id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-6r5f-5cgm-ff5g | Forever KidsWatch Call Me KW-50 R36_YDR_A3PW_GM7S_V1.0_2019_07_15_16.19.24_cob_h suffers from Cleartext Transmission of Sensitive Information due to lack of encryption in device-server communication. | [] |
|
GHSA-587j-cc5w-pqph | Session fixation vulnerability in fileupload.php in PivotX before 2.3.11 allows remote attackers to hijack web sessions via the sess parameter. | [] |
|
GHSA-7988-2cjh-wqjr | A vulnerability, which was classified as critical, has been found in NBS&HappySoftWeChat 1.1.6. Affected by this issue is some unknown functionality. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-237512. | [] |
|
CVE-2013-5301 | Directory traversal vulnerability in help.php in Trustport Webfilter 5.5.0.2232 allows remote attackers to read arbitrary files via a .. (dot dot) in the hf parameter. | [
"cpe:2.3:a:trustport:webfilter:5.5.0.2232:*:*:*:*:*:*:*"
] |
|
CVE-2006-0619 | Multiple stack-based buffer overflows in QNX Neutrino RTOS 6.3.0 allow local users to execute arbitrary code via long (1) ABLPATH or (2) ABLANG environment variables in the libAP library (libAp.so.2) or (3) a long PHOTON_PATH environment variable to the setitem function in the libph library. | [
"cpe:2.3:a:qnx:rtos:6.3.0:*:*:*:*:*:*:*"
] |
|
CVE-2020-2813 | Vulnerability in the Oracle Email Center product of Oracle E-Business Suite (component: KB Search). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Email Center. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Email Center, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Email Center accessible data as well as unauthorized update, insert or delete access to some of Oracle Email Center accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). | [
"cpe:2.3:a:oracle:email_center:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-23998 | WordPress UltraLight theme <= 1.2 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rara Theme UltraLight allows Reflected XSS. This issue affects UltraLight: from n/a through 1.2. | [] |
GHSA-9v6q-8j73-8fcr | Rescue Dispatch Management System 1.0 is vulnerable to Incorrect Access Control via http://localhost/rdms/admin/?page=system_info. | [] |
|
GHSA-jphj-xrhq-96vq | Uncontrolled search path in some Intel(R) QAT drivers for Windows before version 1.6 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] |
|
CVE-2009-3815 | RunCMS 2M1, when running with certain error_reporting levels, allows remote attackers to obtain sensitive information via (1) the op[] parameter to modules/contact/index.php or (2) uid[] parameter to userinfo.php, which leaks the installation path in an error message when these parameters are used in a call to the preg_match function. | [
"cpe:2.3:a:runcms:runcms:2m1:*:*:*:*:*:*:*"
] |
|
GHSA-xv65-m527-x787 | Deserialization of Untrusted Data vulnerability in Repute Infosystems ARMember.This issue affects ARMember: from n/a through 4.0.26. | [] |
|
CVE-2016-5402 | A code injection flaw was found in the way capacity and utilization imported control files are processed. A remote, authenticated attacker with access to the capacity and utilization feature could use this flaw to execute arbitrary code as the user CFME runs as. | [
"cpe:2.3:a:redhat:cloudforms:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:cloudforms_management_engine:5.6:*:*:*:*:*:*:*"
] |
|
CVE-2021-1972 | Possible buffer overflow due to improper validation of device types during P2P search in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking | [
"cpe:2.3:o:qualcomm:apq8009_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8009:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8009w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8009w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8064au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8064au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8076_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8076:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar6003_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar6003:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar7420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar7420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csr6030_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csr6030:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csr8811:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csrb31024:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fsm10055_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fsm10055:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fsm10056_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fsm10056:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq4018_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq4018:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq4019_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq4019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq4028_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq4028:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq4029_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq4029:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq5010:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5018_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq5018:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5028_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq5028:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq6000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq6000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq6005_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq6005:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq6010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq6010:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq6028_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq6028:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8064_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8064:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8065_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8065:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8068_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8068:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8069_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8069:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8070:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8070a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8070a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8071_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8071:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8071a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8071a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8072_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8072:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8072a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8072a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8074:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8074a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8074a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8076_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8076:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8076a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8076a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8078_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8078:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8078a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8078a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8173_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8173:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8174_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8174:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm8215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm8215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm8215m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm8215m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm8615m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm8615m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9230_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9230:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9615m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9615m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9626_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9626:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9628:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pmp8074_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmp8074:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca4020_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca4020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca4024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca4024:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6174_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6174:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6335_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6335:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6428_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6428:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6438_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6438:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6584:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6694_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6694:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca7500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca7500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca7520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca7520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca7550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca7550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8072_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8072:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8075_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8075:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9367_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9367:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9531_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9531:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9558_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9558:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9561_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9561:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9563_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9563:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9880_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9880:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9882_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9882:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9886_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9886:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9887_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9887:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9888_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9888:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9889_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9889:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9896_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9896:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9898_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9898:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9980:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9982_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9982:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9984_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9984:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9985_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9985:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9986_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9986:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9987_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9987:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9988_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9988:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9990_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9990:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9992_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9992:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9994_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9994:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn3018_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn3018:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5021_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5021:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5022_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5022:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5024:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5052_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5052:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5054_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5054:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5064_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5064:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5121_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5121:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5122_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5122:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5124_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5124:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5152_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5152:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5154_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5154:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5164_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5164:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5502_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5502:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6023_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6023:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6122_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6122:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9022_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9022:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9070:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9072_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9072:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs603_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs603:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcx315_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcx315:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfe1922_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe1922:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfe1952_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe1952:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qrb5165_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qrb5165:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qualcomm215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa415m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa415m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa515m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa515m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_455_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_455:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_8c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_8c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_8cx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_8cx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd665_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd665:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd678_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd678:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd690_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd690_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd720g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd720g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd750g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd750g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd765_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd765g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd768g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd778g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd778g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd780g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd780g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdw2500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdw2500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx12_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx50m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx50m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdxr1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdxr1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm4125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7325_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7325:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9306_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9306:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9371_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9371:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3680_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3680:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3999_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3999:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*"
] |
|
GHSA-7vcj-8223-g52v | Out-of-bounds read in applying binary with path in Samsung Notes prior to version 4.4.21.62 allows local attackers to potentially read memory. | [] |
|
GHSA-34v8-wrj4-cpvq | Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3152. | [] |
|
CVE-2014-2335 | Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiManager before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2336. | [
"cpe:2.3:o:fortinet:fortianalyzer_firmware:*:*:*:*:*:*:*:*"
] |
|
GHSA-8v5f-hp78-jgxq | Signature Verification Bypass in jwt-simple | Versions of `jwt-simple` prior to 0.5.3 are vulnerable to Signature Verification Bypass. If no algorithm is specified in the `decode()` function, the packages uses the algorithm in the JWT to decode tokens. This allows an attacker to create a HS256 (symmetric algorithm) JWT with the server's public key as secret, and the package will verify it as HS256 instead of RS256 (asymmetric algorithm).RecommendationUpgrade to version 0.5.3 or later. | [] |
GHSA-cmqg-5hgq-7vq9 | Authenticated (author+) Stored Cross-Site Scripting (XSS) vulnerability in dmitrylitvinov Uploading SVG, WEBP and ICO files plugin <= 1.0.1 at WordPress. | [] |
|
CVE-2025-29430 | Code-projects Online Class and Exam Scheduling System V1.0 is vulnerable to Cross Site Scripting (XSS) in /pages/room.php via the id and rome parameters. | [] |
|
CVE-2016-10600 | webrtc-native uses WebRTC from chromium project. webrtc-native downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server. | [
"cpe:2.3:a:webrtc:webrtc-native:*:*:*:*:*:node.js:*:*"
] |
|
GHSA-6h3w-m77j-m3gh | Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [] |
|
CVE-2023-0128 | Use after free in Overview Mode in Google Chrome on Chrome OS prior to 109.0.5414.74 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*"
] |
|
GHSA-ggqr-v2hp-ffj5 | A vulnerability in TOTOLINK A720R router with firmware v4.1.5cu.470_B20200911 allows attackers to download the configuration file via sending a crafted HTTP request. | [] |
|
GHSA-jqp2-v6rv-vqfr | ChangingTec ServiSign component has a path traversal vulnerability. An unauthenticated LAN attacker can exploit this vulnerability to bypass authentication and access arbitrary system files. | [] |
|
GHSA-2qww-cm69-c4w4 | Irzip v0.640 was discovered to contain a heap memory corruption via the component lrzip.c:initialise_control. | [] |
|
CVE-2012-5153 | Google V8 before 3.14.5.3, as used in Google Chrome before 24.0.1312.52, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds access to stack memory. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1272.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1272.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1273.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1274.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1275.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1276.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1276.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1277.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1278.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1279.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1280.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1281.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1281.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1281.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1281.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1282.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1283.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1284.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1284.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1284.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1285.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1285.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1285.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1286.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1286.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1287.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1287.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1288.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1288.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1289.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1289.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1290.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1290.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1290.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1291.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1291.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1292.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1292.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1293.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1294.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1295.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1296.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1296.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1297.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1298.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1298.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1299.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1300.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1301.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1301.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1301.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1302.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1303.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1304.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1304.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1306.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1306.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1307.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1307.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1308.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1309.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1310.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1311.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1311.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.50:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*"
] |
|
CVE-2015-6493 | Cross-site request forgery (CSRF) vulnerability in Infinite Automation Mango Automation 2.5.x and 2.6.x through 2.6.0 build 430 allows remote authenticated users to hijack the authentication of unspecified victims via unknown vectors. | [
"cpe:2.3:a:infinite_automation_systems:mango_automation:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:infinite_automation_systems:mango_automation:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:infinite_automation_systems:mango_automation:2.6.0:*:*:*:*:*:*:*"
] |
|
CVE-2010-2588 | The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2587 and CVE-2010-4188. | [
"cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*"
] |
|
CVE-2017-15619 | TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the pptphellointerval variable in the pptp_client.lua file. | [
"cpe:2.3:o:tp-link:er5110g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:er5110g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:er5120g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:er5120g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:er5510g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:er5510g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:er5520g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:er5520g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r4149g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r4149g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r4239g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r4239g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r4299g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r4299g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r473gp-ac_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r473gp-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r473g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r473g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r473p-ac_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r473p-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r473_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r473:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r478g\\+_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r478g\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r478_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r478:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r478\\+_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r478\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r483g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r483g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r483_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r483:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r488_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r488:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war1300l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war1300l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war1750l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war1750l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war2600l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war2600l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war302_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war302:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war450l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war450l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war458l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war458l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war458_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war458:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war900l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war900l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr1300g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr1300g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr1300l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr1300l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr1750l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr1750l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr2600l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr2600l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr302_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr302:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr4300l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr4300l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr450l_firmware:1.0161125:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr450l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr458l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr458l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr900g_firmware:3.0_170306:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr900g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr900l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr900l:-:*:*:*:*:*:*:*"
] |
|
CVE-2020-2248 | Jenkins JSGames Plugin 0.2 and earlier evaluates part of a URL as code, resulting in a reflected cross-site scripting (XSS) vulnerability. | [
"cpe:2.3:a:jenkins:jsgames:*:*:*:*:*:jenkins:*:*"
] |
|
CVE-2018-14583 | xyhai.php?s=/Auth/addUser in XYHCMS 3.5 allows CSRF to add a background administrator account. | [
"cpe:2.3:a:xyhcms:xyhcms:3.5:*:*:*:*:*:*:*"
] |
|
CVE-2019-13226 | deepin-clone before 1.1.3 uses a predictable path /tmp/.deepin-clone/mount/<block-dev-basename> in the Helper::temporaryMountDevice() function to temporarily mount a file system as root. An unprivileged user can prepare a symlink at this location to have the file system mounted in an arbitrary location. By winning a race condition, the attacker can also enter the mount point, thereby preventing a subsequent unmount of the file system. | [
"cpe:2.3:a:deepin:deepin-clone:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
] |
|
GHSA-v7w9-fg8q-32wg | The wp-file-upload plugin before 3.4.1 for WordPress has insufficient restrictions on upload of .php.js files. | [] |
|
CVE-2018-1320 | Apache Thrift Java client library versions 0.5.0 through 0.11.0 can bypass SASL negotiation isComplete validation in the org.apache.thrift.transport.TSaslTransport class. An assert used to determine if the SASL handshake had successfully completed could be disabled in production settings making the validation incomplete. | [
"cpe:2.3:a:apache:thrift:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:global_lifecycle_management_opatch:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:nosql_database:*:*:*:*:*:*:*:*"
] |
|
GHSA-v7v2-vp57-589m | Ivanti Workspace Control before 10.4.50.0 allows attackers to degrade integrity. | [] |
|
CVE-2021-3903 | Heap-based Buffer Overflow in vim/vim | vim is vulnerable to Heap-based Buffer Overflow | [
"cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] |
GHSA-vjjx-f47g-v526 | Buffer overflow in newt.c of newt windowing library (libnewt) 0.50.33 and earlier may allow attackers to cause a denial of service or execute arbitrary code in setuid programs that use libnewt. | [] |
|
GHSA-3576-xfx7-vjx5 | The Beaver Builder – WordPress Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘type’ parameter in all versions up to, and including, 2.8.3.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
CVE-2015-7215 | The importScripts function in the Web Workers API implementation in Mozilla Firefox before 43.0 allows remote attackers to bypass the Same Origin Policy by triggering use of the no-cors mode in the fetch API to attempt resource access that throws an exception, leading to information disclosure after a rethrow. | [
"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] |
|
GHSA-55vx-hqgf-25fw | Vulnerable modules of Trend Micro Apex Central (on-premise) contain vulnerabilities which would allow authenticated users to perform a SQL injection that could lead to remote code execution.Please note: an attacker must first obtain authentication on the target system in order to exploit these vulnerabilities.This is similar to, but not identical to CVE-2023-32530. | [] |
|
CVE-2010-0745 | Unspecified vulnerability in Dovecot 1.2.x before 1.2.11 allows remote attackers to cause a denial of service (CPU consumption) via long headers in an e-mail message. | [
"cpe:2.3:a:dovecot:dovecot:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:1.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:1.2.10:*:*:*:*:*:*:*"
] |
|
GHSA-626w-372f-948x | NVIDIA Base Command Manager contains a missing authentication vulnerability in the CMDaemon component. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. | [] |
|
CVE-2011-5279 | CRLF injection vulnerability in the CGI implementation in Microsoft Internet Information Services (IIS) 4.x and 5.x on Windows NT and Windows 2000 allows remote attackers to modify arbitrary uppercase environment variables via a \n (newline) character in an HTTP header. | [
"cpe:2.3:a:microsoft:internet_information_services:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:-:*:*:*:*:*:*:*"
] |
|
GHSA-v589-4pj5-662q | SQL injection vulnerability in sezione_news.php in nicLOR-CMS allows remote attackers to execute arbitrary SQL commands via the id parameter in a sezione page action to index.php. | [] |
|
CVE-2008-1402 | MG-SOFT Net Inspector 6.5.0.828 and earlier for Windows allows remote attackers to cause a (1) denial of service (exception and crash) via a UDP packet to the SNMP Trap Service (MgWTrap3.exe) or (2) denial of service (device freeze or memory consumption) via a malformed request to the Net Inspector Server (niengine). | [
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mg-soft:net_inspector:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-13223 | HashiCorp Vault and Vault Enterprise logged proxy environment variables that potentially included sensitive credentials. Fixed in 1.3.6 and 1.4.2. | [
"cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:hashicorp:vault:*:*:*:*:-:*:*:*"
] |
|
GHSA-fpmw-jmcv-qqq3 | Use after free in audio in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [] |
|
GHSA-fvj9-whqh-93ff | A stack-based buffer overflow was found in the putSDN() function of mail.c in hcode through 2.1. | [] |
|
GHSA-327f-rcpx-x4h2 | The MyMetro (aka com.myrippleapps.mymetro) application 2.4.7 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
CVE-2016-4878 | Cross-site request forgery (CSRF) vulnerability in baserCMS version 3.0.10 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors. | [
"cpe:2.3:a:basercms:basercms:3.0.10:*:*:*:*:*:*:*"
] |
|
CVE-2010-0171 | Mozilla Firefox 3.0.x before 3.0.18, 3.5.x before 3.5.8, and 3.6.x before 3.6.2; Thunderbird before 3.0.2; and SeaMonkey before 2.0.3 allow remote attackers to perform cross-origin keystroke capture, and possibly conduct cross-site scripting (XSS) attacks, by using the addEventListener and setTimeout functions in conjunction with a wrapped object. NOTE: this vulnerability exists because of an incomplete fix for CVE-2007-3736. | [
"cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.5:1.1.10:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*"
] |
|
CVE-2020-4805 | IBM Edge 4.2 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 189539. | [
"cpe:2.3:a:ibm:edge_application_manager:4.2:*:*:*:*:*:*:*"
] |
|
GHSA-w5gm-7fc6-33wj | GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in bfr_read in decode.c. | [] |
|
CVE-2018-20062 | An issue was discovered in NoneCms V1.3. thinkphp/library/think/App.php allows remote attackers to execute arbitrary PHP code via crafted use of the filter parameter, as demonstrated by the s=index/\think\Request/input&filter=phpinfo&data=1 query string. | [
"cpe:2.3:a:5none:nonecms:1.3.0:*:*:*:*:*:*:*"
] |
|
CVE-2006-2084 | Multiple cross-site scripting (XSS) vulnerabilities in FarsiNews 2.5.3 Pro and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) month and (2) year parameters in (a) index.php, and the (3) mod parameter in (b) admin.php. | [
"cpe:2.3:a:farsinews:farsinews:*:*:*:*:*:*:*:*",
"cpe:2.3:a:farsinews:farsinews:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:farsinews:farsinews:2.1_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:farsinews:farsinews:2.5:*:*:*:*:*:*:*"
] |
|
GHSA-57f6-mg5v-52v9 | Calendar in Apple iOS before 9.3.3 allows remote attackers to cause a denial of service (NULL pointer dereference and device restart) via a crafted invitation. | [] |
|
GHSA-wc7g-h7q8-29g2 | The REST/JSON project 7.x-1.x for Drupal allows user enumeration, aka SA-CONTRIB-2016-033. NOTE: This project is not covered by Drupal's security advisory policy. | [] |
|
GHSA-p23q-pp8g-838p | Network Attached Storage on LG N1T1*** 10124 devices allows an unauthenticated attacker to gain root access via OS command injection in the en/ajp/plugins/access.ssh/checkInstall.php destServer parameter. | [] |
|
GHSA-757h-8w79-6prh | Loadbalancer.org Enterprise VA MAX before 8.3.3 has XSS because Apache HTTP Server logs are displayed. | [] |
|
CVE-2010-1982 | Directory traversal vulnerability in the JA Voice (com_javoice) component 2.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php. | [
"cpe:2.3:a:joomlart:com_javoice:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] |
|
GHSA-4v7q-34w2-x874 | The parse_instruction function in gallium/auxiliary/tgsi/tgsi_text.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and process crash) via a crafted texture instruction. | [] |
|
CVE-2024-33407 | SQL injection vulnerability in /model/delete_record.php in campcodes Complete Web-Based School Management System 1.0 allows attacker to execute arbitrary SQL commands via the id parameter. | [
"cpe:2.3:a:campcodes:complete_web-based_school_management_system:-:*:*:*:*:*:*:*"
] |
|
CVE-2018-15721 | The XMPP server in Logitech Harmony Hub before version 4.15.206 is vulnerable to authentication bypass via a crafted XMPP request. Remote attackers can use this vulnerability to gain access to the local API. | [
"cpe:2.3:o:logitech:harmony_hub_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:logitech:harmony_hub:-:*:*:*:*:*:*:*"
] |
|
GHSA-fw8h-qc74-r2c2 | In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can execute arbitrary code through the dashboard PDF generation component. | [] |
|
CVE-2023-51062 | An unauthenticated log file read in the component log-smblog-save of QStar Archive Solutions RELEASE_3-0 Build 7 Patch 0 allows attackers to disclose the SMB Log contents via executing a crafted command. | [
"cpe:2.3:a:qstar:archive_storage_manager:3-0:build7_patch0:*:*:*:*:*:*"
] |
|
CVE-2015-8095 | The recycle bin feature in the Monster Menus module 7.x-1.21 before 7.x-1.24 for Drupal does not properly remove nodes from view, which allows remote attackers to obtain sensitive information via an unspecified URL pattern. | [
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.23:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*"
] |
|
GHSA-fwx3-p6c8-mww8 | The kernel filesystem implementation in Android before 2016-07-05 on Nexus 5X and 6P devices allows attackers to gain privileges via a crafted application, aka internal bug 28588434. | [] |
|
GHSA-77q3-769w-pr25 | The Razor configuration management tool uses weak encryption for its password file, which allows local users to gain privileges. | [] |
|
CVE-1999-0237 | Remote execution of arbitrary commands through Guestbook CGI program. | [
"cpe:2.3:a:webcom:cgi_guestbook:*:*:*:*:*:*:*:*"
] |
|
GHSA-qrvx-fg3g-ff4r | The mozilla::AudioSink function in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 mishandles inconsistent sample formats within MP3 audio data, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via a malformed file. | [] |
|
GHSA-9p5g-vg43-mj5r | Druid ingestion system Authenticated users can read data from other sources than intended | In the Druid ingestion system, the InputSource is used for reading data from a certain data source. However, the HTTP InputSource allows authenticated users to read data from other sources than intended, such as the local file system, with the privileges of the Druid server process. This is not an elevation of privilege when users access Druid directly, since Druid also provides the Local InputSource, which allows the same level of access. But it is problematic when users interact with Druid indirectly through an application that allows users to specify the HTTP InputSource, but not the Local InputSource. In this case, users could bypass the application-level restriction by passing a file URL to the HTTP InputSource. This issue was previously mentioned as being fixed in 0.21.0 as per CVE-2021-26920 but was not fixed in 0.21.0 or 0.21.1. | [] |
CVE-2001-0293 | Directory traversal vulnerability in FtpXQ FTP server 2.0.93 allows remote attackers to read arbitrary files via a .. (dot dot) in the GET command. | [
"cpe:2.3:a:datawizard:ftpxq:2.0.93:*:*:*:*:*:*:*"
] |
|
CVE-2023-28418 | WordPress Mediciti Lite Theme <= 1.3.0 is vulnerable to Cross Site Scripting (XSS) | Auth. (subscriber+) Reflected Cross-Site Scripting (XSS) vulnerability in Yudlee themes Mediciti Lite theme <= 1.3.0 versions. | [
"cpe:2.3:a:mediciti_lite_project:mediciti_lite:*:*:*:*:*:wordpress:*:*"
] |
GHSA-4pqg-hr8r-h5cw | MediaWiki malicious XML upload leads to privilege escalation | Mediawiki v1.40.0 does not validate namespaces used in XML files. Therefore, if the instance administrator allows XML file uploads, a remote attacker with a low-privileged user account can use this exploit to become an administrator by sending a malicious link to the instance administrator. | [] |
CVE-2005-4157 | Unspecified vulnerability in Kerio WinRoute Firewall before 6.1.3 allows remote attackers to authenticate to the service using an account that has been disabled. | [
"cpe:2.3:a:kerio:winroute_firewall:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:5.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:5.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:5.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:5.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:5.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:6.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:6.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:6.1.2:*:*:*:*:*:*:*"
] |
|
CVE-2016-6186 | Cross-site scripting (XSS) vulnerability in the dismissChangeRelatedObjectPopup function in contrib/admin/static/admin/js/admin/RelatedObjectLookups.js in Django before 1.8.14, 1.9.x before 1.9.8, and 1.10.x before 1.10rc1 allows remote attackers to inject arbitrary web script or HTML via vectors involving unsafe usage of Element.innerHTML. | [
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.10:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.10:beta1:*:*:*:*:*:*"
] |
|
CVE-2010-4463 | Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 21 through 6 Update 23 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment. | [
"cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_22:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_23:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_22:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_23:*:*:*:*:*:*"
] |
|
GHSA-qhrq-52qx-58fx | Deserialization of Untrusted Data vulnerability in Scott Olson My Reading Library allows Object Injection.This issue affects My Reading Library: from n/a through 1.0. | [] |
|
GHSA-jxg2-g8jw-r8cj | The End-User Portal module before 1.0.65 for FreeScout sometimes allows an attacker to authenticate as an arbitrary user because a session token can be sent to the /auth endpoint. NOTE: this module is not part of freescout-helpdesk/freescout on GitHub. | [] |
|
CVE-2024-12646 | Chunghwa Telecom topm-client - Arbitrary File Delete | The topm-client from Chunghwa Telecom has an Arbitrary File Delete vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection in the APIs, unauthenticated remote attackers could use these APIs through phishing. Additionally, one of the APIs contains an Absolute Path Traversal vulnerability, allowing attackers to delete arbitrary files on the user's system. | [] |
CVE-2020-8884 | rcdsvc in the Proofpoint Insider Threat Management Windows Agent (formerly ObserveIT Windows Agent) before 7.9 allows remote authenticated users to execute arbitrary code as SYSTEM because of improper deserialization over named pipes. | [
"cpe:2.3:a:proofpoint:insider_threat_management:*:*:*:*:*:windows:*:*"
] |
|
GHSA-p7f5-95m3-2fw7 | The Front End PM WordPress plugin before 11.4.3 does not block listing the contents of the directories where it stores attachments to private messages, allowing unauthenticated visitors to list and download private attachments if the autoindex feature of the web server is enabled. | [] |
|
GHSA-59q5-crp9-8r37 | An XSS issue was discovered in Zammad 3.0 through 3.2. Malicious code can be provided by a low-privileged user through the File Upload functionality in Zammad. The malicious JavaScript will execute within the browser of any user who opens a specially crafted link to the uploaded file with an active Zammad session. | [] |
|
CVE-2006-4317 | Cross-site scripting (XSS) vulnerability in attachment.php in WoltLab Burning Board (WBB) 2.3.5 allows remote attackers to inject arbitrary web script or HTML via a GIF image that contains URL-encoded Javascript. | [
"cpe:2.3:a:woltlab:burning_board:2.3.5:*:*:*:*:*:*:*"
] |
|
GHSA-f55p-m2v7-m3pw | WebKit in Apple iOS before 9.3 and Safari before 9.1 allows remote attackers to bypass the Same Origin Policy and obtain physical-location data via a crafted geolocation request. | [] |
|
GHSA-mf4f-j588-5xm8 | Apache Log4j Remote Code Execution | ImpactOpencast uses an Apache Log4j2 version which, combined with older JDK versions, can be used for remote code execution attacks which have been found to be actively exploited.Apache Log4j2 <=2.14.1 JNDI features is not sufficiently protected. An attacker who can control log messages or log message parameters can execute arbitrary code when message lookup substitution is enabled.Who is affectedOpencast before 9.10 or 10.6 are affectedLog4j version: all 2.x versions before 2.15.0 are affectedPatchesThe issue has been fixed in Opencast 9.10 and 10.6.WorkaroundsThe vulnerability can be mitigated by setting system property `log4j2.formatMsgNoLookups` to `true`.References[Opencast pull request mitigating the vulnerability](https://github.com/opencast/opencast/pull/3253)[CVE-2021-44228 Detail](https://nvd.nist.gov/vuln/detail/CVE-2021-44228)[Analysis and Remediation Guidance to the Log4j Zero-Day RCE (CVE-2021-44228) Vulnerability](https://www.veracode.com/blog/security-news/urgent-analysis-and-remediation-guidance-log4j-zero-day-rce-cve-2021-44228)[VE-2021-44228 – Log4j 2 Vulnerability Analysis](https://www.randori.com/blog/cve-2021-44228/)For more informationIf you have any questions or comments about this advisory:Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues)Email us at [[email protected]](mailto:[email protected])Note about dependenciesThis issue affects many Java applications. Please also verify these are not vulnerable. | [] |
GHSA-h6g3-73h7-chxp | ChakraCore RCE Vulnerability | The Microsoft (1) JScript 9, (2) VBScript, and (3) Chakra JavaScript engines, as used in Microsoft Internet Explorer 11, Microsoft Edge, and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability." | [] |
CVE-2014-3365 | Multiple cross-site scripting (XSS) vulnerabilities in Cisco Prime Security Manager (PRSM) 9.2(.1-2) and earlier allow remote attackers to inject arbitrary web script or HTML via crafted input to the (1) Dashboard or (2) Configure Realm page, aka Bug ID CSCuo94808. | [
"cpe:2.3:a:cisco:prime_security_manager:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-24755 | WordPress PDF Invoices for WooCommerce plugin <= 4.6.0 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in add-ons.org PDF Invoices for WooCommerce + Drag and Drop Template Builder allows Stored XSS. This issue affects PDF Invoices for WooCommerce + Drag and Drop Template Builder: from n/a through 4.6.0. | [] |
CVE-2019-11041 | heap-buffer-overflow on exif_scan_thumbnail in EXIF extension | When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.1.x below 7.1.31, 7.2.x below 7.2.21 and 7.3.x below 7.3.8 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash. | [
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*"
] |
GHSA-w6gh-25j9-8fm4 | apt-cacher before 1.7.15 and apt-cacher-ng before 3.4 allow HTTP response splitting via encoded newline characters, related to lack of blocking for the %0[ad] regular expression. | [] |
|
GHSA-gmx3-jm7j-288w | Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are Prior to 9.2.9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [] |
|
CVE-2024-0110 | NVIDIA CUDA Toolkit contains a vulnerability in command `cuobjdump` where a user may cause an out-of-bound write by passing in a malformed ELF file. A successful exploit of this vulnerability may lead to code execution or denial of service. | [
"cpe:2.3:a:nvidia:cuda_toolkit:*:*:*:*:*:*:*:*"
] |
|
GHSA-5w8f-6p4v-9m4p | A vulnerability classified as problematic has been found in qkmc-rk redbbs 1.0. Affected is an unknown function of the component Post Handler. The manipulation of the argument title leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250236. | [] |
|
CVE-2018-1548 | IBM API Connect 2018.1.0.0, 2018.2.1, 2018.2.2, 2018.2.3, and 2018.2.4 contains a vulnerability that could allow an authenticated user to obtain sensitive information. IBM X-Force ID: 142657. | [
"cpe:2.3:a:ibm:api_connect:*:*:*:*:*:*:*:*"
] |
|
GHSA-62xc-hv7g-5994 | Innovative Interfaces Sierra Library Services Platform 1.2_3 does not properly handle query strings with multiple instances of the same parameter, which allows remote attackers to bypass parameter validation via unspecified vectors, possibly related to the Webpac Pro submodule. | [] |
|
CVE-2023-3598 | Out of bounds read and write in ANGLE in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-10840 | Linux kernel is vulnerable to a heap-based buffer overflow in the fs/ext4/xattr.c:ext4_xattr_set_entry() function. An attacker could exploit this by operating on a mounted crafted ext4 image. | [
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"
] |
|
GHSA-4hm3-9cfc-p6pj | Buffer overflow in ShixxNote 6.net build 117 allows remote attackers to execute arbitrary code via a long font field. | [] |
|
GHSA-56j8-qjmh-75v8 | ** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has been found in D-Link DAR-7000 up to 20151231. This issue affects some unknown processing of the file /log/webmailattach.php. The manipulation of the argument table_name leads to an unknown weakness. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240239. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.