id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-qm9f-c3v9-wphv
|
Security Update for the OPC UA .NET Standard Stack
|
This security update resolves a vulnerability in the OPC UA .NET Standard Stack that enables an unauthorized attacker to trigger a rapid increase in memory consumption.
|
[] | null | 7.5 | null | null | null |
CVE-2021-24964
|
LiteSpeed Cache < 4.4.4 - IP Check Bypass to Unauthenticated Stored XSS
|
The LiteSpeed Cache WordPress plugin before 4.4.4 does not properly verify that requests are coming from QUIC.cloud servers, allowing attackers to make requests to certain endpoints by using a specific X-Forwarded-For header value. In addition, one of the endpoint could be used to set CSS code if a setting is enabled, which will then be output in some pages without being sanitised and escaped. Combining those two issues, an unauthenticated attacker could put Cross-Site Scripting payloads in pages visited by users.
|
[
"cpe:2.3:a:litespeedtech:litespeed_cache:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | 2.6 | null |
CVE-2022-21248
|
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
|
[
"cpe:2.3:a:oracle:graalvm:20.3.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:graalvm:21.3.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update321:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update311:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:11.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:17.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update321:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update311:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:11.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:17.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:santricity_storage_plugin:-:*:*:*:*:vcenter:*:*",
"cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update261:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update271:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update281:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update291:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update301:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update311:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update321:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone8:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update222:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update232:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update242:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update252:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update262:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update271:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update281:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update282:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update291:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update301:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update302:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update312:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:17:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:17.0.1:*:*:*:*:*:*:*"
] | null | 3.7 | null | null | null |
|
GHSA-v4xq-5mw3-crv9
|
Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution and Elevation of privileges.
|
[] | null | 7.8 | null | null | null |
|
GHSA-rwqw-75j8-f2cg
|
In wifi service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed
|
[] | null | 5.5 | null | null | null |
|
CVE-2019-0823
|
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0824, CVE-2019-0825, CVE-2019-0826, CVE-2019-0827.
|
[
"cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
GHSA-r54h-4qg8-h76p
|
WellinTech KingSCADA 3.0 uses a cleartext base64 format for storage of passwords in user.db, which allows context-dependent attackers to obtain sensitive information by reading this file.
|
[] | null | null | null | null | null |
|
GHSA-22hq-4pp4-cw6m
|
The ConvertToPDF plugin in Foxit Reader and PhantomPDF before 8.1 on Windows, when the gflags app is enabled, allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted TIFF image, aka "Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at ConvertToPDF_x86!CreateFXPDFConvertor."
|
[] | null | null | 5.3 | null | null |
|
CVE-2023-34276
|
D-Link DIR-2150 SetTriggerPPPoEValidate Username Command Injection Remote Code Execution Vulnerability
|
D-Link DIR-2150 SetTriggerPPPoEValidate Username Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-2150 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.
The specific flaw exists within the SOAP API interface, which listens on TCP port 80 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20554.
|
[
"cpe:2.3:o:dlink:dir-2150_firmware:-:*:*:*:*:*:*:*"
] | null | null | 6.8 | null | null |
GHSA-3w4g-5j98-3hfr
|
Adobe Bridge versions 10.0.1 and earlier version have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
|
[] | null | null | null | null | null |
|
CVE-2021-45026
|
ASG technologies ASG-Zena Cross Platform Server Enterprise Edition 4.2.1 is vulnerable to Cross Site Scripting (XSS).
|
[
"cpe:2.3:a:rocketsoftware:ags-zena:4.2.1:*:*:*:enterprise:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
GHSA-pxm4-75xf-9fq8
|
An information disclosure vulnerability in the component users-grid-data.php of Ocomon before v4.0.1 allows attackers to obtain sensitive information such as e-mails and usernames.
|
[] | null | 7.5 | null | null | null |
|
GHSA-fvqp-m35r-x4xm
|
Missing Authorization vulnerability in berthaai BERTHA AI allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects BERTHA AI: from n/a through 1.12.10.2.
|
[] | null | 7.1 | null | null | null |
|
GHSA-xwvj-c6cj-6xgw
|
An authenticated user with API access (e.g.: user with default User role), more specifically a user with access to the user.update API endpoint is enough to be able to add themselves to any group (e.g.: Zabbix Administrators), except to groups that are disabled or having restricted GUI access.
|
[] | null | 7.5 | null | null | null |
|
CVE-2012-5613
|
MySQL 5.5.19 and possibly other versions, and MariaDB 5.5.28a and possibly other versions, when configured to assign the FILE privilege to users who should not have administrative privileges, allows remote authenticated users to gain privileges by leveraging the FILE privilege to create files as the MySQL administrator. NOTE: the vendor disputes this issue, stating that this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation. NOTE: it could be argued that this should not be included in CVE because it is a configuration issue.
|
[
"cpe:2.3:a:mariadb:mariadb:5.5.28a:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | null | null | 6 | null |
|
GHSA-p5p2-rhc3-wmf3
|
Malicious Package in siganle
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.RecommendationAny computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
|
[] | null | 9.1 | null | null | null |
GHSA-wp6j-qh23-g8mc
|
Stack-based buffer overflow in the receive_tcppacket function in net_packet.c in tinc before 1.0.21 and 1.1 before 1.1pre7 allows remote authenticated peers to cause a denial of service (crash) or possibly execute arbitrary code via a large TCP packet.
|
[] | null | null | null | null | null |
|
GHSA-7f8x-7rcp-rcjq
|
The pppol2tp_recvmsg function in drivers/net/pppol2tp.c in the Linux kernel 2.6 before 2.6.26-rc6 allows remote attackers to cause a denial of service (kernel heap memory corruption and system crash) and possibly have unspecified other impact via a crafted PPPOL2TP packet that results in a large value for a certain length variable.
|
[] | null | null | null | null | null |
|
CVE-2006-4360
|
Cross-site scripting (XSS) vulnerability in E-commerce 4.7 for Drupal before file.module 1.37.2.4 (20060812) allows remote authenticated users with the "create products" permission to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:drupal:drupal_e-commerce_module:4.7:*:*:*:*:*:*:*"
] | null | null | null | 3.5 | null |
|
GHSA-x8cm-w2qg-36v3
|
The AdminUI in HPE Operations Manager (OM) before 9.21.130 on Linux, Unix, and Solaris allows remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.
|
[] | null | null | 9.8 | null | null |
|
CVE-2016-4872
|
Cybozu Office 9.0.0 to 10.4.0 allows remote authenticated attackers to bypass access restrictions to view the names of unauthorized projects via a breadcrumb trail.
|
[
"cpe:2.3:a:cybozu:office:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.4.0:*:*:*:*:*:*:*"
] | null | null | 4.3 | 4 | null |
|
CVE-2020-9646
|
Adobe Media Encoder versions 14.2 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution.
|
[
"cpe:2.3:a:adobe:media_encoder:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
CVE-2020-24165
|
An issue was discovered in TCG Accelerator in QEMU 4.2.0, allows local attackers to execute arbitrary code, escalate privileges, and cause a denial of service (DoS). Note: This is disputed as a bug and not a valid security issue by multiple third parties.
|
[
"cpe:2.3:a:qemu:qemu:4.2.0:-:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2006-7125
|
Cross-site scripting (XSS) vulnerability in Joomla BSQ Sitestats 1.8.0 and 2.2.1 allows remote attackers to inject arbitrary web script or HTML via the HTTP Referer header, which is not properly handled when the administrator views site statistics.
|
[
"cpe:2.3:a:joomla:bsq_sitestats:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:bsq_sitestats:2.1.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-5g86-qjm3-wfq4
|
In FreeBSD 12.1-STABLE before r360971, 12.1-RELEASE before p5, 11.4-STABLE before r360971, 11.4-BETA1 before p1 and 11.3-RELEASE before p9, libalias does not properly validate packet length resulting in modules causing an out of bounds read/write condition if no checking was built into the module.
|
[] | null | 9.8 | null | null | null |
|
CVE-2010-0394
|
PyGIT.py in the Trac Git plugin (trac-git) before 0.0.20080710-3+lenny1 and before 0.0.20090320-1 on Debian GNU/Linux, when enabled in Trac, allows remote attackers to execute arbitrary commands via shell metacharacters in a crafted HTTP query that is used to generate a certain git command.
|
[
"cpe:2.3:a:nanosleep:trac-git:*:*:*:*:*:*:*:*",
"cpe:2.3:a:edgewall_software:trac:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-238w-4442-vh7q
|
VMware SD-WAN Edge contains an unauthenticated command injection vulnerability potentially leading to remote code execution.A malicious actor with local access to the Edge Router UI during
activation may be able to perform a command injection attack that could
lead to full control of the router.
|
[] | null | 7.4 | null | null | null |
|
CVE-2025-2893
|
Gutenverse <= 2.2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via countdown Block
|
The Gutenverse – Ultimate Block Addons and Page Builder for Site Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's countdown Block in all versions up to, and including, 2.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
CVE-2024-27459
|
The interactive service in OpenVPN 2.6.9 and earlier allows an attacker to send data causing a stack overflow which can be used to execute arbitrary code with more privileges.
|
[
"cpe:2.3:a:openvpn:openvpn_gui:*:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:*:*:*:*:community:*:*:*"
] | null | 7.2 | null | null | null |
|
CVE-2024-0896
|
The Beaver Builder – WordPress Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the button link parameter in all versions up to, and including, 2.7.4.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor access or higher to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[
"cpe:2.3:a:fastlinemedia:beaver_builder:*:*:*:*:lite:wordpress:*:*"
] | null | 6.4 | null | null | null |
|
GHSA-f4rm-f9w6-m7wm
|
Vulnerability in the Oracle FLEXCUBE Direct Banking product of Oracle Financial Services Applications (component: Pre Login). Supported versions that are affected are 12.0.1, 12.0.2 and 12.0.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Direct Banking. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle FLEXCUBE Direct Banking accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N).
|
[] | null | null | null | null | null |
|
CVE-2018-18517
|
Citrix NetScaler Gateway 10.5.x before 10.5.69.003, 11.1.x before 11.1.59.004, 12.0.x before 12.0.58.7, and 12.1.x before 12.1.49.1 has XSS.
|
[
"cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*"
] | null | null | 4.8 | 3.5 | null |
|
GHSA-v9w5-rf3g-c746
|
There is a vulnerability caused by insufficient input validation that allows for arbitrary command execution in a containerized environment within Airwave Glass before 1.3.3. Successful exploitation can lead to complete compromise of the underlying host operating system.
|
[] | null | null | null | null | null |
|
GHSA-wr4f-chxr-9pr5
|
In the Linux kernel, the following vulnerability has been resolved:irqchip/gic-v4: Don't allow a VMOVP on a dying VPEKunkun Jiang reported that there is a small window of opportunity for
userspace to force a change of affinity for a VPE while the VPE has already
been unmapped, but the corresponding doorbell interrupt still visible in
/proc/irq/.Plug the race by checking the value of vmapp_count, which tracks whether
the VPE is mapped ot not, and returning an error in this case.This involves making vmapp_count common to both GICv4.1 and its v4.0
ancestor.
|
[] | null | 4.7 | null | null | null |
|
GHSA-x4qr-xrm4-qp2m
|
** DISPUTED ** The liblnk_data_block_read function in liblnk_data_block.c in liblnk through 2018-04-19 allows remote attackers to cause an information disclosure (heap-based buffer over-read) via a crafted lnk file. NOTE: the vendor has disputed this as described in libyal/liblnk issue 33 on GitHub.
|
[] | null | null | 5.5 | null | null |
|
GHSA-3mxm-3f2x-wfrr
|
A vulnerability was found in SourceCodester Food Ordering Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument description leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3 | 3.5 | null | null | null |
|
GHSA-rwc5-j5vf-9c7f
|
censtore.cgi in Censtore 7.3.002 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the page parameter.
|
[] | null | null | null | null | null |
|
CVE-2007-0481
|
Cisco IOS allows remote attackers to cause a denial of service (crash) via a crafted IPv6 Type 0 Routing header.
|
[
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0da:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0db:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0dc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0s:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0sc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0sl:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0sp:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0st:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0sx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0sy:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0sz:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0t:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0w:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0wc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0wt:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xa:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xd:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xe:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xf:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xg:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xh:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xi:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xj:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xk:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xl:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xm:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xq:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xr:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xs:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xv:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xw:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1aa:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ax:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ay:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1az:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1cx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1da:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1db:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1dc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1e:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ea:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1eb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ec:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1eo:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1eu:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ev:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ew:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ex:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ey:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ez:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1t:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1x:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xa:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xd:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xe:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xf:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xg:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xh:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xi:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xj:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xl:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xp:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xq:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xr:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xs:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xt:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xu:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xv:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xw:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xy:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xz:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ya:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yd:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ye:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yf:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yh:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yi:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yj:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2b:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2bc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2bw:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2by:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2bz:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2cx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2cy:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2cz:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2da:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2dd:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2dx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2eu:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ew:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ewa:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ex:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ey:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ez:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2fx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2fy:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2fz:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ixa:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ixb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ixc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ja:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2jk:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2mb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2mc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2s:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sbc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2se:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sea:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2seb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sec:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sed:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2see:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sef:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2seg:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sg:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sga:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2so:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sra:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2srb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2su:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sv:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sw:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sxa:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sxb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sxd:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sxe:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sxf:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sy:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sz:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2t:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2tpc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xa:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xd:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xe:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xf:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xg:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xh:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xi:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xj:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xk:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xl:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xm:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xn:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xq:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xr:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xs:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xt:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xu:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xv:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xw:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ya:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yd:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ye:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yf:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yg:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yh:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yj:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yk:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yl:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ym:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yn:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yo:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yp:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yq:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yr:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ys:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yt:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yu:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yv:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yw:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yy:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yz:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2za:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zd:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ze:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zf:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zg:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zh:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zj:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zl:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zn:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zp:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3b:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3bc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3bw:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3ja:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3jea:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3jeb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3jk:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3jx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3t:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3tpc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xa:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xd:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xe:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xf:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xg:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xh:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xi:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xj:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xk:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xq:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xr:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xs:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xu:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xw:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xy:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3ya:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yd:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yf:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yg:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yh:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yi:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yj:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yk:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3ym:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yq:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3ys:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yt:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yu:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yz:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.4:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.4mr:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.4sw:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.4t:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.4xa:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.4xb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.4xc:*:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
GHSA-qmwf-j7g7-f5jw
|
Cross-Site Scripting in third party library mso/idna-convert
|
Make sure to not expose the vendor directory to the publicly accessible document root. In composer managed installation, make sure to configure a dedicated web folder. In general it is recommended to not expose the complete typo3_src sources folder in the document root.
|
[] | null | null | null | null | null |
CVE-2008-7066
|
OpenForum 0.66 Beta allows remote attackers to bypass authentication and reset passwords of other users via a direct request with the update parameter set to 1 and modified user and password parameters.
|
[
"cpe:2.3:a:2enetworx:openforum:0.66:beta:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-8gxf-rfc3-w42v
|
On BIG-IP versions 15.1.x before 15.1.4.1 and 14.1.x before 14.1.4.5, when the HTTP/2 profile is configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
|
[] | null | null | null | null | null |
|
CVE-2022-46889
|
A persistent cross-site scripting (XSS) vulnerability in NexusPHP before 1.7.33 allows remote authenticated attackers to permanently inject arbitrary web script or HTML via the title parameter used in /subtitles.php.
|
[
"cpe:2.3:a:nexusphp:nexusphp:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
|
GHSA-3876-gmcv-479m
|
An issue was discovered on Gemtek WRTM-127ACN 01.01.02.141 and WRTM-127x9 01.01.02.127 devices. The Monitor Diagnostic network page allows an authenticated attacker to execute a command directly on the target machine. Commands are executed as the root user (uid 0). (Even if a login is required, most routers are left with default credentials.)
|
[] | null | 8.8 | null | null | null |
|
CVE-2006-5276
|
Stack-based buffer overflow in the DCE/RPC preprocessor in Snort before 2.6.1.3, and 2.7 before beta 2; and Sourcefire Intrusion Sensor; allows remote attackers to execute arbitrary code via crafted SMB traffic.
|
[
"cpe:2.3:a:snort:snort:*:*:*:*:*:*:*:*",
"cpe:2.3:a:snort:snort:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:snort:snort:2.6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:snort:snort:2.7_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:sourcefire:intrusion_sensor:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sourcefire:intrusion_sensor:4.1:*:crossbeam:*:*:*:*:*",
"cpe:2.3:a:sourcefire:intrusion_sensor:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sourcefire:intrusion_sensor:4.5:*:crossbeam:*:*:*:*:*",
"cpe:2.3:a:sourcefire:intrusion_sensor:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:sourcefire:intrusion_sensor:4.6:*:crossbeam:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2023-39043
|
An information leak in YKC Tokushima_awayokocho Line v13.6.1 allows attackers to obtain the channel access token and send crafted messages.
|
[
"cpe:2.3:a:ykc:tokushima_awayokocho:13.6.1:*:*:*:*:line:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-hcj7-q649-4p6v
|
An issue was discovered in Zoho ManageEngine OpManager through 12.4x. There is a SQL Injection vulnerability in jsp/NewThresholdConfiguration.jsp via the resourceid parameter. Therefore, a low-authority user can gain the authority of SYSTEM on the server. One can consequently upload a malicious file using the "Execute Program Action(s)" feature.
|
[] | null | null | 8.8 | null | null |
|
CVE-2023-49976
|
A cross-site scripting (XSS) vulnerability in Customer Support System v1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the subject parameter at /customer_support/index.php?page=new_ticket.
|
[] | null | 5.4 | null | null | null |
|
GHSA-hp3q-rgpx-37wq
|
Improper access control vulnerability in RegisteredEventMediator.kt SmartThings prior to version 1.7.89.0 allows attackers to access sensitive information via implicit broadcast.
|
[] | null | 7.5 | null | null | null |
|
CVE-2019-11617
|
doorGets 7.0 has a CSRF vulnerability in /doorgets/app/requests/user/configurationRequest.php. A remote attacker can exploit this vulnerability for "Google Analytics code" modification.
|
[
"cpe:2.3:a:doorgets:doorgets_cms:7.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
CVE-2023-36902
|
Windows Runtime Remote Code Execution Vulnerability
|
Windows Runtime Remote Code Execution Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7 | null | null | null |
CVE-2020-25109
|
An issue was discovered in the DNS implementation in Ethernut in Nut/OS 5.1. The number of DNS queries/responses (set in a DNS header) is not checked against the data present. This may lead to successful Denial-of-Service, and possibly Remote Code Execution.
|
[
"cpe:2.3:o:ethernut:nut\\/os:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2024-36389
|
MileSight DeviceHub - CWE-330 Use of Insufficiently Random Values
|
MileSight DeviceHub -
CWE-330 Use of Insufficiently Random Values may allow Authentication Bypass
|
[
"cpe:2.3:a:milesight:devicehub:3.0.1-r1:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
RHSA-2011:1219
|
Red Hat Security Advisory: samba security update
|
samba: mount.cifs improper device name and mountpoint strings sanitization samba: Race condition by mount (mount.cifs) operations samba/cifs-utils: mount.cifs and umount.cifs fail to anticipate RLIMIT_FSIZE (SWAT): Absent CSRF protection in various Samba web configuration formulars (SWAT): XSS flaw in Change Password page Samba mtab lock file race condition
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
GHSA-48x4-5v77-j7h6
|
Barco Control Room Management Suite web application, which is part of TransForm N before 3.14, is exposing a URL /checklogin.jsp endpoint. The os_username parameters is not correctly sanitized, leading to reflected XSS.
|
[] | null | 6.1 | null | null | null |
|
CVE-2025-2889
|
Link Library <= 7.7.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Link Additional Parameters
|
The Link Library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Link Additional Parameters in all versions up to, and including, 7.7.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
GHSA-vhhf-7v7f-q5wv
|
Race condition in the kernel in Sun Solaris 8 through 10 allows local users to cause a denial of service (panic) via unspecified vectors, possibly related to the exitlwps function and SIGKILL and /proc PCAGENT signals.
|
[] | null | null | null | null | null |
|
CVE-2009-3613
|
The swiotlb functionality in the r8169 driver in drivers/net/r8169.c in the Linux kernel before 2.6.27.22 allows remote attackers to cause a denial of service (IOMMU space exhaustion and system crash) by using jumbo frames for a large amount of network traffic, as demonstrated by a flood ping.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.2.27.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.54:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.55:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.56:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.57:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.58:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.59:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.60:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.61:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.62:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.25.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.26:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.26.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.26.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.26.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.26.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.26.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.26.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27:rc9:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.20:*:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
GHSA-97cv-6pjf-5f9q
|
AsyncSSH SSH Server Authentication Bypass
|
The SSH server implementation of AsyncSSH before 1.12.1 does not properly check whether authentication is completed before processing other requests. A customized SSH client can simply skip the authentication step.
|
[] | 9.3 | 9.8 | null | null | null |
CVE-2025-21936
|
Bluetooth: Add check for mgmt_alloc_skb() in mgmt_device_connected()
|
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: Add check for mgmt_alloc_skb() in mgmt_device_connected()
Add check for the return value of mgmt_alloc_skb() in
mgmt_device_connected() to prevent null pointer dereference.
|
[] | null | 5.5 | null | null | null |
CVE-2020-24698
|
An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker might be able to cause a double-free, leading to a crash or possibly arbitrary code execution. by sending crafted queries with a GSS-TSIG signature.
|
[
"cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 6.8 | null |
|
GHSA-65xc-7xv6-p626
|
Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 4.3.20 allows local users to affect integrity and availability via vectors related to VMSVGA virtual graphics device, a different vulnerability than CVE-2014-6588, CVE-2014-6589, CVE-2014-6590, and CVE-2015-0427.
|
[] | null | null | null | null | null |
|
GHSA-wgmm-f3jx-2p53
|
SQL injection vulnerability in category.php in Ebay Clone 2009 allows remote attackers to execute arbitrary SQL commands via the cate_id parameter in a list action.
|
[] | null | null | null | null | null |
|
CVE-2020-0156
|
In NxpNfc::ioctl of NxpNfc.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-139736127
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 | null |
|
CVE-1999-0484
|
Buffer overflow in OpenBSD ping.
|
[
"cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2023-39414
|
Multiple integer underflow vulnerabilities exist in the LXT2 lxt2_rd_iter_radix shift operation functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to memory corruption. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer underflow when performing the right shift operation.
|
[
"cpe:2.3:a:tonybybell:gtkwave:3.3.115:*:*:*:*:*:*:*"
] | null | 7 | null | null | null |
|
CVE-2000-1151
|
Baxter IRC client in BeOS r5 pro and earlier allows remote attackers to conduct a denial of service via a message that contains a long URL.
|
[
"cpe:2.3:a:abisoft:baxter:x:*:*:*:*:*:*:*",
"cpe:2.3:a:abisoft:baxter:y:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-4wrr-wx49-f3mw
|
A relative path traversal vulnerability [CWE-23] in FortiWeb 7.0.0 through 7.0.1, 6.3.6 through 6.3.18, 6.4 all versions may allow an authenticated attacker to obtain unauthorized access to files and data via specifically crafted HTTP GET requests.
|
[] | null | 6.5 | null | null | null |
|
GHSA-q2g3-798p-hqcp
|
The 코드엠샵 소셜톡 plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'msntt_add_plus_talk' shortcode in all versions up to, and including, 1.2.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
CVE-2019-17664
|
NSA Ghidra through 9.0.4 uses a potentially untrusted search path. When executing Ghidra from a given path, the Java process working directory is set to this path. Then, when launching the Python interpreter via the "Ghidra Codebrowser > Window > Python" option, Ghidra will try to execute the cmd.exe program from this working directory.
|
[
"cpe:2.3:a:nsa:ghidra:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.4 | null |
|
GHSA-9gr5-3r4c-wx78
|
Missing Authorization vulnerability in Marian Kanev Cab fare calculator allows Stored XSS. This issue affects Cab fare calculator: from n/a through 1.1.
|
[] | null | 7.1 | null | null | null |
|
CVE-2013-1290
|
Microsoft SharePoint Server 2013, in certain configurations involving legacy My Sites, does not properly establish default access controls for a SharePoint list, which allows remote authenticated users to bypass intended restrictions on reading list items via a direct request for a list's location, aka "Incorrect Access Rights Information Disclosure Vulnerability."
|
[
"cpe:2.3:a:microsoft:sharepoint_server:2013:*:*:*:*:*:*:*"
] | null | null | null | 3.5 | null |
|
CVE-2020-6225
|
SAP NetWeaver (Knowledge Management), versions (KMC-CM - 7.00, 7.01, 7.02, 7.30, 7.31, 7.40, 7.50 and KMC-WPC 7.30, 7.31, 7.40, 7.50), does not sufficiently validate path information provided by users, thus characters representing traverse to parent directory are passed through to the file APIs, allowing the attacker to overwrite, delete, or corrupt arbitrary files on the remote server, leading to Path Traversal.
|
[
"cpe:2.3:a:sap:netweaver_knowledge_management_and_collaboration_\\(kmc-cm\\):7.00:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_knowledge_management_and_collaboration_\\(kmc-cm\\):7.01:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_knowledge_management_and_collaboration_\\(kmc-cm\\):7.02:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_knowledge_management_and_collaboration_\\(kmc-cm\\):7.30:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_knowledge_management_and_collaboration_\\(kmc-cm\\):7.31:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_knowledge_management_and_collaboration_\\(kmc-cm\\):7.40:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_knowledge_management_and_collaboration_\\(kmc-cm\\):7.50:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_knowledge_management_and_collaboration_\\(kmc-wpc\\):7.30:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_knowledge_management_and_collaboration_\\(kmc-wpc\\):7.31:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_knowledge_management_and_collaboration_\\(kmc-wpc\\):7.40:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_knowledge_management_and_collaboration_\\(kmc-wpc\\):7.50:*:*:*:*:*:*:*"
] | null | null | 9.1 | null | null |
|
GHSA-rfjx-v478-qccr
|
Heap-based buffer overflow in Disk Images in Apple Mac OS X 10.5.8 allows user-assisted remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted FAT filesystem on a disk image.
|
[] | null | null | null | null | null |
|
GHSA-gcm5-mx9r-f9mm
|
ctcphandler.cpp in Quassel before 0.6.3 and 0.7.x before 0.7.1 allows remote attackers to cause a denial of service (unresponsive IRC) via multiple Client-To-Client Protocol (CTCP) requests in a PRIVMSG message.
|
[] | null | null | null | null | null |
|
GHSA-fmr7-cqjx-qmxg
|
An issue was discovered in Jave2 version 3.3.1, allows attackers to execute arbitrary code via the FFmpeg function.
|
[] | null | 8.8 | null | null | null |
|
RHSA-2023:0100
|
Red Hat Security Advisory: systemd security and bug fix update
|
systemd: buffer overrun in format_timespan() function
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.5 | null | null | null |
GHSA-hmvf-hh8g-639v
|
Unspecified vulnerability in Lotus Domino 7.0.2 before Fix Pack 3 allows attackers to cause a denial of service via unknown vectors.
|
[] | null | null | null | null | null |
|
GHSA-vvhw-v3wp-4m8r
|
A vulnerability has been identified in SICAM PAS/PQS (All versions >= V8.00 < V8.22). The affected application is installed with specific files and folders with insecure permissions. This could allow an authenticated local attacker to read and modify configuration data in the context of the application process.
|
[] | null | 6.6 | null | null | null |
|
RHSA-2024:9625
|
Red Hat Security Advisory: squid security update
|
squid: Denial of Service processing ESI response content
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null | null |
CVE-2006-1515
|
Buffer overflow in the addnewword function in typespeed 0.4.4 and earlier might allow remote attackers to execute arbitrary code via unknown vectors.
|
[
"cpe:2.3:a:typespeed:typespeed:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:typespeed:typespeed:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:typespeed:typespeed:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:typespeed:typespeed:0.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:typespeed:typespeed:0.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:typespeed:typespeed:0.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:typespeed:typespeed:0.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:typespeed:typespeed:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:typespeed:typespeed:0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:typespeed:typespeed:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:typespeed:typespeed:0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:typespeed:typespeed:0.4.4:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2015-7364
|
The HTML_Quickform library, as used in Revive Adserver before 3.2.2, allows remote attackers to bypass the CSRF protection mechanism via an empty token.
|
[
"cpe:2.3:a:revive-adserver:revive_adserver:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2005-0800
|
PHP remote file inclusion vulnerability in install.php in mcNews 1.3 and earlier allows remote attackers to execute arbitrary PHP code by modifying the l parameter to reference a URL on a remote web server that contains the code, a different vulnerability than CVE-2005-0720.
|
[
"cpe:2.3:a:mcnews:mcnews:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mcnews:mcnews:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mcnews:mcnews:1.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:mcnews:mcnews:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mcnews:mcnews:1.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-mmm3-jq63-7mw5
|
libcsp 2.0 is vulnerable to Buffer Overflow in the csp_eth_init() function due to improper handling of the ifname parameter. The function uses strcpy to copy the interface name into a structure member (ctx->name) without validating the input length.
|
[] | null | 6.5 | null | null | null |
|
GHSA-vpxx-wvjv-769j
|
There is an out-of-bounds read vulnerability in Huawei CloudEngine products. The software reads data past the end of the intended buffer when parsing certain PIM message, an adjacent attacker could send crafted PIM messages to the device, successful exploit could cause out of bounds read when the system does the certain operation.
|
[] | null | null | null | null | null |
|
GHSA-33vv-xpr4-7w8v
|
Four OS command injection vulnerabilities exist in the XCMD testWifiAP functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9X and 6.9Z. A XCMD can lead to arbitrary command execution. An attacker can send a sequence of malicious commands to trigger these vulnerabilities.This vulnerability specifically focuses on the unsafe use of the `WL_SSID` and `WL_SSID_HEX` configuration values in the function at offset `0x1c7d28` of firmware 6.9Z.
|
[] | null | 10 | null | null | null |
|
CVE-2025-38419
|
remoteproc: core: Cleanup acquired resources when rproc_handle_resources() fails in rproc_attach()
|
In the Linux kernel, the following vulnerability has been resolved:
remoteproc: core: Cleanup acquired resources when rproc_handle_resources() fails in rproc_attach()
When rproc->state = RPROC_DETACHED and rproc_attach() is used
to attach to the remote processor, if rproc_handle_resources()
returns a failure, the resources allocated by imx_rproc_prepare()
should be released, otherwise the following memory leak will occur.
Since almost the same thing is done in imx_rproc_prepare() and
rproc_resource_cleanup(), Function rproc_resource_cleanup() is able
to deal with empty lists so it is better to fix the "goto" statements
in rproc_attach(). replace the "unprepare_device" goto statement with
"clean_up_resources" and get rid of the "unprepare_device" label.
unreferenced object 0xffff0000861c5d00 (size 128):
comm "kworker/u12:3", pid 59, jiffies 4294893509 (age 149.220s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 02 88 00 00 00 00 00 00 10 00 00 00 00 00 ............
backtrace:
[<00000000f949fe18>] slab_post_alloc_hook+0x98/0x37c
[<00000000adbfb3e7>] __kmem_cache_alloc_node+0x138/0x2e0
[<00000000521c0345>] kmalloc_trace+0x40/0x158
[<000000004e330a49>] rproc_mem_entry_init+0x60/0xf8
[<000000002815755e>] imx_rproc_prepare+0xe0/0x180
[<0000000003f61b4e>] rproc_boot+0x2ec/0x528
[<00000000e7e994ac>] rproc_add+0x124/0x17c
[<0000000048594076>] imx_rproc_probe+0x4ec/0x5d4
[<00000000efc298a1>] platform_probe+0x68/0xd8
[<00000000110be6fe>] really_probe+0x110/0x27c
[<00000000e245c0ae>] __driver_probe_device+0x78/0x12c
[<00000000f61f6f5e>] driver_probe_device+0x3c/0x118
[<00000000a7874938>] __device_attach_driver+0xb8/0xf8
[<0000000065319e69>] bus_for_each_drv+0x84/0xe4
[<00000000db3eb243>] __device_attach+0xfc/0x18c
[<0000000072e4e1a4>] device_initial_probe+0x14/0x20
|
[] | null | null | null | null | null |
CVE-2024-3000
|
code-projects Online Book System index.php sql injection
|
A vulnerability classified as critical was found in code-projects Online Book System 1.0. This vulnerability affects unknown code of the file /index.php. The manipulation of the argument username/password/login_username/login_password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-258202 is the identifier assigned to this vulnerability.
|
[
"cpe:2.3:a:code-projects:online_book_system:1.0:*:*:*:*:*:*:*"
] | null | 7.3 | 7.3 | 7.5 | null |
RHSA-2023:7379
|
Red Hat Security Advisory: kernel-rt security update
|
kernel: AMD: Cross-Thread Return Address Predictions hw: Intel: Gather Data Sampling (GDS) side channel vulnerability kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: use after free in nvmet_tcp_free_crypto in NVMe kernel: netfilter: potential slab-out-of-bound access due to integer underflow
|
[
"cpe:/a:redhat:rhel_eus:9.2::nfv",
"cpe:/a:redhat:rhel_eus:9.2::realtime"
] | null | 7 | null | null | null |
GHSA-j47j-5wh7-4gmm
|
Cross-site scripting (XSS) vulnerability in the Ajax system in Drupal 7.x before 7.29 allows remote attackers to inject arbitrary web script or HTML via vectors involving forms with an Ajax-enabled textfield and a file field.
|
[] | null | null | null | null | null |
|
GHSA-382q-3qj5-29mx
|
Multiple vulnerabilities in the Admin audit log export feature and Scheduled Reports feature of Cisco Umbrella could allow an authenticated, remote attacker to perform formula and link injection attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
|
[] | null | null | null | null | null |
|
GHSA-qg4g-qvgv-f8q2
|
The DMSDP module of the distributed hardware has a vulnerability that may cause imposter control connections.Successful exploitation of this vulnerability may disconnect normal service connections.
|
[] | null | 7.5 | null | null | null |
|
GHSA-mgmg-f25r-3gfh
|
In the Linux kernel, the following vulnerability has been resolved:drm/amdgpu: fix gart.bo pin_count leakgmc_v{9,10}_0_gart_disable() isn't called matched with
correspoding gart_enbale function in SRIOV case. This will
lead to gart.bo pin_count leak on driver unload.
|
[] | null | null | null | null | null |
|
GHSA-w674-gwmc-q98r
|
IBM MQ Managed File Transfer Agent 8.0 and 9.0 sets insecure permissions on certain files it creates. A local attacker could exploit this vulnerability to modify or delete data contained in the files with an unknown impact. IBM X-Force ID: 134391.
|
[] | null | null | 3.3 | null | null |
|
CVE-2020-7490
|
A CWE-426: Untrusted Search Path vulnerability exists in Vijeo Designer Basic (V1.1 HotFix 15 and prior) and Vijeo Designer (V6.9 SP9 and prior), which could cause arbitrary code execution on the system running Vijeo Basic when a malicious DLL library is loaded by the Product.
|
[
"cpe:2.3:a:schneider-electric:vijeo_designer:*:*:*:*:basic:*:*:*",
"cpe:2.3:a:schneider-electric:vijeo_designer:*:*:*:*:-:*:*:*",
"cpe:2.3:a:schneider-electric:vijeo_designer:1.1:-:*:*:basic:*:*:*",
"cpe:2.3:a:schneider-electric:vijeo_designer:1.1:hotfix_15:*:*:basic:*:*:*",
"cpe:2.3:a:schneider-electric:vijeo_designer:6.9:-:*:*:-:*:*:*",
"cpe:2.3:a:schneider-electric:vijeo_designer:6.9:sp9:*:*:-:*:*:*"
] | null | 7.8 | null | 6.9 | null |
|
GHSA-qf3r-32r9-2wvh
|
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wepkey1 parameter at /goform/WifiBasicSet.
|
[] | null | 9.8 | null | null | null |
|
GHSA-fmxm-fv27-gg49
|
extract_user_to_sg in lib/scatterlist.c in the Linux kernel before 6.4.2 fails to unpin pages in a certain situation, as demonstrated by a WARNING for try_grab_page.
|
[] | null | 9.1 | null | null | null |
|
CVE-2021-29578
|
Heap buffer overflow in `FractionalAvgPoolGrad`
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.FractionalAvgPoolGrad` is vulnerable to a heap buffer overflow. The implementation(https://github.com/tensorflow/tensorflow/blob/dcba796a28364d6d7f003f6fe733d82726dda713/tensorflow/core/kernels/fractional_avg_pool_op.cc#L216) fails to validate that the pooling sequence arguments have enough elements as required by the `out_backprop` tensor shape. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
|
[
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*"
] | null | 2.5 | null | null | null |
GHSA-53q7-x4c6-g4jg
|
Multiple cross-site scripting (XSS) vulnerabilities in PBLang 4.65 allow remote attackers to inject arbitrary web script or HTML via (1) the search string to search.php, (2) the subject of a PM, which is processed by pm.php, or (3) the body of a PM, which is processed by pmpshow.php.
|
[] | null | null | null | null | null |
|
GHSA-6xx4-rhcp-hfhm
|
The cbstream.sys driver in Carbon Black 5.1.1.60603 allows local users with admin privileges to cause a denial of service (out-of-bounds read and system crash) via a large counter value in an 0x62430028 IOCTL call.
|
[] | null | null | 4.4 | null | null |
|
GHSA-j6cv-ghpp-phc2
|
Adobe ColdFusion 2016 update 15 and earlier versions, and ColdFusion 2018 update 9 and earlier versions have a dll search-order hijacking vulnerability. Successful exploitation could lead to privilege escalation.
|
[] | null | 7.8 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.