Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
GHSA-2cw7-vx4f-3wmm
Comment properties in Atlassian Jira Server and Data Center before version 7.13.12, from 8.0.0 before version 8.5.4, and 8.6.0 before version 8.6.1 allows remote attackers to make comments on a ticket to which they do not have commenting permissions via a broken access control bug.
[]
GHSA-f6x7-q479-7278
The WP-Table Reloaded WordPress plugin through 1.9.4 does not validate and escapes some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as a contributor to perform Stored Cross-Site Scripting attacks, which could be used against high privilege users such as admins.
[]
CVE-1999-0226
Windows NT TCP/IP processes fragmented IP packets improperly, causing a denial of service.
[ "cpe:2.3:o:microsoft:windows_nt:-:*:*:*:*:*:*:*" ]
CVE-2019-14697
musl libc through 1.1.23 has an x87 floating-point stack adjustment imbalance, related to the math/i386/ directory. In some cases, use of this library could introduce out-of-bounds writes that are not present in an application's source code.
[ "cpe:2.3:a:musl-libc:musl:*:*:*:*:*:*:x86:*" ]
CVE-2005-1700
SQL injection vulnerability in pnadmin.php in the Xanthia module in PostNuke 0.760-RC3 allows remote administrators to execute arbitrary SQL commands via the riga[0] parameter.
[ "cpe:2.3:a:postnuke_software_foundation:postnuke:0.760_rc3:*:*:*:*:*:*:*" ]
CVE-2021-33079
Protection mechanism failure in firmware for some Intel(R) SSD DC Products may allow a privileged user to potentially enable information disclosure via local access.
[ "cpe:2.3:o:intel:ssd_600p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ssd_600p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ssd_660p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ssd_660p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ssd_665p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ssd_665p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ssd_670p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ssd_670p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ssd_700p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ssd_700p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ssd_760p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ssd_760p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ssd_d3-s4510_m.2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ssd_d3-s4510_m.2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ssd_dc_p4510_sff_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ssd_dc_p4510_sff:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ssd_d3-s4610_m.2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ssd_d3-s4610_m.2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ssd_dc_p4610_sff_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ssd_dc_p4610_sff:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ssd_d5-p4326_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ssd_d5-p4326:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ssd_d5-p5316_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ssd_d5-p5316:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ssd_d7_p5510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ssd_d7_p5510:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ssd_d7_p5600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ssd_d7_p5600:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ssd_dc_d4512_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ssd_dc_d4512:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ssd_dc_p3100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ssd_dc_p3100:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ssd_dc_p4101_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ssd_dc_p4101:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ssd_dc_p4500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ssd_dc_p4500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ssd_dc_p4501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ssd_dc_p4501:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ssd_dc_p4510_edsff_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ssd_dc_p4510_edsff:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ssd_dc_p4511_edsff_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ssd_dc_p4511_edsff:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ssd_dc_p4511_m.2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ssd_dc_p4511_m.2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ssd_dc_p4600_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ssd_dc_p4600:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ssd_dc_p4608_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ssd_dc_p4608:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ssd_dc_s4500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ssd_dc_s4500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ssd_dc_s4600_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ssd_dc_s4600:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ssd_e_6000p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ssd_e_6000p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ssd_e_6100p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ssd_e_6100p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ssd_pro_6000p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ssd_pro_6000p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ssd_pro_7600p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ssd_pro_7600p:-:*:*:*:*:*:*:*" ]
CVE-2018-9043
In Advanced SystemCare Ultimate 11.0.1.58, the driver file (Monitor_win10_x64.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c4060d0.
[ "cpe:2.3:a:iobit:advanced_systemcare_ultimate:11.0.1.58:*:*:*:*:*:*:*" ]
GHSA-8mpq-wx83-686r
Vulnerability in MasqMail before 0.1.15 allows local users to gain privileges via piped aliases.
[]
GHSA-chcf-c8w2-7x53
Trusty contains a vulnerability in all TAs whose deserializer does not reject messages with multiple occurrences of the same parameter. The deserialization of untrusted data might allow an attacker to exploit the deserializer to impact code execution.
[]
CVE-2012-5811
The Breezy application for Android does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
[ "cpe:2.3:a:breezy:breezy:-:-:*:*:*:android:*:*" ]
GHSA-9v9h-6mq4-jrpg
Unspecified vulnerability in the Oracle Identity Manager component in Oracle Fusion Middleware 11.1.1.5, 11.1.1.7, 11.1.2.0, and 11.1.2.1 allows remote attackers to affect integrity via unknown vectors related to End User Self Service.
[]
CVE-2023-27075
A cross-site scripting vulnerability (XSS) in the component microbin/src/pasta.rs of Microbin v1.2.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
[ "cpe:2.3:a:microbin:microbin:1.2.0:*:*:*:*:*:*:*" ]
GHSA-9m49-j2g8-82x8
Buffer Overflow found in Nginx NJS allows a remote attacker to execute arbitrary code via the njs_object_property parameter of the njs/njs_vm.c function.
[]
GHSA-9f7p-38pj-28rv
Microsoft Dynamics Unified Service Desk Remote Code Execution Vulnerability
[]
CVE-2023-23720
WordPress Verified Reviews (Avis Vérifiés) Plugin <= 2.3.13 is vulnerable to Cross Site Scripting (XSS)
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in NetReviews SAS Verified Reviews (Avis Vérifiés) plugin <= 2.3.13 versions.
[ "cpe:2.3:a:skeepers:verified_reviews_\\(avis_verifies\\):*:*:*:*:*:wordpress:*:*" ]
GHSA-5vhc-vppw-pc2v
IBM DB2 9.7 before FP10 and 9.8 through FP5 on Linux, UNIX, and Windows allows remote authenticated users to cause a denial of service (daemon crash) via a crafted ALTER TABLE statement.
[]
GHSA-wv8f-fxfc-vvj4
An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) software. The Quram image codec library allows attackers to overwrite memory and execute arbitrary code via crafted JPEG data that is mishandled during decoding. The Samsung IDs are SVE-2020-18088, SVE-2020-18225, SVE-2020-18301 (September 2020).
[]
GHSA-67ff-w5w8-gx2c
SQL injection vulnerability in the u2u_send_recp function in u2u.inc.php in XMB (aka extreme message board) 1.9.6 Alpha and earlier allows remote attackers to execute arbitrary SQL commands via the u2uid parameter to u2u.php, which is directly accessed from $_POST and bypasses the protection scheme.
[]
GHSA-3rcc-385q-f2hc
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getPageNthWordQuads method. By performing actions in JavaScript, an attacker can trigger a type confusion condition. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-6022.
[]
CVE-2022-46882
A use-after-free in WebGL extensions could have led to a potentially exploitable crash. This vulnerability affects Firefox < 107, Firefox ESR < 102.6, and Thunderbird < 102.6.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" ]
CVE-2023-26511
A Hard Coded Admin Credentials issue in the Web-UI Admin Panel in Propius MachineSelector 6.6.0 and 6.6.1 allows remote attackers to gain access to the admin panel Propiusadmin.php, which allows taking control of the affected system.
[ "cpe:2.3:a:propius:machineselector:6.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:propius:machineselector:6.6.1:*:*:*:*:*:*:*" ]
GHSA-qcg7-g679-h3pp
b2evolution CMS v7.2.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the User login page. This vulnerability allows attackers to escalate privileges.
[]
CVE-2007-1015
SQL injection vulnerability in HaberDetay.asp in Aktueldownload Haber script allows remote attackers to execute arbitrary SQL commands via the id parameter.
[ "cpe:2.3:a:aktueldownload:aktueldownload_haber_script:*:*:*:*:*:*:*:*" ]
CVE-2024-11141
Sailthru Triggermail < 1.1 - Subscriber+ Stored XSS
The Sailthru Triggermail WordPress plugin through 1.1 does not sanitise and escape some of its settings and is missing CSRF protection which could allow subscribers to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
[]
CVE-2021-40373
playSMS before 1.4.5 allows Arbitrary Code Execution by entering PHP code at the #tabs-information-page of core_main_config, and then executing that code via the index.php?app=main&inc=core_welcome URI.
[ "cpe:2.3:a:playsms:playsms:*:*:*:*:*:*:*:*" ]
CVE-2024-2493
Session Hijacking Vulnerability in Hitachi Ops Center Analyzer
Session Hijacking vulnerability in Hitachi Ops Center Analyzer.This issue affects Hitachi Ops Center Analyzer: from 10.0.0-00 before 11.0.1-00.
[ "cpe:2.3:a:hitachi:alaxala:ax:*:*:*:*:*:*:*" ]
CVE-2020-7998
An arbitrary file upload vulnerability has been discovered in the Super File Explorer app 1.0.1 for iOS. The vulnerability is located in the developer path that is accessible and hidden next to the root path. By default, there is no password set for the FTP or Web UI service.
[ "cpe:2.3:a:super_file_explorer_project:super_file_explorer:1.0.1:*:*:*:*:iphone_os:*:*" ]
CVE-2023-46980
An issue in Best Courier Management System v.1.0 allows a remote attacker to execute arbitrary code and escalate privileges via a crafted script to the userID parameter.
[ "cpe:2.3:a:mayurik:best_courier_management_system:1.0:*:*:*:*:*:*:*" ]
GHSA-pp59-q999-89rh
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in VietFriend team FriendStore for WooCommerce allows Reflected XSS.This issue affects FriendStore for WooCommerce: from n/a through 1.4.2.
[]
CVE-2005-2958
Multiple format string vulnerabilities in the GNOME Data Access library for GNOME2 (libgda2) 1.2.1 and earlier allow attackers to execute arbitrary code.
[ "cpe:2.3:a:gnome:libgda2:*:*:*:*:*:*:*:*" ]
CVE-2024-0829
The Comments Extra Fields For Post,Pages and CPT plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 5.0. This is due to missing or incorrect capability checks on several ajax actions. This makes it possible for authenticated attackers, with subscriber access or higher, to invoke those actions. As a result, they may modify comment form fields and update plugin settings.
[]
GHSA-g2jf-mr78-35jh
In 2N Access Commander versions 3.1.1.2 and prior, a local attacker can escalate their privileges in the system which could allow for arbitrary code execution with root permissions.
[]
CVE-2020-15858
Some devices of Thales DIS (formerly Gemalto, formerly Cinterion) allow Directory Traversal by physically proximate attackers. The directory path access check of the internal flash file system can be circumvented. This flash file system can store application-specific data and data needed for customer Java applications, TLS and OTAP (Java over-the-air-provisioning) functionality. The affected products and releases are: BGS5 up to and including SW RN 02.000 / ARN 01.001.06 EHSx and PDSx up to and including SW RN 04.003 / ARN 01.000.04 ELS61 up to and including SW RN 02.002 / ARN 01.000.04 ELS81 up to and including SW RN 05.002 / ARN 01.000.04 PLS62 up to and including SW RN 02.000 / ARN 01.000.04
[ "cpe:2.3:o:thalesgroup:bgs5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:thalesgroup:bgs5:-:*:*:*:*:*:*:*", "cpe:2.3:o:thalesgroup:ehs5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:thalesgroup:ehs5:-:*:*:*:*:*:*:*", "cpe:2.3:o:thalesgroup:ehs8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:thalesgroup:ehs8:-:*:*:*:*:*:*:*", "cpe:2.3:o:thalesgroup:ehs6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:thalesgroup:ehs6:-:*:*:*:*:*:*:*", "cpe:2.3:o:thalesgroup:pds5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:thalesgroup:pds5:-:*:*:*:*:*:*:*", "cpe:2.3:o:thalesgroup:pds6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:thalesgroup:pds6:-:*:*:*:*:*:*:*", "cpe:2.3:o:thalesgroup:els61_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:thalesgroup:els61:-:*:*:*:*:*:*:*", "cpe:2.3:o:thalesgroup:els81_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:thalesgroup:els81:-:*:*:*:*:*:*:*", "cpe:2.3:o:thalesgroup:pls62_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:thalesgroup:pls62:-:*:*:*:*:*:*:*" ]
CVE-2016-6971
Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1089, CVE-2016-1091, CVE-2016-6944, CVE-2016-6945, CVE-2016-6946, CVE-2016-6949, CVE-2016-6952, CVE-2016-6953, CVE-2016-6961, CVE-2016-6962, CVE-2016-6963, CVE-2016-6964, CVE-2016-6965, CVE-2016-6967, CVE-2016-6968, CVE-2016-6969, CVE-2016-6979, CVE-2016-6988, and CVE-2016-6993.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*" ]
CVE-2025-32570
WordPress ChillPay WooCommerce Plugin <= 2.5.3 - CSRF to Stored XSS vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ChillPay ChillPay WooCommerce allows Stored XSS. This issue affects ChillPay WooCommerce: from n/a through 2.5.3.
[]
GHSA-p6pr-hg74-p34g
Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Core). Supported versions that are affected are 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0 and 12.2.0. Easily exploitable vulnerability allows physical access to compromise Oracle FLEXCUBE Universal Banking. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle FLEXCUBE Universal Banking accessible data. CVSS v3.0 Base Score 2.1 (Confidentiality impacts).
[]
GHSA-mgj6-95h9-vg3g
An issue in Ocuco Innovation APPMANAGER.EXE v.2.10.24.51 allows a local attacker to escalate privileges via the application manager function
[]
CVE-2022-31959
Rescue Dispatch Management System v1.0 is vulnerable to SQL Injection via /rdms/admin/teams/manage_team.php?id=.
[ "cpe:2.3:a:rescue_dispatch_management_system_project:rescue_dispatch_management_system:1.0:*:*:*:*:*:*:*" ]
CVE-2024-13274
Open Social - Moderately critical - Denial of Service - SA-CONTRIB-2024-038
Improper Control of Interaction Frequency vulnerability in Drupal Open Social allows Functionality Misuse.This issue affects Open Social: from 0.0.0 before 12.3.8, from 12.4.0 before 12.4.5.
[]
GHSA-q88h-2478-95xj
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Scott Paterson Contact Form 7 – PayPal & Stripe Add-on allows Stored XSS. This issue affects Contact Form 7 – PayPal & Stripe Add-on: from n/a through 2.3.4.
[]
CVE-2021-36975
Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2183:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2183:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2183:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2183:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1801:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1801:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1801:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1237:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1237:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1237:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.230:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1237:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1237:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1237:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1237:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1237:*:*:*:*:*:*:*" ]
GHSA-p3v4-rqhv-6x2v
Use after free in Aura in Google Chrome on Windows prior to 108.0.5359.124 allowed a remote attacker who convinced the user to engage in specific UI interactions to potentially exploit heap corruption via specific UI interactions. (Chromium security severity: High)
[]
CVE-2015-5692
admin_messages.php in the management console on Symantec Web Gateway (SWG) appliances with software before 5.2.2 DB 5.0.0.1277 allows remote authenticated users to execute arbitrary code by uploading a file with a safe extension and content type, and then leveraging an improper Sudo configuration to make this a setuid-root file.
[ "cpe:2.3:a:symantec:web_gateway:*:*:*:*:*:*:*:*" ]
CVE-2009-2202
Apple QuickTime before 7.6.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted H.264 movie file.
[ "cpe:2.3:a:apple:quicktime:*:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:*:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:-:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:4.1.2:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:4.1.2:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:5.0.1:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:5.0.1:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:5.0.2:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:5.0.2:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.0:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.0.0:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.0.0:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.0.1:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.0.1:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.0.2:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.0.2:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.1.0:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.1.0:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.1.1:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.1.1:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.2.0:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.2.0:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.3.0:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.3.0:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.4.0:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.4.0:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.5.0:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.5.0:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.5.1:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.5.1:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.5.2:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.5.2:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0:*:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.0:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.0:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.1:*:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.1:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.1:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.2:*:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.2:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.2:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.3:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.3:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.4:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.4:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.0:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.0:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.1:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.1:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.2:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.2:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.3:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.3:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.4:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.4:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.5:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.5:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.6:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.6:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.2.0:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.2.0:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.2.1:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.2.1:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.3.0:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.3.0:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.3.1:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.3.1:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.0:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.0:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.1:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.1:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.5:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.5:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.5.0:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.5.0:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.5.5:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.5.5:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.6.0:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.6.0:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.6.1:*:*:*:*:*:*:*" ]
GHSA-cwpw-7c39-pv7m
Cross Site Scripting vulnerability in openPetra v.2023.02 allows a remote attacker to obtain sensitive information via the serverMHospitality.asmx function.
[]
GHSA-cvq5-xpq7-3jw4
CSRF in admin/edit-comments.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to edit a comment, given the id, via a crafted request.
[]
CVE-2008-2556
SQL injection vulnerability in read.php in PHP Visit Counter 0.4 and earlier allows remote attackers to execute arbitrary SQL commands via the datespan parameter in a read action.
[ "cpe:2.3:a:hessel_brouwer:php_visit_counter:*:*:*:*:*:*:*:*" ]
GHSA-826p-hc8r-6r48
Path Traversal: '/absolute/pathname/here' vulnerability in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows remote authenticated attacker to gain unintended access to files on the system via carefully constructed HTTP requests.
[]
CVE-2020-12729
MagicMotion Flamingo 2 has a lack of access control for reading from device descriptors.
[ "cpe:2.3:o:magicsmotion:flamingo_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:magicsmotion:flamingo_2:-:*:*:*:*:*:*:*" ]
GHSA-chv5-2f3c-f6gx
IBM Jazz for Service Management is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 231381.
[]
GHSA-29xm-2gqv-p5cq
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in GuardGiant Brute Force Protection WordPress Brute Force Protection – Stop Brute Force Attacks.This issue affects WordPress Brute Force Protection – Stop Brute Force Attacks: from n/a through 2.2.5.
[]
GHSA-hc3w-v383-9gm8
SQL injection vulnerability in Resumes/TD_RESUME_Indlist.asp in Techno Dreams (T-Dreams) Job Career Package 3.0 allows remote attackers to execute arbitrary SQL commands via the z_Residency parameter.
[]
CVE-2023-43354
Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Profiles parameter in the Extensions -MicroTiny WYSIWYG editor component.
[ "cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.18:*:*:*:*:*:*:*" ]
GHSA-w9jr-g766-pf8c
Open Redirect vulnerability in Corezoid Process Engine v6.5.0 allows attackers to redirect to arbitrary websites via appending a crafted link to /login/ in the login page URL.
[]
GHSA-m74j-vg2v-q7jj
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link AC1750 prior to 1.1.4 Build 20211022 rel.59103(5553) routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the NetUSB.ko module. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15835.
[]
CVE-2014-100029
Multiple directory traversal vulnerabilities in class/session.php in Ganesha Digital Library (GDL) 4.2 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) newlang or (2) newtheme parameter.
[ "cpe:2.3:a:ganesha_digital_library_project:ganesha_digital_library:4.2:*:*:*:*:*:*:*" ]
CVE-2022-36601
The Eclipse TCF debug interface in JasMiner-X4-Server-20220621-090907 and below is open on port 1534. This issue allows unauthenticated attackers to gain root privileges on the affected device and access sensitive data or execute arbitrary commands.
[ "cpe:2.3:o:jinglemining:jasminer_x4_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:jinglemining:jasminer_x4_server:-:*:*:*:*:*:*:*" ]
GHSA-3h37-cc2v-wm7x
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mydata Informatics Ticket Sales Automation allows Blind SQL Injection.This issue affects Ticket Sales Automation: before 03.04.2025 (DD.MM.YYYY).
[]
CVE-2018-6169
Lack of timeout on extension install prompt in Extensions in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to trigger installation of an unwanted extension via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" ]
CVE-2014-0879
Stack-based buffer overflow in the Taskmaster Capture ActiveX control in IBM Datacap Taskmaster Capture 8.0.1, and 8.1 before FP2, allows remote attackers to execute arbitrary code via unspecified vectors.
[ "cpe:2.3:a:ibm:datacap_taskmaster_capture:8.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:datacap_taskmaster_capture:8.1:*:*:*:*:*:*:*" ]
CVE-2020-15602
An untrusted search path remote code execution (RCE) vulnerability in the Trend Micro Secuity 2020 (v16.0.0.1146 and below) consumer family of products could allow an attacker to run arbitrary code on a vulnerable system. As the Trend Micro installer tries to load DLL files from its current directory, an arbitrary DLL could also be loaded with the same privileges as the installer if run as Administrator. User interaction is required to exploit the vulnerbaility in that the target must open a malicious directory or device.
[ "cpe:2.3:a:trendmicro:antivirus\\+_2020:*:*:*:*:*:*:*:*", "cpe:2.3:a:trendmicro:internet_security_2020:*:*:*:*:*:*:*:*", "cpe:2.3:a:trendmicro:maximum_security_2020:*:*:*:*:*:*:*:*", "cpe:2.3:a:trendmicro:premium_security_2020:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
GHSA-5c6j-5c43-8hhw
dataTaker DT8x dEX 1.72.007 allows remote attackers to compose programs or schedules, for purposes such as sending e-mail messages or making outbound connections to FTP servers for uploading data.
[]
GHSA-x3cr-x949-h5jv
RDF4J vulnerable to zip slip
RDF4J prior to 2.5.0 allows Directory Traversal via ../ in an entry in a ZIP archive.
[]
CVE-2025-26880
WordPress SKT Skill Bar plugin <= 2.3 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in sonalsinha21 SKT Skill Bar allows Stored XSS. This issue affects SKT Skill Bar: from n/a through 2.3.
[]
GHSA-qr35-h6w8-mx66
VMware Workspace One UEM update addresses an information exposure vulnerability.  A malicious actor with network access to the Workspace One UEM may be able to perform an attack resulting in an information exposure.
[]
CVE-2008-4161
SQL injection vulnerability in search_inv.php in Assetman 2.5b allows remote attackers to execute arbitrary SQL commands and conduct session fixation attacks via a combination of crafted order and order_by parameters in a search_all action.
[ "cpe:2.3:a:assetman:assetman:2.5b:*:*:*:*:*:*:*" ]
CVE-2024-4870
Frontend Registration – Contact Form 7 <= 5.1 - Authenticated (Editor+) Privilege Escalation
The Frontend Registration – Contact Form 7 plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 5.1 due to insufficient restriction on the '_cf7frr_' post meta. This makes it possible for authenticated attackers, with editor-level access and above, to modify the default user role in the registration form settings.
[]
CVE-2021-24864
WP Cloudy < 4.4.9 - Admin+ SQL Injection
The WP Cloudy, weather plugin WordPress plugin before 4.4.9 does not escape the post_id parameter before using it in a SQL statement in the admin dashboard, leading to a SQL Injection issue
[ "cpe:2.3:a:wpscan:wp_cloudy:*:*:*:*:*:wordpress:*:*" ]
CVE-2017-17972
packages/subjects/pub/subjects.php in Archon 3.21 rev-1 has XSS in the referer parameter in an index.php?subjecttypeid=xxx request, aka Open Bug Bounty ID OBB-466362.
[ "cpe:2.3:a:archon_project:archon:3.21:rev-1:*:*:*:*:*:*" ]
CVE-2013-3348
Adobe Shockwave Player before 12.0.3.133 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
[ "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.6.8.638:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:12.0.0.112:*:*:*:*:*:*:*" ]
CVE-2020-27481
An unauthenticated SQL Injection vulnerability in Good Layers LMS Plugin <= 2.1.4 exists due to the usage of "wp_ajax_nopriv" call in WordPress, which allows any unauthenticated user to get access to the function "gdlr_lms_cancel_booking" where POST Parameter "id" was sent straight into SQL query without sanitization.
[ "cpe:2.3:a:goodlayers:good_learning_management_system:*:*:*:*:*:wordpress:*:*" ]
GHSA-phvq-jfg5-v663
An issue was discovered on the D-Link DWR-932B router. Undocumented TELNET and SSH services provide logins to admin with the password admin and root with the password 1234.
[]
CVE-2023-44156
Sensitive information disclosure due to spell-jacking. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
[ "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*", "cpe:2.3:a:acronis:cyber_protect:15:update5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2021-20133
Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 are affected by an absolute path traversal vulnerability that allows a remote, authenticated attacker to set the "message of the day" banner to any file on the system, allowing them to read all or some of the contents of those files. Such sensitive information as hashed credentials, hardcoded plaintext passwords for other services, configuration files, and private keys can be disclosed in this fashion. Improper handling of filenames that identify virtual resources, such as "/dev/urandom" allows an attacker to effect a denial of service attack against the command line interfaces of the Quagga services (zebra and ripd).
[ "cpe:2.3:o:dlink:dir-2640-us_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-2640-us:-:*:*:*:*:*:*:*" ]
CVE-2023-31794
MuPDF v1.21.1 was discovered to contain an infinite recursion in the component pdf_mark_list_push. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted PDF file.
[ "cpe:2.3:a:artifex:mupdf:1.21.1:*:*:*:*:*:*:*" ]
CVE-2015-1224
The VpxVideoDecoder::VpxDecode function in media/filters/vpx_video_decoder.cc in the vpxdecoder implementation in Google Chrome before 41.0.2272.76 does not ensure that alpha-plane dimensions are identical to image dimensions, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted VPx video data.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
GHSA-4fmm-8299-wjj4
Stack-based buffer overflow in the PGMWebHandler::parse_request function in the StarTeam Multicast Service component (STMulticastService) 6.4 in Borland CaliberRM 2006 allows remote attackers to execute arbitrary code via a large HTTP request.
[]
CVE-2024-58124
Access control vulnerability in the security verification module Impact: Successful exploitation of this vulnerability will affect integrity and confidentiality.
[]
GHSA-fw6r-h3xv-rhgf
PHP Scripts Mall Responsive Video News Script has XSS via the Search Bar. This might, for example, be leveraged for HTML injection or URL redirection.
[]
CVE-2023-32990
A missing permission check in Jenkins Azure VM Agents Plugin 852.v8d35f0960a_43 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified Azure Cloud server using attacker-specified credentials IDs obtained through another method.
[ "cpe:2.3:a:jenkins:azure_vm_agents:*:*:*:*:*:jenkins:*:*" ]
CVE-2020-35261
Cross Site Scripting (XSS) vulnerability in sourcecodester Multi Restaurant Table Reservation System 1.0 via the Restaurant Name field to /dashboard/profile.php.
[ "cpe:2.3:a:multi_restaurant_table_reservation_system_project:multi_restaurant_table_reservation_system:1.0:*:*:*:*:*:*:*" ]
GHSA-c5gm-gj7m-3h35
The customization template in Red Hat CloudForms 3.1 Management Engine (CFME) 5.3 uses a default password for the root account when a password is not specified for a new image, which allows remote attackers to gain privileges.
[]
GHSA-8w5g-q885-39xw
A SQL Injection issue in the request body processing in BOS IPCs with firmware 21.45.8.2.2_220219 before 21.45.8.2.3_230220 allows remote attackers to obtain sensitive information from the database via crafted input in the request body.
[]
GHSA-xr88-75g2-cjj4
rpc-gssd in nfs-utils before 1.2.8 performs reverse DNS resolution for server names during GSSAPI authentication, which might allow remote attackers to read otherwise-restricted files via DNS spoofing attacks.
[]
GHSA-f7f4-7h2h-h92r
apt-setup in Debian GNU/Linux installs the apt.conf file with insecure permissions, which allows local users to obtain sensitive information such as passwords.
[]
GHSA-rc73-pc24-f3rr
In Wireshark before 2.2.12, the MRDISC dissector misuses a NULL pointer and crashes. This was addressed in epan/dissectors/packet-mrdisc.c by validating an IPv4 address. This vulnerability is similar to CVE-2017-9343.
[]
CVE-2014-7086
The Killer Screen lock (aka com.cc.theme.shashou) application 0.5 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:killer_screen_lock_project:killer_screen_lock:0.5:*:*:*:*:android:*:*" ]
CVE-2019-0303
SAP BusinessObjects Business Intelligence Platform (Administration Console), versions 4.2, 4.3, module BILogon/appService.jsp is reflecting requested parameter errMsg into response content without sanitation. This could be used by an attacker to build a special url that execute custom JavaScript code when the url is accessed.
[ "cpe:2.3:a:sap:businessobjects:4.2:*:*:*:*:*:*:*", "cpe:2.3:a:sap:businessobjects:4.3:*:*:*:*:*:*:*" ]
CVE-2022-2843
MotoPress Timetable and Event Schedule Quick Edit admin-ajax.php cross site scripting
A vulnerability was found in MotoPress Timetable and Event Schedule. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /wp-admin/admin-ajax.php of the component Quick Edit. The manipulation of the argument post_title with the input <img src=x onerror=alert`2`> leads to cross site scripting. The attack may be launched remotely. VDB-206486 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:motopress:timetable_and_event_schedule:-:*:*:*:*:wordpress:*:*" ]
GHSA-v9mp-h44v-2qrv
A vulnerability was found in Dynacase Webdesk and classified as critical. Affected by this issue is the function freedomrss_search of the file freedomrss_search.php. The manipulation leads to sql injection. Upgrading to version 3.2-20180305 is able to address this issue. The patch is identified as 750a9b35af182950c952faf6ddfdcc50a2b25f8b. It is recommended to upgrade the affected component. VDB-233366 is the identifier assigned to this vulnerability.
[]
CVE-2018-1029
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka "Microsoft Excel Remote Code Execution Vulnerability." This affects Microsoft Excel Viewer, Microsoft Office, Microsoft Excel. This CVE ID is unique from CVE-2018-0920, CVE-2018-1011, CVE-2018-1027.
[ "cpe:2.3:a:microsoft:excel:2007:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2010:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2013:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:mac_os_x:*:*", "cpe:2.3:a:microsoft:excel:2016:*:*:*:click-to-run:*:*:*", "cpe:2.3:a:microsoft:excel_viewer:2007:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_compatibility_pack:-:sp3:*:*:*:*:*:*" ]
CVE-2019-3779
Cloud Foundry Container Runtime allows a user to bypass security policy when talking to ETCD
Cloud Foundry Container Runtime, versions prior to 0.29.0, deploys Kubernetes clusters utilize the same CA (Certificate Authority) to sign and trust certs for ETCD as used by the Kubernetes API. This could allow a user authenticated with a cluster to request a signed certificate leveraging the Kubernetes CSR capability to obtain a credential that could escalate privilege access to ETCD.
[ "cpe:2.3:a:cloudfoundry:container_runtime:*:*:*:*:*:*:*:*" ]
CVE-2023-33097
Buffer Over-read in WLAN Firmware
Transient DOS in WLAN Firmware while processing a FTMR frame.
[ "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:csr8811:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:immersive_home_214_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:immersive_home_214_platform:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:immersive_home_216_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:immersive_home_216_platform:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:immersive_home_316_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:immersive_home_316_platform:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:immersive_home_318_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:immersive_home_318_platform:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:immersive_home_3210_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:immersive_home_3210_platform:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:immersive_home_326_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:immersive_home_326_platform:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq5010_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq5010:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq5028_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq5028:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq5332_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq5332:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq6000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq6000:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq6010_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq6010:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq6028_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq6028:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8070a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8070a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8071a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8071a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8072a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8072a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8074a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8074a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8076_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8076:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8076a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8076a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8078_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8078:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8078a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8078a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8173_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8173:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8174_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8174:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq9008_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq9008:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq9554_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq9554:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq9570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq9570:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq9574_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq9574:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca0000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca0000:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca4024_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca4024:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6554a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6554a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6797aq:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8072_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8072:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8075_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8075:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8082_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8082:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8084_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8084:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8085_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8085:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8386_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8386:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9888_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9888:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9889_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9889:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcc2073_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcc2073:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcc2076_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcc2076:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcf8000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcf8000:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcf8001_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcf8001:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5022_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5022:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5024_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5024:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5052_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5052:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5054_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5054:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5122_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5122:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5124_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5124:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5152_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5152:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5154_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5154:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5164_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5164:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6023_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6023:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6112_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6112:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6122_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6122:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6132_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6132:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9000:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9001_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9001:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9002_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9002:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9003_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9003:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9012:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9013_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9013:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9022_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9022:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9070:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9072_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9072:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9100:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9274_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9274:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sc8380xp:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_8_gen1_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx65m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx65m:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1_platform:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ssg2115p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ssg2125p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr1230p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*" ]
CVE-2024-24215
An issue in the component /cgi-bin/GetJsonValue.cgi of Cellinx NVT Web Server 5.0.0.014 allows attackers to leak configuration information via a crafted POST request.
[ "cpe:2.3:a:cellinx:nvt_web_server:5.0.0.014:*:*:*:*:*:*:*" ]
CVE-2022-40135
An information leak vulnerability in the Smart USB Protection SMI Handler in some Lenovo models may allow an attacker with local access and elevated privileges to read SMM memory.
[ "cpe:2.3:o:lenovo:ideacentre_c5-14imb05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_c5-14imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_e96z_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_e96z:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_3_07iab7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_3_07iab7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_3-07imb05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_3-07imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_5_14iab7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_5_14iab7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_5-14acn6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_5-14acn6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_5-14imb05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_5-14imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_5-14iob6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_5-14iob6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_creator_5-14iob6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_creator_5-14iob6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_g5-14imb05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_g5-14imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_gaming_5_17acn7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_gaming_5_17acn7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_gaming_5_17iab7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_gaming_5_17iab7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_gaming_5-14acn6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_gaming_5-14acn6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_gaming_5-14iob6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_gaming_5-14iob6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_c530-19icb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_c530-19icb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_t5-26iob6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_t5-26iob6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_t5-28icb05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_t5-28icb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_t530-28apr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_t530-28apr:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_t530-28icb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_t530-28icb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_t7-34imz5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_t7-34imz5:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m60e_tiny_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m60e_tiny:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m625q_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m625q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m630e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m630e:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70a:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70a_gen_2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70a_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70c:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70q_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70q_gen_2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70q_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70q_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70q_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70s_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70s_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70t_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70t_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m710e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m710e:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m710q_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m710q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m710s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m710s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m710t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m710t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m715q_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m715q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m715t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m715t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m720e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m720e:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m720q_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m720q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m720s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m720s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m720t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m720t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m725s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m725s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m75n_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m75n:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m75q_gen_2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m75q_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m75q-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m75q-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m75s_gen_2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m75s_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m75s-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m75s-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m75t_gen_2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m75t_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m80q_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m80q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m810z_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m810z:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m818z_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m818z:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m820z_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m820z:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90a:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90a_gen2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90a_gen2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90q_gen_2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90q_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90q_tiny_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90q_tiny:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m910q_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m910q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m910s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m910s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m910t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m910t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m910x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m910x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m920q_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m920q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m920s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m920s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m920t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m920t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m920x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m920x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_50s_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_50s_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_50t_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_50t_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:qitian_a815_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:qitian_a815:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:qt_m410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:qt_m410:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:qt_b415_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:qt_b415:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:qt_m415_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:qt_m415:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_t540-15ama_g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_t540-15ama_g:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_t540-15ick_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_t540-15ick:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_e75_t\\/s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_e75_t\\/s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m610_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m610:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m6600q_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m6600q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m6600t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m6600t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m6600s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m6600s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_3-07ada05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_3-07ada05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_5-14are05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_5-14are05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_g5-14amr05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_g5-14amr05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_510-15ick_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_510-15ick:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_510a-15arr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_510a-15arr:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_510a-15ick_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_510a-15ick:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_510s-07icb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_510s-07icb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_510s-07ick_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_510s-07ick:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_720-18apr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_720-18apr:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_a340-22igm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_a340-22igm:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_a340-24igm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_a340-24igm:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v30a-22iml_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v30a-22iml:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v30a-24iml_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v30a-24iml:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v330-20icb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v330-20icb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v35s-07ada_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v35s-07ada:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v50a-22imb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v50a-22imb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v50a-24imb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v50a-24imb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v50s-07imb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v50s-07imb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v50t-13imb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v50t-13imb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v50t-13iob_g2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v50t-13iob_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v520:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v520s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v520s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v530-15arr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v530-15arr:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v530-15icb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v530-15icb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v530-15icr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v530-15icr:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v530-22icb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v530-22icb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v530-24icb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v530-24icb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v530s-07icb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v530s-07icb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v530s-07icr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v530s-07icr:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v540-24iwl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v540-24iwl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v55t_gen_2_13acn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v55t_gen_2_13acn:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v55t-15api_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v55t-15api:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v55t-15are_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v55t-15are:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yangtian_afq150_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yangtian_afq150:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yta8900f_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yta8900f:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_a940-27icb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_a940-27icb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkedge_se30_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkedge_se30:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksmart_core_\\&_controller_full_room_kit\\:_microsoft_teams_rooms_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksmart_core_\\&_controller_full_room_kit\\:_microsoft_teams_rooms:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksmart_core_\\&_controller_full_room_kit\\:_zoom_rooms_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksmart_core_\\&_controller_full_room_kit\\:_zoom_rooms:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksmart_core_\\&_controller_kit\\:_microsoft_teams_rooms_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksmart_core_\\&_controller_kit\\:_microsoft_teams_rooms:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksmart_core_\\&_controller_kit\\:_zoom_rooms_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksmart_core_\\&_controller_kit\\:_zoom_rooms:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksmart_core_device_for_logitech_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksmart_core_device_for_logitech:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksmart_core_device_for_poly_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksmart_core_device_for_poly:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksmart_core_device\\:_zoom_rooms_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksmart_core_device\\:_zoom_rooms:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksmart_hub_teams_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksmart_hub_teams:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksmart_hub_zoom_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksmart_hub_zoom:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p310:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p320_tiny_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p320_tiny:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p330_tiny_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p330_tiny:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p340_tiny_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p340_tiny:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p340_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p340:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p348_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p348:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p350_tiny_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p350_tiny:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p350_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p350:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p520:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p520c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p520c:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p620_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p620:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:stadia_ggp-120_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:stadia_ggp-120:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p318_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p318:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st50_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_st50:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st58_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_st58:-:*:*:*:*:*:*:*" ]
CVE-2007-1932
Directory traversal vulnerability in scarnews.inc.php in ScarNews 1.2.1 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the sn_admin_dir parameter.
[ "cpe:2.3:a:scar4u:scarnews:1.2.1:*:*:*:*:*:*:*" ]
GHSA-r872-mggq-8gfh
Botan 2.2.0 - 2.4.0 (fixed in 2.5.0) improperly handled wildcard certificates and could accept certain certificates as valid for hostnames when, under RFC 6125 rules, they should not match. This only affects certificates issued to the same domain as the host, so to impersonate a host one must already have a wildcard certificate matching other hosts in the same domain. For example, b*.example.com would match some hostnames that do not begin with a 'b' character.
[]
GHSA-85q4-vgvj-3q28
An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0. An attacker can upload arbitrary files through amavisd via a cpio loophole (extraction to /opt/zimbra/jetty/webapps/zimbra/public) that can lead to incorrect access to any other user accounts. Zimbra recommends pax over cpio. Also, pax is in the prerequisites of Zimbra on Ubuntu; however, pax is no longer part of a default Red Hat installation after RHEL 6 (or CentOS 6). Once pax is installed, amavisd automatically prefers it over cpio.
[]
CVE-2006-5507
Multiple PHP remote file inclusion vulnerabilities in Der Dirigent (DeDi) 1.0.3 allow remote attackers to execute arbitrary PHP code via a URL in the cfg_dedi[dedi_path] parameter in (1) find.php, (2) insert_line.php, (3) fullscreen.php, (4) changecase.php, (5) insert_link.php, (6) insert_table.php, (7) table_cellprop.php, (8) table_prop.php, (9) table_rowprop.php, (10) insert_page.php, and possibly insert_marquee.php in backend/external/wysiswg/popups/.
[ "cpe:2.3:a:der_dirigent:der_dirigent:1.0.3:*:*:*:*:*:*:*" ]
GHSA-9c49-3qrv-gxfp
The Gift Cards (Gift Vouchers and Packages) WordPress Plugin, version <= 4.3.1, is affected by an unauthenticated SQL injection vulnerability in the template parameter in the wpgv_doajax_voucher_pdf_save_func action.
[]