id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-9qpg-7p56-5mjx
IBM AIX 6.1 and 7.1 does not restrict the wpar_limits_config and wpar_limits_modify system calls, which allows local users to cause a denial of service (system crash) via a crafted call.
[]
null
null
null
null
GHSA-x8qg-whhh-m3ph
A programming error exists in a way Randombit Botan cryptographic library version 2.0.1 implements x500 string comparisons which could lead to certificate verification issues and abuse. A specially crafted X509 certificate would need to be delivered to the client or server application in order to trigger this vulnerability.
[]
null
null
9.8
null
CVE-2016-5832
The customizer in WordPress before 4.5.3 allows remote attackers to bypass intended redirection restrictions via unspecified vectors.
[ "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-7p4h-229r-4w4m
Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly restrict JSAPI access to the GetProperty function, which allows remote attackers to bypass the Same Origin Policy and possibly have unspecified other impact via a crafted web site.
[]
null
null
null
null
GHSA-r763-7pmj-6hh5
admin.php in Multi-Page Comment System (MPCS) 1.0 and 1.1 allows remote attackers to bypass authentication and gain privileges by setting the CommentSystemAdmin cookie to 1.
[]
null
null
null
null
CVE-2022-43546
A vulnerability has been identified in POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10). Affected devices do not properly validate the EndTime-parameter in requests to the web interface on port 443/tcp. This could allow an authenticated remote attacker to crash the device (followed by an automatic reboot) or to execute arbitrary code on the device.
[ "cpe:2.3:o:siemens:sicam_q100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sicam_p850_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sicam_p855_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:7kg9501-0aa01-2aa1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7kg9501-0aa01-2aa1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:7kg9501-0aa31-2aa1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7kg9501-0aa31-2aa1:-:*:*:*:*:*:*:*" ]
null
9.9
null
null
CVE-2020-0081
In finalize of AssetManager.java, there is possible memory corruption due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-144028297
[ "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
GHSA-v956-pgc2-gjv5
An untrusted pointer dereference has been identified in the way TPEditor(v1.98 and prior) processes project files, allowing an attacker to craft a special project file that may permit arbitrary code execution.
[]
null
null
null
null
GHSA-qf72-p389-p7mv
Adobe Experience Manager versions 6.4, 6.3, 6.2, 6.1, and 6.0 have a reflected cross-site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure.
[]
null
null
6.1
null
GHSA-7969-wgqw-hhgv
Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an attacker to elevate privilege when tdx.sys fails to check the length of a buffer prior to copying memory to it, aka "Windows TDX Elevation of Privilege Vulnerability".
[]
null
null
7.8
null
CVE-2002-0638
setpwnam.c in the util-linux package, as included in Red Hat Linux 7.3 and earlier, and other operating systems, does not properly lock a temporary file when modifying /etc/passwd, which may allow local users to gain privileges via a complex race condition that uses an open file descriptor in utility programs such as chfn and chsh.
[ "cpe:2.3:a:mandrakesoft:mandrake_single_network_firewall:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:hp:secure_os:1.0:*:linux:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:8.0:*:ppc:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:8.1:*:ia64:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux:6.0:*:alpha:*:*:*:*:*", "cpe:2.3:o:redhat:linux:6.0:*:sparc:*:*:*:*:*", "cpe:2.3:o:redhat:linux:6.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux:6.1:*:alpha:*:*:*:*:*", "cpe:2.3:o:redhat:linux:6.1:*:sparc:*:*:*:*:*", "cpe:2.3:o:redhat:linux:6.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux:6.2:*:alpha:*:*:*:*:*", "cpe:2.3:o:redhat:linux:6.2:*:sparc:*:*:*:*:*", "cpe:2.3:o:redhat:linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux:7.0:*:alpha:*:*:*:*:*", "cpe:2.3:o:redhat:linux:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux:7.1:*:alpha:*:*:*:*:*", "cpe:2.3:o:redhat:linux:7.1:*:ia64:*:*:*:*:*", "cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux:7.2:*:alpha:*:*:*:*:*", "cpe:2.3:o:redhat:linux:7.2:*:ia64:*:*:*:*:*", "cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*" ]
null
null
null
6.2
RHSA-2018:1722
Red Hat Security Advisory: java-1.8.0-ibm security update
JDK: unspecified vulnerability fixed in 6u191, 7u171, and 8u161 (Security) OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833)
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
4.2
null
GHSA-w53g-3x4g-6vhq
Possible buffer overflow while updating ikev2 parameters for delete payloads received during informational exchange due to lack of check of input validation for certain parameters received from the ePDG server in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile
[]
null
null
null
null
CVE-2011-2022
The agp_generic_remove_memory function in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 does not validate a certain start parameter, which allows local users to gain privileges or cause a denial of service (system crash) via a crafted AGPIOC_UNBIND agp_ioctl ioctl call, a different vulnerability than CVE-2011-1745.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*" ]
null
null
null
6.9
GHSA-86rq-87v9-7ppc
After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored. This vulnerability affects Firefox < 72.
[]
null
6.5
null
null
CVE-2020-12683
Katyshop2 before 2.12 has multiple stored XSS issues.
[ "cpe:2.3:a:katyshop2_project:katyshop2:*:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
GHSA-g3v6-6vj7-mmpv
Plex Media Server before 0.9.9.3 allows remote attackers to bypass the web server whitelist, conduct SSRF attacks, and execute arbitrary administrative actions via multiple crafted X-Plex-Url headers to system/proxy, which are inconsistently processed by the request handler in the backend web server.
[]
null
null
null
null
GHSA-3q6x-j6f7-rvxv
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Website366.com WPSHARE247 Elementor Addons allows Stored XSS. This issue affects WPSHARE247 Elementor Addons: from n/a through 2.1.
[]
null
6.5
null
null
GHSA-xfv3-c2fr-gqcq
A vulnerability was found in SourceCodester Inventory Management System 1.0 and classified as critical. This issue affects some unknown processing of the file ex_catagory_data.php. The manipulation of the argument columns[1][data] leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-236291.
[]
null
null
6.3
null
GHSA-4pjf-jwfp-vg6f
Buffer overflow in Aterm HC100RC Ver1.0.1 and earlier allows attacker with administrator rights to execute arbitrary code via netWizard.cgi date parameter, time parameter, and offset parameter.
[]
null
null
7.2
null
GHSA-2vx6-fcw6-hpr6
Reference counting error in pyo3
An issue was discovered in the pyo3 crate before 0.12.4 for Rust. There is a reference-counting error and use-after-free in From<Py<T>>.
[]
null
5.5
null
null
CVE-2021-28596
Adobe FrameMaker PDF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
Adobe Framemaker version 2020.0.1 (and earlier) and 2019.0.8 (and earlier) are affected by an Out-of-bounds Write vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:framemaker:2020.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-ch74-fvqr-x5q8
Microsoft DWM Core Library Elevation of Privilege Vulnerability.
[]
null
7.8
null
null
RHSA-2025:4568
Red Hat Security Advisory: libsoup security update
libsoup: Integer overflow in append_param_quoted libsoup: Heap buffer overflow in sniff_unknown() libsoup: Heap buffer overflows in sniff_feed_or_html() and skip_insignificant_space() libsoup: Out of bounds reads in soup_headers_parse_request() libsoup: Double free on soup_message_headers_get_content_disposition() through "soup-message-headers.c" via "params" GHashTable value libsoup: NULL pointer dereference in soup_message_headers_get_content_disposition when "filename" parameter is present, but has no value in Content-Disposition header libsoup: Memory leak on soup_header_parse_quality_list() via soup-headers.c libsoup: Information disclosure may leads libsoup client sends Authorization header to a different host when being redirected by a server
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
6.8
null
null
CVE-2023-31212
WordPress Contact Form Entries Plugin <= 1.3.0 is vulnerable to SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in CRM Perks Database for Contact Form 7, WPforms, Elementor forms contact-form-entries allows SQL Injection.This issue affects Database for Contact Form 7, WPforms, Elementor forms: from n/a through 1.3.0.
[ "cpe:2.3:a:crmperks:database_for_contact_form_7\\,_wpforms\\,_elementor_forms:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:crmperks:database_for_contact_form_7\\,_wpforms\\,_elementor_forms:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2024-53709
WordPress Generic Elements plugin <= 1.2.3 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bdevs Generic Elements allows DOM-Based XSS.This issue affects Generic Elements: from n/a through 1.2.3.
[]
null
6.5
null
null
GHSA-qwhq-2jqj-q642
Multiple vulnerabilities in Cisco Secure Client Software, formerly AnyConnect Secure Mobility Client, could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected system. These vulnerabilities are due to an out-of-bounds memory read from Cisco Secure Client Software. An attacker could exploit these vulnerabilities by logging in to an affected device at the same time that another user is accessing Cisco Secure Client on the same system, and then sending crafted packets to a port on that local host. A successful exploit could allow the attacker to crash the VPN Agent service, causing it to be unavailable to all users of the system. To exploit these vulnerabilities, the attacker must have valid credentials on a multi-user system.
[]
null
5.5
null
null
GHSA-m77q-7jww-hhf9
Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.1.0, contains a use of default password vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to the takeover of a high privileged user account.
[]
null
9.8
null
null
GHSA-wfm8-vp3v-66hp
The Registrations for the Events Calendar WordPress plugin before 2.12.4 does not sanitise and escape some parameters when accepting event registrations, which could allow unauthenticated users to perform Cross-Site Scripting attacks.
[]
null
9.6
null
null
CVE-2017-15746
IrfanView 4.50 - 64bit with CADImage plugin version 12.0.0.5 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dwg file, related to "Data from Faulting Address controls Branch Selection starting at CADIMAGE+0x00000000003d21b3."
[ "cpe:2.3:a:irfanview:irfanview:4.50:*:*:*:*:*:x64:*", "cpe:2.3:a:irfanview:cadimage:12.0.0.5:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
CVE-2024-47577
Information Disclosure vulnerability in SAP Commerce Cloud
Webservice API endpoints for Assisted Service Module within SAP Commerce Cloud has information disclosure vulnerability. When an authorized agent searches for customer to manage their accounts, the request url includes customer data and it is recorded in server logs. If an attacker impersonating as authorized admin visits such server logs, then they get access to the customer data. The amount of leaked confidential data however is extremely limited, and the attacker has no control over what data is leaked.
[]
null
2.7
null
null
GHSA-rpc3-5m2x-2w73
A cross-site scripting (XSS) vulnerability may impact IBM Curam Social Program Management 7.0.9 and 7.0.10. This vulnerability allows attackers to inject malicious scripts into web applications for the purpose of running unwanted actions on the end user's device, restricted to a single location. IBM X-Force ID: 189153.
[]
null
null
null
null
GHSA-c8wv-q6vg-rc4f
Artica Pandora FMS 742 allows unauthenticated attackers to perform Phar deserialization.
[]
null
null
null
null
CVE-2018-13190
The mintToken function of a smart contract implementation for DVChain, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[ "cpe:2.3:a:dvchain_project:dvchain:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
RHSA-2022:1725
Red Hat Security Advisory: thunderbird security update
Mozilla: Incorrect security status shown after viewing an attached email Mozilla: Bypassing permission prompt in nested browsing contexts Mozilla: iframe Sandbox bypass Mozilla: Reader mode bypassed SameSite cookies Mozilla: Speech Synthesis feature not properly disabled Mozilla: Fullscreen notification bypass using popups Mozilla: Leaking browser history with CSS variables Mozilla: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
9.8
7.5
null
GHSA-x7j9-8hjg-7f8p
A vulnerability has been found in PHPGurukul Boat Booking System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file book-boat.php?bid=1 of the component Book a Boat Page. The manipulation of the argument nopeople leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
null
null
CVE-2020-7198
There is a remote escalation of privilege possible for a malicious user that has a OneView account in OneView and Synergy Composer. HPE has provided updates to Oneview and Synergy Composer: Update to version 5.5 of OneView, Composer, or Composer2.
[ "cpe:2.3:a:hp:oneview:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:oneview:5.00.01:*:*:*:*:*:*:*", "cpe:2.3:a:hp:oneview:5.00.02:*:*:*:*:*:*:*", "cpe:2.3:a:hp:oneview:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:hp:oneview:5.3:*:*:*:*:*:*:*", "cpe:2.3:a:hp:oneview:5.4:*:*:*:*:*:*:*", "cpe:2.3:a:hp:oneview:5.20.01:*:*:*:*:*:*:*", "cpe:2.3:a:hp:synergy_composer:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:synergy_composer:5.00.01:*:*:*:*:*:*:*", "cpe:2.3:a:hp:synergy_composer:5.00.02:*:*:*:*:*:*:*", "cpe:2.3:a:hp:synergy_composer:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:hp:synergy_composer:5.3:*:*:*:*:*:*:*", "cpe:2.3:a:hp:synergy_composer:5.4:*:*:*:*:*:*:*", "cpe:2.3:a:hp:synergy_composer:5.20.01:*:*:*:*:*:*:*", "cpe:2.3:a:hp:synergy_composer_2:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:synergy_composer_2:5.00.01:*:*:*:*:*:*:*", "cpe:2.3:a:hp:synergy_composer_2:5.00.02:*:*:*:*:*:*:*", "cpe:2.3:a:hp:synergy_composer_2:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:hp:synergy_composer_2:5.3:*:*:*:*:*:*:*", "cpe:2.3:a:hp:synergy_composer_2:5.4:*:*:*:*:*:*:*", "cpe:2.3:a:hp:synergy_composer_2:5.20.01:*:*:*:*:*:*:*" ]
null
8.8
null
6.5
GHSA-v5w5-cq94-f8mg
An issue was discovered on Samsung mobile devices with L(5.0/5.1) (Spreadtrum or Marvell chipsets) software. There is a Factory Reset Protection (FRP) bypass. The Samsung ID is SVE-2016-5421 (March 2016).
[]
null
null
null
null
CVE-2008-4790
The core upload module in Drupal 5.x before 5.11 allows remote authenticated users to bypass intended access restrictions and read "files attached to content" via unknown vectors.
[ "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.3:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.4:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.5:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.6:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.7:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.8:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.9:*:*:*:*:*:*:*" ]
null
null
null
6
CVE-2017-16382
An issue was discovered in Adobe Acrobat and Reader: 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, and 11.0.22 and earlier versions. This vulnerability occurs as a result of a computation that reads data that is past the end of the target buffer; the computation is part of the image conversion module. The use of an invalid (out-of-range) pointer offset during access of internal data structure fields causes the vulnerability. A successful attack can lead to sensitive data exposure.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*" ]
null
null
8.8
9.3
CVE-2006-5549
PHP remote file inclusion vulnerability in libraries/amfphp/amf-core/custom/CachedGateway.php in Adobe PHP SDK allows remote attackers to execute arbitrary PHP code via the AMFPHP_BASE parameter. NOTE: this issue has been disputed by a third-party researcher who states that AMFPHP_BASE is a constant
[ "cpe:2.3:a:adobe:adobe_php_ria_sdk:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2022-2071
Name Directory < 1.25.4 - Stored Cross-Site Scripting via CSRF
The Name Directory WordPress plugin before 1.25.4 does not have CSRF check when importing names, and is also lacking sanitisation as well as escaping in some of the imported data, which could allow attackers to make a logged in admin import arbitrary names with XSS payloads in them.
[ "cpe:2.3:a:name_directory_project:name_directory:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
null
GHSA-527j-hqx2-2j3w
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
[]
null
5.4
null
null
GHSA-7phr-5276-4mqw
The System Only Wrapper (SOW) implementation in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 does not prevent use of the cloneNode method for cloning a protected node, which allows remote attackers to bypass the Same Origin Policy or possibly execute arbitrary JavaScript code with chrome privileges via a crafted web site.
[]
null
null
null
null
GHSA-633g-rmvw-w6m6
The ELF parser (readelf.c) in file before 5.21 allows remote attackers to cause a denial of service (CPU consumption or crash) via a large number of (1) program or (2) section headers or (3) invalid capabilities.
[]
null
null
null
null
CVE-2010-3549
Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this is an HTTP request splitting vulnerability involving the handling of the chunked transfer encoding method by the HttpURLConnection class.
[ "cpe:2.3:a:sun:jre:*:update_21:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:*:update_21:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:*:update25:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update22:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update23:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update24:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_23:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_24:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_25:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_26:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:*:update25:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_25:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_26:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:*:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.0_01:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.0_02:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.0_03:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.0_04:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.0_05:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_01:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_01a:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_02:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_03:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_04:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_05:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_06:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_07:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_08:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_09:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_10:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_11:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_12:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_13:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_14:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_15:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_16:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_17:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_18:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_19:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_20:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_21:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_22:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_23:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_24:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_25:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_26:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_27:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.0:update1:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.0:update2:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.0:update3:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.0:update4:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.0:update5:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1:update1:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1:update2:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1_26:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1_27:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.0_01:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.0_02:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.0_03:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.0_04:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.0_05:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_26:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_27:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2021-21312
Stored XSS on documents
GLPI is open source software which stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package. In GLPI before verison 9.5.4, there is a vulnerability within the document upload function (Home > Management > Documents > Add, or /front/document.form.php endpoint), indeed one of the form field: "Web Link" is not properly sanitized and a malicious user (who has document upload rights) can use it to deliver JavaScript payload. For example if you use the following payload: " accesskey="x" onclick="alert(1)" x=", the content will be saved within the database without any control. And then once you return to the summary documents page, by clicking on the "Web Link" of the newly created file it will create a new empty tab, but on the initial tab the pop-up "1" will appear.
[ "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
CVE-2022-33639
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
[ "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*" ]
null
8.3
null
null
GHSA-q878-vxpg-6qx6
OpenStack Dashboard (Horizon) before 2014.1.3 and 2014.2.x before 2014.2.1 does not properly handle session records when using a db or memcached session engine, which allows remote attackers to cause a denial of service via a large number of requests to the login page.
[]
null
null
null
null
CVE-2019-5988
Stored cross-site scripting vulnerability in Access analysis CGI An-Analyzer released in 2019 June 24 and earlier allows remote attackers to inject arbitrary web script or HTML via the Management Page.
[ "cpe:2.3:a:anglers-net:cgi_an-anlyzer:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
CVE-2020-28896
Mutt before 2.0.2 and NeoMutt before 2020-11-20 did not ensure that $ssl_force_tls was processed if an IMAP server's initial server response was invalid. The connection was not properly closed, and the code could continue attempting to authenticate. This could result in authentication credentials being exposed on an unencrypted connection, or to a machine-in-the-middle.
[ "cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:*", "cpe:2.3:a:neomutt:neomutt:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
5.3
null
2.6
CVE-2022-24609
Luocms v2.0 is affected by an incorrect access control vulnerability. Through /admin/templates/template_manage.php, an attacker can write an arbitrary shell file.
[ "cpe:2.3:a:luocms_project:luocms:2.0:*:*:*:*:*:*:*" ]
null
9.8
null
10
CVE-2022-42764
In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services.
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:s8009:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2012-5039
The BGP Router process in Cisco IOS before 12.2(50)SY1 allows remote attackers to cause a denial of service (memory consumption) via vectors involving BGP path attributes, aka Bug ID CSCsw63003.
[ "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2021-20869
Exposure of sensitive information to an unauthorized actor vulnerability in KONICA MINOLTA bizhub series (bizhub C750i G00-35 and earlier, bizhub C650i/C550i/C450i G00-B6 and earlier, bizhub C360i/C300i/C250i G00-B6 and earlier, bizhub 750i/650i/550i/450i G00-37 and earlier, bizhub 360i/300i G00-33 and earlier, bizhub C287i/C257i/C227i G00-19 and earlier, bizhub 306i/266i/246i/226i G00-B6 and earlier, bizhub C759/C659 GC7-X8 and earlier, bizhub C658/C558/C458 GC7-X8 and earlier, bizhub 958/808/758 GC7-X8 and earlier, bizhub 658e/558e/458e GC7-X8 and earlier, bizhub C287/C227 GC7-X8 and earlier, bizhub 287/227 GC7-X8 and earlier, bizhub 368e/308e GC7-X8 and earlier, bizhub C368/C308/C258 GC9-X4 and earlier, bizhub 558/458/368/308 GC9-X4 and earlier, bizhub C754e/C654e GDQ-M0 and earlier, bizhub 754e/654e GDQ-M0 and earlier, bizhub C554e/C454e GDQ-M1 and earlier, bizhub C364e/C284e/C224e GDQ-M1 and earlier, bizhub 554e/454e/364e/284e/224e GDQ-M1 and earlier, bizhub C754/C654 C554/C454 GR1-M0 and earlier, bizhub C364/C284/C224 GR1-M0 and earlier, bizhub 754/654 GR1-M0 and earlier, bizhub C4050i/C3350i/C4000i/C3300i G00-B6 and earlier, bizhub C3320i G00-B6 and earlier, bizhub 4750i/4050i G00-22 and earlier, bizhub 4700i G00-22 and earlier, bizhub C3851FS/C3851/C3351 GC9-X4 and earlier, and bizhub 4752/4052 GC9-X4 and earlier) allows an attacker on the adjacent network to obtain some of user credentials if LDAP server authentication is enabled via a specific SOAP message.
[ "cpe:2.3:o:konicaminolta:bizhub_c750i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c750i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c650i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c650i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c550i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c550i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c450i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c450i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c360i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c360i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c300i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c300i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c250i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c250i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_750i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_750i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_650i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_650i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_550i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_550i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_450i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_450i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_360i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_360i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_300i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_300i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c287i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c287i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c257i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c257i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c227i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c227i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_306i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_306i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_266i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_266i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_226i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_226i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c759_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c759:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c659_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c659:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c658_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c658:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c558_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c558:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c458_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c458:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_958_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_958:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_808_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_808:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_758_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_758:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_658e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_658e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_558e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_558e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_458e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_458e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c287_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c287:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c227_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c227:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_287_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_287:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_227_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_227:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_368e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_368e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_308e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_308e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c368_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c368:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c308_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c308:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c258_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c258:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_558_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_558:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_458_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_458:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_368_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_368:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_308_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_308:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c754e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c754e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c654e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c654e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_754e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_754e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_654e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_654e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c554e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c554e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c454e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c454e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c364e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c364e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c284e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c284e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c224e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c224e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_554e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_554e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_454e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_454e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_364e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_364e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_284e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_284e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_224e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_224e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c754_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c754:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c654_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c654:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c554_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c554:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c454_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c454:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c364_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c364:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c284_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c284:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c224_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c224:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_754_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_754:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_654_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_654:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c4050i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c4050i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3350i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3350i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c4000i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c4000i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3300i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3300i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3320i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3320i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_4750i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_4750i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_4050i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_4050i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_4700i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_4700i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3851fs_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3851fs:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3851_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3851:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3351_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3351:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_4752_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_4752:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_4052_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_4052:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_246i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_246i:-:*:*:*:*:*:*:*" ]
null
6.5
null
2.9
GHSA-84px-q68r-2fc9
Privilege escalation in the Sulu Admin panel
ImpactImpacted are only users which already have access to the admin UI. Over the API it was possible for them to give themselves permissions to areas which they did not already had. This issue was introduced in 2.0.0-RC1 with the new ProfileController putAction.PatchesThe versions have been patched in 2.2.18, 2.3.8 and 2.4.0.WorkaroundsPatching the ProfileController of affected sulu versions yourself by overwriting it.References_Are there any links users can visit to find out more?_Currently not.For more informationIf you have any questions or comments about this advisory:Open an issue in [sulu/sulu repo](https://github.com/sulu/sulu/issues)Email us at [[email protected]](mailto:[email protected])
[]
null
7.2
null
null
CVE-2020-3303
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software IKEv1 Denial of Service Vulnerability
A vulnerability in the Internet Key Exchange version 1 (IKEv1) feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper management of system memory. An attacker could exploit this vulnerability by sending malicious IKEv1 traffic to an affected device. A successful exploit could allow the attacker to cause a DoS condition on the affected device.
[ "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5510:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5520:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5550:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*" ]
null
null
6.8
null
CVE-2020-8553
Kubernetes ingress-nginx Compromise of auth via subset/superset namespace names
The Kubernetes ingress-nginx component prior to version 0.28.0 allows a user with the ability to create namespaces and to read and create ingress objects to overwrite the password file of another ingress which uses nginx.ingress.kubernetes.io/auth-type: basic and which has a hyphenated namespace or secret name.
[ "cpe:2.3:a:kubernetes:ingress-nginx:*:*:*:*:*:*:*:*" ]
null
5.9
null
null
GHSA-gr89-jp2c-48mv
Rejected reason: DO NOT USE THIS CVE RECORD. ConsultIDs: none. Reason: This record was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
[]
null
null
null
null
GHSA-qqv3-2v93-cwjw
SAP NetWeaver application, due to insufficient input validation, allows an attacker to send a crafted request from a vulnerable web application targeting internal systems behind firewalls that are normally inaccessible to an attacker from the external network, resulting in a Server-Side Request Forgery vulnerability. Thus, having a low impact on confidentiality.
[]
null
5.3
null
null
GHSA-x8gj-h35p-4h5j
In Easy Magazine through 2012-10-26, there is XSS in the search bar of the web site.
[]
null
null
6.1
null
GHSA-5h62-2v5q-2mpg
Leptonica before 1.80.0 allows a denial of service (application crash) via an incorrect left shift in pixConvert2To8 in pixconv.c.
[]
null
null
null
null
GHSA-v599-g95q-gc6f
Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5586, CVE-2015-6684, CVE-2015-6687, CVE-2015-6688, CVE-2015-6689, CVE-2015-6690, CVE-2015-6691, CVE-2015-7615, CVE-2015-7617, and CVE-2015-7621.
[]
null
null
null
null
cisco-sa-20180926-macsec
Cisco IOS XE Software MACsec MKA Using EAP-TLS Authentication Bypass Vulnerability
A vulnerability in the MACsec Key Agreement (MKA) using Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) functionality of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to bypass authentication and pass traffic through a Layer 3 interface of an affected device. The vulnerability is due to a logic error in the affected software. An attacker could exploit this vulnerability by connecting to and passing traffic through a Layer 3 interface of an affected device, if the interface is configured for MACsec MKA using EAP-TLS and is running in access-session closed mode. A successful exploit could allow the attacker to bypass 802.1x network access controls and gain access to the network. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-macsec ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-macsec"]
[]
null
null
6.5
null
CVE-2024-45323
An improper access control vulnerability [CWE-284] in FortiEDR Manager API 6.2.0 through 6.2.2, 6.0 all versions may allow in a shared environment context an authenticated admin with REST API permissions in his profile and restricted to a specific organization to access backend logs that include information related to other organizations.
[ "cpe:2.3:a:fortinet:fortiedrmanager:6.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiedrmanager:6.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiedrmanager:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiedrmanager:*:*:*:*:*:*:*:*" ]
null
4.6
null
null
GHSA-8vw9-c3gr-76x2
Multiple directory traversal vulnerabilities in (1) languages/Language.php and (2) includes/StubObject.php in MediaWiki 1.8.0 and other versions before 1.16.2, when running on Windows and possibly Novell Netware, allow remote attackers to include and execute arbitrary local PHP files via vectors related to a crafted language file and the Language::factory function.
[]
null
null
null
null
CVE-2025-32170
WordPress Motors plugin <= 1.4.65 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Stylemix Motors allows Stored XSS. This issue affects Motors: from n/a through 1.4.65.
[]
null
6.5
null
null
CVE-2018-12323
An issue was discovered on Momentum Axel 720P 5.1.8 devices. A password of EHLGVG is hard-coded for the root and admin accounts, which makes it easier for physically proximate attackers to login at the console.
[ "cpe:2.3:h:apollotechnologiesinc:momentum_axel_720p:*:*:*:*:*:*:*:*", "cpe:2.3:o:apollotechnologiesinc:momentum_axel_720p_firmware:5.1.8:*:*:*:*:*:*:*" ]
null
null
6.8
7.2
GHSA-88g2-9h8q-q752
A Cross-site Scripting (XSS) vulnerability in manage_recipient.php of Sourcecodester Toll Tax Management System 1.0 allows remote authenticated users to inject arbitrary web scripts via the "owner" input field.
[]
null
5.4
null
null
RHSA-2024:4955
Red Hat Security Advisory: OpenShift Container Platform 4.15.25 bug fix and security update
ssh: Prefix truncation attack on Binary Packet Protocol (BPP) openssh: Possible remote code execution due to a race condition in signal handling affecting Red Hat Enterprise Linux 9
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9" ]
null
7
null
null
CVE-2020-17418
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.922. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of EZIX files. A crafted id in a channel element can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-11197.
[ "cpe:2.3:a:foxitsoftware:foxit_studio_photo:3.6.6.922:*:*:*:*:*:*:*" ]
null
null
7.8
null
RHSA-2025:0161
Red Hat Security Advisory: iperf3 security update
iperf: Denial of Service in iperf Due to Improper JSON Handling
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2024:4943
Red Hat Security Advisory: httpd security update
httpd: Substitution encoding issue in mod_rewrite httpd: Improper escaping of output in mod_rewrite httpd: NULL pointer dereference in mod_proxy
[ "cpe:/o:redhat:rhel_els:7" ]
null
7.5
null
null
CVE-2022-40962
Mozilla developers Nika Layzell, Timothy Nikkel, Sebastian Hengst, Andreas Pehrson, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 104 and Firefox ESR 102.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2004-0719
Internet Explorer for Mac 5.2.3, Internet Explorer 6 on Windows XP, and possibly other versions, does not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability.
[ "cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp4:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.5:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.5:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-f4m7-j2g3-gvpf
rConfig 3.9.5 is vulnerable to SQL injection. A remote authenticated attacker could send crafted SQL statements to the devices.crud.php script using the custom_Location parameter, which could allow the attacker to view, add, modify, or delete information in the back-end database.
[]
null
null
null
null
CVE-2018-11380
The parse_import_ptr() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted Mach-O file.
[ "cpe:2.3:a:radare:radare2:2.5.0:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
GHSA-pfhc-9683-m6r9
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in gopiplus Message ticker allows Stored XSS. This issue affects Message ticker: from n/a through 9.3.
[]
null
5.9
null
null
CVE-2021-0968
In osi_malloc and osi_calloc of allocator.cc, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-197868577
[ "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
CVE-2017-12160
It was found that Keycloak oauth would permit an authenticated resource to obtain an access/refresh token pair from the authentication server, permitting indefinite usage in the case of permission revocation. An attacker on an already compromised resource could use this flaw to grant himself continued permissions and possibly conduct further attacks.
[ "cpe:2.3:a:redhat:keycloak:-:*:*:*:*:*:*:*" ]
null
7.2
null
6.5
GHSA-63x9-9q4w-j636
A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
[]
null
6.4
null
null
GHSA-c8ch-p52f-7rgj
The SOAP interface in OTRS 2.1.x before 2.1.8 and 2.2.x before 2.2.6 allows remote attackers to "read and modify objects" via SOAP requests, related to "Missing security checks."
[]
null
null
null
null
GHSA-fphj-3v4m-45m5
Cross-site scripting (XSS) vulnerability in Websense TRITON AP-EMAIL before 8.0.0 and V-Series 7.7 appliances allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
CVE-2020-1779
Dynamic templates reveal sensitive data when OTRS tags are used
When dynamic templates are used (OTRSTicketForms), admin can use OTRS tags which are not masked properly and can reveal sensitive information. This issue affects: OTRS AG OTRSTicketForms 6.0.x version 6.0.40 and prior versions; 7.0.x version 7.0.29 and prior versions; 8.0.x version 8.0.3 and prior versions.
[ "cpe:2.3:a:otrs:ticket_forms:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
CVE-2025-23720
WordPress Web Push plugin <= 1.4.0 - CSRF to Stored XSS vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Mozilla Web Push allows Stored XSS.This issue affects Web Push: from n/a through 1.4.0.
[]
null
7.1
null
null
GHSA-r2hp-mcg8-24rg
In Windows Master (aka Windows Optimization Master) 7.99.13.604, the driver file (WoptiHWDetect.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0xf1002002.
[]
null
null
7.8
null
GHSA-g266-3vhm-gj23
The web interface of the Compal Broadband CH7465LG modem (version CH7465LG-NCIP-6.12.18.25-2p6-NOSH) is vulnerable to a /%2f/ path traversal attack, which can be exploited in order to test for the existence of a file pathname outside of the web root directory. If a file exists but is not part of the product, there is a 404 error. If a file does not exist, there is a 302 redirect to index.html.
[]
null
5.3
null
null
GHSA-w77h-q52m-fh9c
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10,1, 10.5 and 11.1 could allow a local user to execute arbitrary code and conduct DLL hijacking attacks. IBM X-Force ID: 140209.
[]
null
null
7.8
null
RHSA-2021:0089
Red Hat Security Advisory: thunderbird security update
Mozilla: Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
8.8
null
GHSA-v9wq-479p-2jwm
Windows Telephony Service Remote Code Execution Vulnerability
[]
null
8.8
null
null
CVE-2021-45329
Cross Site Scripting (XSS) vulnerability exists in Gitea before 1.5.1 via the repository settings inside the external wiki/issue tracker URL field.
[ "cpe:2.3:a:gitea:gitea:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
CVE-2024-20720
Command injection in data collector backup due to insufficient patching of CVE-2023-38208
Adobe Commerce versions 2.4.6-p3, 2.4.5-p5, 2.4.4-p6 and earlier are affected by an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability that could lead in arbitrary code execution by an attacker. Exploitation of this issue does not require user interaction.
[ "cpe:2.3:a:adobe:commerce:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*" ]
null
9.1
null
null
GHSA-2pvc-9pxf-rw8p
Tcpip.sys in Windows NT 4.0 before SP4 allows remote attackers to cause a denial of service via an ICMP Subnet Mask Address Request packet, when certain multiple IP addresses are bound to the same network interface.
[]
null
null
null
null
GHSA-m586-22m6-88g8
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in VideoWhisper.Com VideoWhisper Live Streaming Integration allows OS Command Injection.This issue affects VideoWhisper Live Streaming Integration: from n/a through 5.5.15.
[]
null
9
null
null
GHSA-62mq-p983-gjvx
An integer overflow in xerces-c++ 3.2.3 in BigFix Platform allows remote attackers to cause out-of-bound access via HTTP request.
[]
null
8.2
null
null
CVE-2009-4051
Home FTP Server 1.10.1.139 allows remote attackers to cause a denial of service (daemon outage) via multiple invalid SITE INDEX commands.
[ "cpe:2.3:a:downstairs.dnsalias:home_ftp_server:1.10.1.139:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-3j3c-w82w-2cmg
A vulnerability, which was classified as problematic, has been found in X.org Server. Affected by this issue is the function ProcXkbGetKbdByName of the file xkb/xkb.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211052.
[]
null
7.5
null
null
GHSA-vpx5-mhrx-64h5
Lack of sufficient path validation in South River Technologies' Titan MFT and Titan SFTP servers on Linux allows an authenticated attacker to get the size of an arbitrary file on the filesystem using path traversal in the ftp "SIZE" command
[]
null
4.3
null
null
GHSA-r68c-p976-5jmg
In the Linux kernel, the following vulnerability has been resolved:PCI: pciehp: Fix infinite loop in IRQ handler upon power faultThe Power Fault Detected bit in the Slot Status register differs from all other hotplug events in that it is sticky: It can only be cleared after turning off slot power. Per PCIe r5.0, sec. 6.7.1.8:If a power controller detects a main power fault on the hot-plug slot, it must automatically set its internal main power fault latch [...]. The main power fault latch is cleared when software turns off power to the hot-plug slot.The stickiness used to cause interrupt storms and infinite loops which were fixed in 2009 by commits 5651c48cfafe ("PCI pciehp: fix power fault interrupt storm problem") and 99f0169c17f3 ("PCI: pciehp: enable software notification on empty slots").Unfortunately in 2020 the infinite loop issue was inadvertently reintroduced by commit 8edf5332c393 ("PCI: pciehp: Fix MSI interrupt race"): The hardirq handler pciehp_isr() clears the PFD bit until pciehp's power_fault_detected flag is set. That happens in the IRQ thread pciehp_ist(), which never learns of the event because the hardirq handler is stuck in an infinite loop. Fix by setting the power_fault_detected flag already in the hardirq handler.
[]
null
5.5
null
null
CVE-2017-10814
Buffer overflow in CG-WLR300NM Firmware version 1.90 and earlier allows an attacker to execute arbitrary code via unspecified vectors.
[ "cpe:2.3:o:corega:wlr_300_nm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:corega:wlr_300_nm:-:*:*:*:*:*:*:*" ]
null
null
6.8
7.7