
|
CVE-2013-2936 | Unspecified vulnerability in Citrix CloudPortal Services Manager (aka Cortex) 10.0 before Cumulative Update 3 has unknown impact and attack vectors, a different vulnerability than other CVEs listed in CTX137162. | [
"cpe:2.3:a:citrix:cloudportal_services_manager:*:cu2:*:*:*:*:*:*",
"cpe:2.3:a:citrix:cloudportal_services_manager:10.0:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2022-33918 | Dell GeoDrive, Versions 2.1 - 2.2, contains an information disclosure vulnerability. An authenticated non-admin user could potentially exploit this vulnerability and gain access to sensitive information. | [
"cpe:2.3:a:dell:geodrive:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
RHSA-2004:075 | Red Hat Security Advisory: : Updated kdelibs packages resolve cookie security issue | security flaw | [
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
GHSA-7775-rc33-q3fr | epan/dissectors/packet-rlc in the RLC dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 uses inconsistent memory-management approaches, which allows remote attackers to cause a denial of service (use-after-free error and application crash) via a crafted UMTS Radio Link Control packet. | [] | null | null | null | null |
|
PYSEC-2021-395 | null | TensorFlow is an open source platform for machine learning. In affected versions while calculating the size of the output within the `tf.range` kernel, there is a conditional statement of type `int64 = condition ? int64 : double`. Due to C++ implicit conversion rules, both branches of the condition will be cast to `double` and the result would be truncated before the assignment. This result in overflows. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | [] | null | null | null | null |
GHSA-mhcj-cw4f-9792 | The Hidden Object - Alice Free (aka air.com.differencegames.hovisionsofalicefree) application 1.0.17 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
GHSA-wpg3-r2mr-mv9m | Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-24490, CVE-2022-26783, CVE-2022-26785. | [] | null | 8.1 | null | null |
|
GHSA-7r43-v6hm-qrjh | An insecure password reset issue discovered in MEGAFEIS, BOFEI DBD+ Application for IOS & Android v1.4.4 service via insecure expiry mechanism. | [] | null | 9.8 | null | null |
|
GHSA-c6rg-3w94-c827 | An issue was discovered in libjpeg 9a. The get_text_rgb_row function in rdppm.c allows remote attackers to cause a denial of service (Segmentation fault) via a crafted file. | [] | null | null | 6.5 | null |
|
CVE-2025-2230 | Philips Intellispace Cardiovascular (ISCV) Improper Authentication | A flaw exists in the Windows login flow where an AuthContext token can
be exploited for replay attacks and authentication bypass. | [] | 8.5 | 7.7 | null | null |
CVE-2017-14692 | STDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to a "User Mode Write AV starting at STDUJBIG2File!DllGetClassObject+0x000000000000653b." | [
"cpe:2.3:a:stdutility:stdu_viewer:1.6.375:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 |
|
RHSA-2021:3447 | Red Hat Security Advisory: kernel security and bug fix update | kernel: powerpc: KVM guest OS users can cause host OS memory corruption kernel: slab-out-of-bounds access in xdr_set_page_base() in net/sunrpc/xdr.c | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
GHSA-9f9f-mcqm-2v26 | Multiple unspecified vulnerabilities in Oracle Database 8.1.7.4, 9.0.1.5, 9.2.0.7, 10.1.0.5, and 10.2.0.2 have unknown impact and attack vectors, aka Oracle Vuln# (1) DB06 in Export; (2) DB08, (3) DB09, (4) DB10, (5) DB11, (6) DB12, (7) DB13, (8) DB14, and (9) DBC01 for OCI; (10) DB16 for Query Rewrite/Summary Mgmt; (11) DB17, (12) DB18, (13) DB19, (14) DBC02, (15) DBC03, and (16) DBC04 for RPC; and (17) DB20 for Semantic Analysis. NOTE: as of 20060719, Oracle has not disputed third party claims that DB06 is related to "SQL injection" using DBMS_EXPORT_EXTENSION with a modified ODCIIndexGetMetadata routine and a call to GET_DOMAIN_INDEX_METADATA, in which case DB06 might be CVE-2006-2081. | [] | null | null | null | null |
|
GHSA-xpfq-7j72-x4px | Crypt::CBC versions between 1.21 and 3.04 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.This issue affects operating systems where "/dev/urandom'" is unavailable. In that case, Crypt::CBC will fallback to use the insecure rand() function. | [] | null | 4 | null | null |
|
CVE-2010-0558 | The default configuration of Oracle OpenSolaris snv_77 through snv_131 allows attackers to have an unspecified impact via vectors related to using smbadm to join a Windows Active Directory domain. | [
"cpe:2.3:o:sun:opensolaris:snv_77:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_77:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_78:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_78:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_79:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_79:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_80:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_80:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_81:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_81:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_82:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_82:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_83:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_83:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_84:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_84:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_85:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_85:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_86:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_86:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_87:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_87:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_88:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_88:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_89:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_89:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_90:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_90:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_91:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_91:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_92:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_92:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_93:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_93:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_94:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_94:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_95:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_95:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_96:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_96:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_97:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_97:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_98:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_98:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_99:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_99:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_100:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_100:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_101:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_101:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_102:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_103:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_103:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_104:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_105:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_105:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_106:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_107:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_107:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_108:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_109:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_109:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_110:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_110:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_111:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_111:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_112:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_113:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_113:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_114:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_115:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_115:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_116:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_117:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_117:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_118:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_119:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_119:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_120:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_120:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_121:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_121:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_122:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_122:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_123:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_124:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_124:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_125:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_125:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_126:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_126:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_127:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_127:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_128:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_129:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_129:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_130:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_130:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_131:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_131:*:x86:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-q9w7-f293-j9p6 | Multiple Mitsubishi Electric Factory Automation products have a vulnerability that allows an attacker to execute arbitrary code. | [] | null | null | null | null |
|
CVE-2018-6867 | Cross Site Scripting (XSS) exists in PHP Scripts Mall Alibaba Clone Script 1.0.2 via a profile parameter. | [
"cpe:2.3:a:alibaba_clone_script_project:alibaba_clone_script:1.0.2:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 |
|
CVE-2022-20823 | Cisco NX-OS Software OSPFv3 Denial of Service Vulnerability | A vulnerability in the OSPF version 3 (OSPFv3) feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to incomplete input validation of specific OSPFv3 packets. An attacker could exploit this vulnerability by sending a malicious OSPFv3 link-state advertisement (LSA) to an affected device. A successful exploit could allow the attacker to cause the OSPFv3 process to crash and restart multiple times, causing the affected device to reload and resulting in a DoS condition. Note: The OSPFv3 feature is disabled by default. To exploit this vulnerability, an attacker must be able to establish a full OSPFv3 neighbor state with an affected device. For more information about exploitation conditions, see the Details section of this advisory. | [
"cpe:2.3:o:cisco:nexus_3016_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3016q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3016q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3048_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3064_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3064-32t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064-32t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3064-t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3064-x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3064t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3064x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3100-v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3100-v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3100-z_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3100-z:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3100v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3100v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_31108pc-v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_31108pv-v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31108pv-v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_31108tc-v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_31128pq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3132c-z_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3132q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3132q-v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3132q-x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3132q-x\\/3132q-xl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q-x\\/3132q-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3132q-xl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3164q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3172_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3172pq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172pq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3172pq-xl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3172pq\\/pq-xl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172pq\\/pq-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3172tq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3172tq-32t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3172tq-xl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3232c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3232c__firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3232c_:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3264c-e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3264q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3408-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_34180yc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_34200yc-sm_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_34200yc-sm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3432d-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3464c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3500_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3500_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3524_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3524-x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3524-x\\/xl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-x\\/xl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3524-xl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3548_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3548-x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3548-x\\/xl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-x\\/xl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3548-xl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_36180yc-r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3636c-r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_5500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_5548p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_5548up_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_5596t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_5596up_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_5600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_56128p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_5624q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_5648q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_5672up_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_5672up-16g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5672up-16g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_5696q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_6000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_6000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_6001_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_6001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_6001p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_6001p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_6001t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_6001t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_6004_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_6004:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_6004x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_6004x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_7000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_7000_10-slot_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_7000_18-slot_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_7000_4-slot_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000_4-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_7000_9-slot_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_7000_supervisor_1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000_supervisor_1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_7000_supervisor_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000_supervisor_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_7000_supervisor_2e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000_supervisor_2e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_7004_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7004:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_7009_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7009:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7010:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_7018_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7018:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_7700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_7700_10-slot_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7700_10-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_7700_18-slot_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7700_18-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_7700_2-slot_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7700_2-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_7700_6-slot_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7700_6-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_7700_supervisor_2e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7700_supervisor_2e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_7700_supervisor_3e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7700_supervisor_3e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_7702_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7702:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_7706_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7706:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_7710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_7718_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7718:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_9000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_9000v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9000v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_9200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_92160yc-x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_9221c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9221c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_92300yc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_92304qc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_92348gc-x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_9236c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_9272q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_9300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_93108tc-ex_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_93108tc-ex-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-ex-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_93108tc-fx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_93108tc-fx-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-fx-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_93108tc-fx3p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-fx3p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_93120tx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_93128_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93128:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_93128tx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_9316d-gx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9316d-gx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_93180lc-ex_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_93180tc-ex_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180tc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_93180yc-ex_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_93180yc-ex-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-ex-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_93180yc-fx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_93180yc-fx-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-fx-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_93180yc-fx3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-fx3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_93180yc-fx3s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-fx3s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_93216tc-fx2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_93240yc-fx2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_9332c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_9332pq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_93360yc-fx2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_9336c-fx2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_9336c-fx2-e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9336c-fx2-e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_9336pq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9336pq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_9348gc-fxp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_93600cd-gx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93600cd-gx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_9364c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_9364c-gx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9364c-gx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_9372px_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_9372px-e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_9372tx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_9372tx-e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_9396px_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_9396tx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_9500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_9500r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9500r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_9504_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_9508_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_9516_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*"
] | null | 8.6 | null | null |
CVE-2006-5137 | Multiple direct static code injection vulnerabilities in Groupee UBB.threads 6.5.1.1 allow remote attackers to (1) inject PHP code via a theme[] array parameter to admin/doedittheme.php, which is injected into includes/theme.inc.php; (2) inject PHP code via a config[] array parameter to admin/doeditconfig.php, and then execute the code via includes/config.inc.php; and inject a reference to PHP code via a URL in the config[path] parameter, and then execute the code via (3) dorateuser.php, (4) calendar.php, and unspecified other scripts. | [
"cpe:2.3:a:ubbcentral:ubb.threads:6.5.1.1:*:*:*:*:*:*:*"
] | null | null | null | 5.1 |
|
CVE-2005-4400 | Cross-site scripting (XSS) vulnerability in downloads/portal_ent in Liferay Portal Enterprise 3.6.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) _77_struts_action, (2) p_p_mode, and (3) p_p_state parameters. | [
"cpe:2.3:a:liferay:liferay_portal_enterprise:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2022-21697 | SSRF vulnerability (requires authentication) | Jupyter Server Proxy is a Jupyter notebook server extension to proxy web services. Versions of Jupyter Server Proxy prior to 3.2.1 are vulnerable to Server-Side Request Forgery (SSRF). Any user deploying Jupyter Server or Notebook with jupyter-proxy-server extension enabled is affected. A lack of input validation allows authenticated clients to proxy requests to other hosts, bypassing the `allowed_hosts` check. Because authentication is required, which already grants permissions to make the same requests via kernel or terminal execution, this is considered low to moderate severity. Users may upgrade to version 3.2.1 to receive a patch or, as a workaround, install the patch manually. | [
"cpe:2.3:a:jupyter:jupyter_server_proxy:*:*:*:*:*:*:*:*"
] | null | 6.3 | null | null |
GHSA-j7c5-2gh9-m7cm | Buffer overflow in Infoseek Ultraseek search engine allows remote attackers to execute commands via a long GET request. | [] | null | null | null | null |
|
CVE-2002-0276 | Buffer overflow in various decoders in Ettercap 0.6.3.1 and earlier, when running on networks with an MTU greater than 2000, allows remote attackers to execute arbitrary code via large packets. | [
"cpe:2.3:a:ettercap:ettercap:0.6.3.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2023-28503 | Authentication bypass in UniRPC's udadmin service | Rocket Software UniData versions prior to 8.2.4 build 3003 and UniVerse versions prior to 11.3.5 build 1001 or 12.2.1 build 2002 suffer from an authentication bypass vulnerability, where a special username with a deterministic password can be leveraged to bypass authentication checks and execute OS commands as the root user. | [
"cpe:2.3:a:rocketsoftware:unidata:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketsoftware:universe:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
CVE-2011-2511 | Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption. | [
"cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
CVE-2018-20943 | cPanel before 68.0.27 allows attackers to read root's crontab file during a short time interval upon a post-update task (SEC-352). | [
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | null | 2.5 | 1.9 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.