Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
CVE-2014-6354
Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, and Internet Explorer 11 allows remote attackers to execute arbitrary code.
[ "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*" ]
CVE-2018-0062
Junos OS: Denial of Service in J-Web
A Denial of Service vulnerability in J-Web service may allow a remote unauthenticated user to cause Denial of Service which may prevent other users to authenticate or to perform J-Web operations. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D77 on SRX Series; 12.3 versions prior to 12.3R12-S10; 12.3X48 versions prior to 12.3X48-D60 on SRX Series; 15.1 versions prior to 15.1R7; 15.1F6; 15.1X49 versions prior to 15.1X49-D120 on SRX Series; 15.1X53 versions prior to 15.1X53-D59 on EX2300/EX3400 Series; 15.1X53 versions prior to 15.1X53-D67 on QFX10K Series; 15.1X53 versions prior to 15.1X53-D234 on QFX5200/QFX5110 Series; 15.1X53 versions prior to 15.1X53-D470, 15.1X53-D495 on NFX Series; 16.1 versions prior to 16.1R6; 16.2 versions prior to 16.2R2-S6, 16.2R3; 17.1 versions prior to 17.1R2-S6, 17.1R3; 17.2 versions prior to 17.2R3; 17.3 versions prior to 17.3R2. No other Juniper Networks products or platforms are affected by this issue.
[ "cpe:2.3:o:juniper:junos:12.1x46:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d15:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d20:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d25:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d30:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d35:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d40:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d45:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d50:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d55:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d60:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d65:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r11:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r9:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d15:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d20:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d25:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d30:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d35:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d40:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d45:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d50:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d55:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d60:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d100:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d110:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d30:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d35:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d40:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d45:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d50:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d55:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d60:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d65:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d70:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d75:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d80:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d90:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d50:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d51:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d52:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d55:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d57:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d58:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d20:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d21:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d30:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d32:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d33:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d34:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d60:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d61:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d62:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d63:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d64:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d65:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d66:*:*:*:*:*:*", "cpe:2.3:h:juniper:qfx10000:-:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d210:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d230:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d231:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d232:*:*:*:*:*:*", "cpe:2.3:h:juniper:qfx5110:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:qfx5200:-:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d40:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d45:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d495:*:*:*:*:*:*", "cpe:2.3:h:juniper:nfx_series:-:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.2:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.2:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.1:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.2:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*" ]
GHSA-wx3p-jg9w-g5x7
Multiple cross-site request forgery (CSRF) vulnerabilities in NexusPHP 1.5 allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) linkname, (2) url, or (3) title parameter in an add action to linksmanage.php.
[]
CVE-2024-40334
idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/serverFile_deal.php?mudi=upFileDel&dataID=3
[ "cpe:2.3:a:idccms_project:idccms:1.35:*:*:*:*:*:*:*", "cpe:2.3:a:idccms:idccms:1.35:*:*:*:*:*:*:*" ]
GHSA-r4xv-4m8v-9gfg
The TRE library in Libc in Apple iOS before 8.4.1 and OS X before 10.10.5 allows context-dependent attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted regular expression, a different vulnerability than CVE-2015-3796 and CVE-2015-3797.
[]
CVE-2021-39773
In VpnManagerService, there is a possible disclosure of installed VPN packages due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-191276656
[ "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*" ]
CVE-2022-22266
(Applicable to China models only) Unprotected WifiEvaluationService in TencentWifiSecurity application prior to SMR Jan-2022 Release 1 allows untrusted applications to get WiFi information without proper permission.
[ "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
CVE-2017-2953
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability in the image conversion module when processing a TIFF image. Successful exploitation could lead to arbitrary code execution.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
GHSA-jf4c-392q-69v3
An issue was discovered on Samsung mobile devices with N(7.x) software. Dex Station allows App Pinning bypass and lock-screen bypass via the "Use screen lock type to unpin" option. The Samsung ID is SVE-2017-11106 (February 2018).
[]
GHSA-3g2p-5q22-h774
An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message where an array length is inconsistent with the size of the element type.
[]
CVE-2022-2869
libtiff's tiffcrop tool has a uint32_t underflow which leads to out of bounds read and write in the extractContigSamples8bits routine. An attacker who supplies a crafted file to tiffcrop could trigger this flaw, most likely by tricking a user into opening the crafted file with tiffcrop. Triggering this flaw could cause a crash or potentially further exploitation.
[ "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
GHSA-3gv9-wvwh-jv5c
The Georgia Packing (aka com.tapatalk.georgiapackingorg) application 3.9.16 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
CVE-2024-45687
HTTP Server incorrectly accepting disallowed characters within header values
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') vulnerability in Payara Platform Payara Server (Grizzly, REST Management Interface modules), Payara Platform Payara Micro (Grizzly modules) allows Manipulating State, Identity Spoofing.This issue affects Payara Server: from 4.1.151 through 4.1.2.191.51, from 5.20.0 through 5.70.0, from 5.2020.2 through 5.2022.5, from 6.2022.1 through 6.2024.12, from 6.0.0 through 6.21.0; Payara Micro: from 4.1.152 through 4.1.2.191.51, from 5.20.0 through 5.70.0, from 5.2020.2 through 5.2022.5, from 6.2022.1 through 6.2024.12, from 6.0.0 through 6.21.0.
[]
CVE-2022-23576
Integer overflow in Tensorflow
Tensorflow is an Open Source Machine Learning Framework. The implementation of `OpLevelCostEstimator::CalculateOutputSize` is vulnerable to an integer overflow if an attacker can create an operation which would involve tensors with large enough number of elements. We can have a large enough number of dimensions in `output_shape.dim()` or just a small number of dimensions being large enough to cause an overflow in the multiplication. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
[ "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.7.0:*:*:*:*:*:*:*" ]
GHSA-pjm3-f4vh-3h3h
Stored Cross-site Scripting in Jenkins Mask Passwords Plugin
Jenkins Mask Passwords Plugin 3.0 and earlier does not escape the name and description of Non-Stored Password parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix.
[]
GHSA-3m5j-r9wr-wr68
The Kunena extension before 5.1.14 for Joomla! allows XSS via BBCode.
[]
GHSA-r2pp-jg8w-vm6w
ImageMagick 7.0.6-1 has a large loop vulnerability in the ReadPWPImage function in coders\pwp.c.
[]
CVE-2018-20913
cPanel before 70.0.23 allows attackers to read the root accesshash via the WHM /cgi/trustclustermaster.cgi (SEC-364).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
GHSA-p3gx-x4c5-c23m
Sandline Centraleyezer (On Premises) allows Stored XSS using HTML entities in the name field of the Category section.
[]
CVE-2021-21623
An incorrect permission check in Jenkins Matrix Authorization Strategy Plugin 2.6.5 and earlier allows attackers with Item/Read permission on nested items to access them, even if they lack Item/Read permission for parent folders.
[ "cpe:2.3:a:jenkins:matrix_authorization_strategy:*:*:*:*:*:jenkins:*:*" ]
GHSA-g3gj-632x-fhrh
SSRF vulnerability due to missing permission check in Jenkins JMS Messaging Plugin
A server-side request forgery vulnerability exists in Jenkins JMS Messaging Plugin 1.1.1 and earlier in SSLCertificateAuthenticationMethod.java, UsernameAuthenticationMethod.java that allows attackers with Overall/Read permission to have Jenkins connect to a JMS endpoint.
[]
CVE-2004-0580
DHCP on Linksys BEFSR11, BEFSR41, BEFSR81, and BEFSRU31 Cable/DSL Routers, firmware version 1.45.7, does not properly clear previously used buffer contents in a BOOTP reply packet, which allows remote attackers to obtain sensitive information.
[ "cpe:2.3:h:linksys:befcmu10:*:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befn2ps4:*:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befn2ps4:1.42.7:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsr11:1.40.2:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsr11:1.41:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsr11:1.42.3:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsr11:1.42.7:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsr11:1.43:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsr11:1.43.3:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsr11:1.44:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsr41:1.35:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsr41:1.36:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsr41:1.37:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsr41:1.38.5:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsr41:1.39:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsr41:1.40.2:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsr41:1.41:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsr41:1.42.3:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsr41:1.42.7:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsr41:1.43:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsr41:1.43.3:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsr41:1.44:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsr41:1.45.7:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsr41w:*:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsr81:*:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsr81:2.42.7.1:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsr81:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsru31:1.40.2:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsru31:1.41:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsru31:1.42.3:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsru31:1.42.7:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsru31:1.43:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsru31:1.43.3:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsru31:1.44:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsx41:1.42.7:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsx41:1.43:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsx41:1.43.3:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsx41:1.43.4:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsx41:1.44:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsx41:1.44.3:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsx41:1.45.3:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befvp41:*:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befvp41:1.39.64:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befvp41:1.40.3f:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befvp41:1.40.4:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befvp41:1.42.7:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:rv082:*:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:wap55ag:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:wrt54g:1.42.3:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:wrt54g:2.00.8:*:*:*:*:*:*:*" ]
GHSA-gqr9-4fcc-c9jq
Use after free in WebGPU in Google Chrome prior to 120.0.6099.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
[]
CVE-2021-33550
UDP Technology/Geutebrück camera devices: Command injection in date parameter leading to RCE
Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code.
[ "cpe:2.3:o:geutebrueck:g-cam_ebc-2110_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_ebc-2110_firmware:1.12.13.2:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_ebc-2110_firmware:1.12.14.5:*:*:*:*:*:*:*", "cpe:2.3:h:geutebrueck:g-cam_ebc-2110:*:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_ebc-2111_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_ebc-2111_firmware:1.12.13.2:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_ebc-2111_firmware:1.12.14.5:*:*:*:*:*:*:*", "cpe:2.3:h:geutebrueck:g-cam_ebc-2111:*:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_efd-2241_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_efd-2241_firmware:1.12.13.2:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_efd-2241_firmware:1.12.14.5:*:*:*:*:*:*:*", "cpe:2.3:h:geutebrueck:g-cam_efd-2241:*:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_efd-2250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_efd-2250_firmware:1.12.13.2:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_efd-2250_firmware:1.12.14.5:*:*:*:*:*:*:*", "cpe:2.3:h:geutebrueck:g-cam_efd-2250:*:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_ethc-2230_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_ethc-2230_firmware:1.12.13.2:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_ethc-2230_firmware:1.12.14.5:*:*:*:*:*:*:*", "cpe:2.3:h:geutebrueck:g-cam_ethc-2230:*:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_ethc-2239_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_ethc-2239_firmware:1.12.13.2:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_ethc-2239_firmware:1.12.14.5:*:*:*:*:*:*:*", "cpe:2.3:h:geutebrueck:g-cam_ethc-2239:*:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_ethc-2240_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_ethc-2240_firmware:1.12.13.2:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_ethc-2240_firmware:1.12.14.5:*:*:*:*:*:*:*", "cpe:2.3:h:geutebrueck:g-cam_ethc-2240:*:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_ethc-2249_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_ethc-2249_firmware:1.12.13.2:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_ethc-2249_firmware:1.12.14.5:*:*:*:*:*:*:*", "cpe:2.3:h:geutebrueck:g-cam_ethc-2249:*:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_ewpc-2270_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_ewpc-2270_firmware:1.12.13.2:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_ewpc-2270_firmware:1.12.14.5:*:*:*:*:*:*:*", "cpe:2.3:h:geutebrueck:g-cam_ewpc-2270:*:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-code_eec-2400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-code_eec-2400_firmware:1.12.13.2:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-code_eec-2400_firmware:1.12.14.5:*:*:*:*:*:*:*", "cpe:2.3:h:geutebrueck:g-code_eec-2400:*:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-code_een-2010_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-code_een-2010_firmware:1.12.13.2:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-code_een-2010_firmware:1.12.14.5:*:*:*:*:*:*:*", "cpe:2.3:h:geutebrueck:g-code_een-2010:*:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-code_een-2040_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-code_een-2040_firmware:1.12.13.2:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-code_een-2040_firmware:1.12.14.5:*:*:*:*:*:*:*", "cpe:2.3:h:geutebrueck:g-code_een-2040:*:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_ebc-2112_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_ebc-2112_firmware:1.12.13.2:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_ebc-2112_firmware:1.12.14.5:*:*:*:*:*:*:*", "cpe:2.3:h:geutebrueck:g-cam_ebc-2112:*:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_efd-2251_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_efd-2251_firmware:1.12.13.2:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_efd-2251_firmware:1.12.14.5:*:*:*:*:*:*:*", "cpe:2.3:h:geutebrueck:g-cam_efd-2251:*:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_ewpc-2275_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_ewpc-2275_firmware:1.12.13.2:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_ewpc-2275_firmware:1.12.14.5:*:*:*:*:*:*:*", "cpe:2.3:h:geutebrueck:g-cam_ewpc-2275:*:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_ewpc-2271_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_ewpc-2271_firmware:1.12.13.2:*:*:*:*:*:*:*", "cpe:2.3:o:geutebrueck:g-cam_ewpc-2271_firmware:1.12.14.5:*:*:*:*:*:*:*", "cpe:2.3:h:geutebrueck:g-cam_ewpc-2271:*:*:*:*:*:*:*:*" ]
CVE-2024-45621
The Electron desktop application of Rocket.Chat through 6.3.4 allows stored XSS via links in an uploaded file, related to failure to use a separate browser upon encountering third-party external actions from PDF documents.
[ "cpe:2.3:a:rocket.chat:rocket.chat:*:*:*:*:*:*:*:*" ]
GHSA-jxwx-xvh2-mgc2
Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: All Modules). Supported versions that are affected are 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0 and 12.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).
[]
GHSA-597x-fg43-vrh4
Cross-site scripting (XSS) vulnerability in (1) search.php and (2) topics.php for Invision Power Board (IPB) 2.0.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the highlite parameter.
[]
GHSA-h282-h49g-gvfm
Cross-Site Request Forgery (CSRF) vulnerability in FameThemes FameTheme Demo Importer.This issue affects FameTheme Demo Importer: from n/a through 1.1.5.
[]
GHSA-fj35-m94r-9h4c
Maltego incorrectly shares a MISP connection across users in a remote-transform use case
MISP MISP-maltego 1.4.4 incorrectly shares a MISP connection across users in a remote-transform use case. Version 1.4.5 contains a patch.
[]
CVE-2000-1106
Trend Micro InterScan VirusWall creates an "Intscan" share to the "InterScan" directory with permissions that grant Full Control permissions to the Everyone group, which allows attackers to gain privileges by modifying the VirusWall programs.
[ "cpe:2.3:a:trend_micro:interscan_viruswall:*:*:*:*:*:*:*:*" ]
GHSA-689c-7h72-pfpf
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to a buffer overflow. An attacker can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_openvpn_client function with the old_remote_subnet and the old_remote_mask variables.
[]
GHSA-7q5p-8p3w-vc5f
Missing authorization in Power Platform allows an unauthenticated attacker to view sensitive information through a network attack vector.
[]
CVE-2015-5072
The BIRT Engine servlet in the AR System Mid Tier component before 9.0 SP1 for BMC Remedy AR System Server allows remote authenticated users to "navigate" to arbitrary local files via the __imageid parameter.
[ "cpe:2.3:a:bmc:remedy_ar_system_server:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:bmc:remedy_ar_system_server:9.0:*:*:*:*:*:*:*" ]
GHSA-mcg2-gcq9-c6xf
Terminology before 1.3.1 allows Remote Code Execution because popmedia is mishandled, as demonstrated by an unsafe "cat README.md" command when \e}pn is used. A popmedia control sequence can allow the malicious execution of executable file formats registered in the X desktop share MIME types (/usr/share/applications). The control sequence defers unknown file types to the handle_unknown_media() function, which executes xdg-open against the filename specified in the sequence. The use of xdg-open for all unknown file types allows executable file formats with a registered shared MIME type to be executed. An attacker can achieve remote code execution by introducing an executable file and a plain text file containing the control sequence through a fake software project (e.g., in Git or a tarball). When the control sequence is rendered (such as with cat), the executable file will be run.
[]
CVE-2018-17004
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for wlan_access name.
[ "cpe:2.3:o:tp-link:tl-wr886n_firmware:6.0_2.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:tl-wr886n_firmware:7.0_1.1.0:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-wr886n:-:*:*:*:*:*:*:*" ]
GHSA-rj3c-33c5-42hm
The user_ldap (aka LDAP user and group backend) application in ownCloud before 5.0.18, 6.x before 6.0.6, and 7.x before 7.0.3 allows remote attackers to bypass authentication via a null byte in the password and a valid user name, which triggers an unauthenticated bind.
[]
GHSA-x35g-752c-r3xh
In the Linux kernel, the following vulnerability has been resolved:ata: libata-core: Fix double free on errorIf e.g. the ata_port_alloc() call in ata_host_alloc() fails, we will jump to the err_out label, which will call devres_release_group(). devres_release_group() will trigger a call to ata_host_release(). ata_host_release() calls kfree(host), so executing the kfree(host) in ata_host_alloc() will lead to a double free:kernel BUG at mm/slub.c:553! Oops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI CPU: 11 PID: 599 Comm: (udev-worker) Not tainted 6.10.0-rc5 #47 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014 RIP: 0010:kfree+0x2cf/0x2f0 Code: 5d 41 5e 41 5f 5d e9 80 d6 ff ff 4d 89 f1 41 b8 01 00 00 00 48 89 d9 48 89 da RSP: 0018:ffffc90000f377f0 EFLAGS: 00010246 RAX: ffff888112b1f2c0 RBX: ffff888112b1f2c0 RCX: ffff888112b1f320 RDX: 000000000000400b RSI: ffffffffc02c9de5 RDI: ffff888112b1f2c0 RBP: ffffc90000f37830 R08: 0000000000000000 R09: 0000000000000000 R10: ffffc90000f37610 R11: 617461203a736b6e R12: ffffea00044ac780 R13: ffff888100046400 R14: ffffffffc02c9de5 R15: 0000000000000006 FS: 00007f2f1cabe980(0000) GS:ffff88813b380000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f2f1c3acf75 CR3: 0000000111724000 CR4: 0000000000750ef0 PKRU: 55555554 Call Trace: <TASK> ? __die_body.cold+0x19/0x27 ? die+0x2e/0x50 ? do_trap+0xca/0x110 ? do_error_trap+0x6a/0x90 ? kfree+0x2cf/0x2f0 ? exc_invalid_op+0x50/0x70 ? kfree+0x2cf/0x2f0 ? asm_exc_invalid_op+0x1a/0x20 ? ata_host_alloc+0xf5/0x120 [libata] ? ata_host_alloc+0xf5/0x120 [libata] ? kfree+0x2cf/0x2f0 ata_host_alloc+0xf5/0x120 [libata] ata_host_alloc_pinfo+0x14/0xa0 [libata] ahci_init_one+0x6c9/0xd20 [ahci]Ensure that we will not call kfree(host) twice, by performing the kfree() only if the devres_open_group() call failed.
[]
CVE-2020-14030
An issue was discovered in Ozeki NG SMS Gateway through 4.17.6. It stores SMS messages in .NET serialized format on the filesystem. By generating (and writing to the disk) malicious .NET serialized files, an attacker can trick the product into deserializing them, resulting in arbitrary code execution.
[ "cpe:2.3:a:ozeki:ozeki_ng_sms_gateway:*:*:*:*:*:*:*:*" ]
GHSA-c7c5-c859-5x65
SQL injection vulnerability in view_products_cat.php in Vastal I-Tech Cosmetics Zone allows remote attackers to execute arbitrary SQL commands via the cat_id parameter.
[]
GHSA-wpmh-p66j-c5pr
Cross-site scripting (XSS) vulnerability in the Fizzle 0.5 extension for Firefox allows remote attackers to inject arbitrary web script or HTML via RSS feeds, which are executed by the chrome: URI handler.
[]
GHSA-798v-p58f-mw7j
In the Linux kernel, the following vulnerability has been resolved:btrfs: don't drop extent_map for free space inode on write errorWhile running the CI for an unrelated change I hit the following panic with generic/648 on btrfs_holes_spacecache.assertion failed: block_start != EXTENT_MAP_HOLE, in fs/btrfs/extent_io.c:1385 ------------[ cut here ]------------ kernel BUG at fs/btrfs/extent_io.c:1385! invalid opcode: 0000 [#1] PREEMPT SMP NOPTI CPU: 1 PID: 2695096 Comm: fsstress Kdump: loaded Tainted: G W 6.8.0-rc2+ #1 RIP: 0010:__extent_writepage_io.constprop.0+0x4c1/0x5c0 Call Trace: <TASK> extent_write_cache_pages+0x2ac/0x8f0 extent_writepages+0x87/0x110 do_writepages+0xd5/0x1f0 filemap_fdatawrite_wbc+0x63/0x90 __filemap_fdatawrite_range+0x5c/0x80 btrfs_fdatawrite_range+0x1f/0x50 btrfs_write_out_cache+0x507/0x560 btrfs_write_dirty_block_groups+0x32a/0x420 commit_cowonly_roots+0x21b/0x290 btrfs_commit_transaction+0x813/0x1360 btrfs_sync_file+0x51a/0x640 __x64_sys_fdatasync+0x52/0x90 do_syscall_64+0x9c/0x190 entry_SYSCALL_64_after_hwframe+0x6e/0x76This happens because we fail to write out the free space cache in one instance, come back around and attempt to write it again. However on the second pass through we go to call btrfs_get_extent() on the inode to get the extent mapping. Because this is a new block group, and with the free space inode we always search the commit root to avoid deadlocking with the tree, we find nothing and return a EXTENT_MAP_HOLE for the requested range.This happens because the first time we try to write the space cache out we hit an error, and on an error we drop the extent mapping. This is normal for normal files, but the free space cache inode is special. We always expect the extent map to be correct. Thus the second time through we end up with a bogus extent map.Since we're deprecating this feature, the most straightforward way to fix this is to simply skip dropping the extent map range for this failed range.I shortened the test by using error injection to stress the area to make it easier to reproduce. With this patch in place we no longer panic with my error injection test.
[]
GHSA-gvp7-4cxg-vpqq
In the Linux kernel, the following vulnerability has been resolved:tracing/timerlat: Only clear timer if a kthread existsThe timerlat tracer can use user space threads to check for osnoise and timer latency. If the program using this is killed via a SIGTERM, the threads are shutdown one at a time and another tracing instance can start up resetting the threads before they are fully closed. That causes the hrtimer assigned to the kthread to be shutdown and freed twice when the dying thread finally closes the file descriptors, causing a use-after-free bug.Only cancel the hrtimer if the associated thread is still around. Also add the interface_lock around the resetting of the tlat_var->kthread.Note, this is just a quick fix that can be backported to stable. A real fix is to have a better synchronization between the shutdown of old threads and the starting of new ones.
[]
GHSA-283x-v98v-cchv
Due to missing permissions in Android Manifest file, Sensitive information disclosure issue can happen in PCI RCS app in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, QCA6574AU, QCS605, SD 210/SD 212/SD 205, SD 615/16/SD 415, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM630, SDM660
[]
CVE-2024-0889
Kmint21 Golden FTP Server PASV Command denial of service
A vulnerability was found in Kmint21 Golden FTP Server 2.02b and classified as problematic. This issue affects some unknown processing of the component PASV Command Handler. The manipulation leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252041 was assigned to this vulnerability.
[ "cpe:2.3:a:kmint21:golden_ftp_server:2.02b:*:*:*:professional:*:*:*" ]
GHSA-95qc-g5wc-qh7x
ioquake3 before r2253 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/ioq3.pid temporary file.
[]
CVE-2021-0887
In PVRSRVBridgeHeapCfgHeapConfigName, there is a possible leak of kernel heap content due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-236848817
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
CVE-2024-20823
Implicit intent hijacking vulnerability in SamsungAccount of Galaxy Store prior to version 4.5.63.6 allows local attackers to access sensitive information via implicit intent.
[ "cpe:2.3:a:samsung:galaxy_store:*:*:*:*:*:*:*:*" ]
GHSA-xf6r-6c2v-5fv9
Cross-Site Request Forgery (CSRF) vulnerability in DAEXT Autolinks Manager plugin <= 1.10.04 versions.
[]
GHSA-2qw5-q54w-h479
Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, and 4.6.1 allows man-in-the-middle attackers to obtain sensitive cleartext information via vectors involving injection of cleartext data into the client-server data stream, aka "TLS/SSL Information Disclosure Vulnerability."
[]
GHSA-7c3v-2jjv-hq3c
Cross-Site Request Forgery in Jenkins Autocomplete Parameter Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins Autocomplete Parameter Plugin 1.1 and earlier allows attackers to execute arbitrary code without sandbox protection if the victim is an administrator.
[]
CVE-2015-7915
Sauter EY-WS505F0x0 moduWeb Vision before 1.6.0 sends cleartext credentials, which allows remote attackers to obtain sensitive information by sniffing the network.
[ "cpe:2.3:o:sauter:moduweb_vision:*:*:*:*:*:*:*:*" ]
GHSA-m8mf-8j96-ph83
A vulnerability in the web conference chat component of MiCollab, versions 7.3 PR6 (7.3.0.601) and earlier, and 8.0 (8.0.0.40) through 8.0 SP2 FP2 (8.0.2.202), and MiVoice Business Express versions 7.3 PR3 (7.3.1.302) and earlier, and 8.0 (8.0.0.40) through 8.0 SP2 FP1 (8.0.2.202), could allow creation of unauthorized chat sessions, due to insufficient access controls. A successful exploit could allow execution of arbitrary commands.
[]
GHSA-gqh7-2v33-8jc4
Improper restriction of broadcasting Intent in ShareLive prior to version 13.2.03.5 leaks MAC address of the connected Bluetooth device.
[]
CVE-2021-22391
There is an Incorrect Calculation of Buffer Size in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset.
[ "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*" ]
GHSA-pc78-jp75-w4gw
A Type Confusion vulnerability in Autodesk 2018, 2017, 2013, 2012, 2011 can occur when processing a maliciously crafted PDF file. An attacker can leverage this to execute arbitrary code.
[]
GHSA-m6wj-p6f5-m5w3
The Windows Graphics Device Interface (GDI) in Microsoft Windows Server 2008 SP2 and R2 SP1 and Windows 7 SP1 allows an elevation of privilege vulnerability due to the way objects are handled in memory, aka "Windows GDI Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0816, and CVE-2018-0817.
[]
CVE-2022-26109
When a user opens a manipulated Portable Document Format (.pdf, PDFView.x3d) received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9.0, the application crashes and becomes temporarily unavailable to the user until restart of the application.
[ "cpe:2.3:a:sap:3d_visual_enterprise_viewer:9:*:*:*:*:*:*:*" ]
GHSA-g4pw-ghhq-vh5m
Tor before 0.1.1.20 uses improper logic to validate the "OR" destination, which allows remote attackers to perform a man-in-the-middle (MITM) attack via unspecified vectors.
[]
GHSA-v5fw-32vg-j8r3
WebKit in Apple iOS before 10, Safari before 10, and tvOS before 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-4611, CVE-2016-4733, CVE-2016-4734, and CVE-2016-4735.
[]
CVE-2025-23440
WordPress radSLIDE plugin <= 2.1 - Broken Access Control to Stored Cross-Site Scripting vulnerability
Missing Authorization vulnerability in radicaldesigns radSLIDE allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects radSLIDE: from n/a through 2.1.
[]
CVE-2024-28556
SQL Injection vulnerability in Sourcecodester php task management system v1.0, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via crafted payload to admin-manage-user.php.
[ "cpe:2.3:a:task_management_system_project:task_management_system:1.0:*:*:*:*:wordpress:*:*" ]
CVE-2024-27803
A permissions issue was addressed with improved validation. This issue is fixed in iOS 17.5 and iPadOS 17.5. An attacker with physical access may be able to share items from the lock screen.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
GHSA-vxf4-qh89-w2r6
The Hospira LifeCare PCA Infusion System before 7.0 does not validate network traffic associated with sending a (1) drug library, (2) software update, or (3) configuration change, which allows remote attackers to modify settings or medication data via packets on the (a) TELNET, (b) HTTP, (c) HTTPS, or (d) UPNP port. NOTE: this issue might overlap CVE-2015-3459.
[]
CVE-2024-5189
Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders <= 5.9.23 - Authenticated (Contributor+) Stored Cross-Site Scripting
The Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘custom_js’ parameter in all versions up to, and including, 5.9.23 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
CVE-2022-32820
An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5, Security Update 2022-005 Catalina. An app may be able to execute arbitrary code with kernel privileges.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:10.15.7:-:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:10.15.7:security_update_2022-004:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
GHSA-33wx-mh64-x7f5
SQL injection vulnerability in LetoDMS_Core/Core/inc.ClassDMS.php in LetoDMS (formerly MyDMS) before 3.3.8 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[]
CVE-2000-0249
The AIX Fast Response Cache Accelerator (FRCA) allows local users to modify arbitrary files via the configuration capability in the frcactrl program.
[ "cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:4.3.2:*:*:*:*:*:*:*" ]
GHSA-34f9-54m9-rwj4
cat_for_gen.php in Annuaire Netref 4.2 allows remote attackers to execute arbitrary PHP code by setting the ad_direct parameter to reference cat_for_gen.php, then including the code in the m_for_racine parameter, which is then written to cat_for_gen.php.
[]
GHSA-fq3j-rpjj-667v
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader 12.0.1.12430. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-18894.
[]
CVE-2010-4459
Unspecified vulnerability in Oracle Solaris 11 Express allows local users to affect availability via unknown vectors related to SCTP and Kernel/sockfs.
[ "cpe:2.3:o:sun:sunos:5.11:*:express:*:*:*:*:*" ]
CVE-2022-24404
Ciphertext Malleability in TETRA
Lack of cryptographic integrity check on TETRA air-interface encrypted traffic. Since a stream cipher is employed, this allows an active adversary to manipulate cleartext data in a bit-by-bit fashion.
[ "cpe:2.3:a:midnightblue:tetra\\:burst:-:*:*:*:*:*:*:*" ]
CVE-2014-7268
Cross-site scripting (XSS) vulnerability in the data-export feature in the Ricksoft WBS Gantt-Chart add-on 7.8.1 and earlier for JIRA allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-7267.
[ "cpe:2.3:a:ricksoft:wbs_gantt-chart:7.8.1:*:*:*:*:jira:*:*" ]
GHSA-34f8-28cp-wmcg
Microsoft Edge allows remote attackers to bypass the Same Origin Policy for HTML elements in other browser windows, aka "Microsoft Edge Security Feature Bypass Vulnerability." This vulnerability is different from those described in CVE-2017-0135 and CVE-2017-0140.
[]
GHSA-7jp3-77c6-fgrr
Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site, aka "CFormElement Use After Free Vulnerability."
[]
GHSA-h5xm-fgq6-3pjv
An elevation of privilege vulnerability in the MediaTek command queue driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: N/A. Android ID: A-35310230. References: M-ALPS03162263.
[]
CVE-2023-28244
Windows Kerberos Elevation of Privilege Vulnerability
Windows Kerberos Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ]
CVE-2006-1237
Multiple SQL injection vulnerabilities in DSNewsletter 1.0, with magic_quotes_gpc disabled, allow remote attackers to execute arbitrary SQL commands via the email parameter to (1) include/sub.php, (2) include/confirm.php, or (3) include/unconfirm.php.
[ "cpe:2.3:a:dsportal:dsnewsletter:1.0:*:*:*:*:*:*:*" ]
CVE-2019-13281
In Xpdf 4.01.01, a heap-based buffer overflow could be triggered in DCTStream::decodeImage() in Stream.cc when writing to frameBuf memory. It can, for example, be triggered by sending a crafted PDF document to the pdftotext tool. It allows an attacker to use a crafted pdf file to cause Denial of Service, an information leak, or possibly unspecified other impact.
[ "cpe:2.3:a:glyphandcog:xpdfreader:4.01.01:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*" ]
CVE-2024-44208
This issue was addressed through improved state management. This issue is fixed in macOS Sequoia 15. An app may be able to bypass certain Privacy preferences.
[ "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
CVE-2024-32795
WordPress WPCal.io <= 0.9.5.8 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Revmakx WPCal.Io – Easy Meeting Scheduler.This issue affects WPCal.Io – Easy Meeting Scheduler: from n/a through 0.9.5.8.
[]
GHSA-9fpp-3wjr-pgj6
Cross-site scripting (XSS) vulnerability in index.php in Google API Search 1.3.1 and earlier allows remote attackers to inject arbitrary web script or HTML via hex-encoded values in the REQ parameter.
[]
GHSA-8j9x-7hf9-69wq
XXE issue in Airsonic before 10.1.2 during parse.
[]
GHSA-w64q-ccr3-358g
The issue was addressed with improved checks. This issue is fixed in watchOS 11.2, visionOS 2.2, tvOS 18.2, macOS Sequoia 15.2, Safari 18.2, iOS 18.2 and iPadOS 18.2. Processing maliciously crafted web content may lead to an unexpected process crash.
[]
CVE-2022-22542
S/4HANA Supplier Factsheet exposes the private address and bank details of an Employee Business Partner with Supplier Role, AND Enterprise Search for Customer, Supplier and Business Partner objects exposes the private address fields of Employee Business Partners, to an actor that is not explicitly authorized to have access to that information, which could compromise Confidentiality.
[ "cpe:2.3:a:sap:s\\/4hana:104:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s\\/4hana:105:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s\\/4hana:106:*:*:*:*:*:*:*" ]
CVE-2016-5920
Cross-site scripting (XSS) vulnerability in the Web UI in IBM Financial Transaction Manager (FTM) for ACH Services 3.0.0.x before fp0015 and 3.0.1.0 before iFix0002 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.0:*:*:*:*:cps_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.1:*:*:*:*:cps_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.2:*:*:*:*:cps_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.3:*:*:*:*:cps_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.4:*:*:*:*:cps_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.5:*:*:*:*:cps_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.6:*:*:*:*:cps_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.7:*:*:*:*:cps_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.8:*:*:*:*:cps_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.9:*:*:*:*:cps_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.10:*:*:*:*:cps_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.11:*:*:*:*:cps_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.12:*:*:*:*:cps_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.13:*:*:*:*:cps_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.14:*:*:*:*:cps_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.0:*:*:*:*:check_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.1:*:*:*:*:check_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.2:*:*:*:*:check_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.3:*:*:*:*:check_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.4:*:*:*:*:check_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.5:*:*:*:*:check_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.6:*:*:*:*:check_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.7:*:*:*:*:check_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.8:*:*:*:*:check_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.9:*:*:*:*:check_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.10:*:*:*:*:check_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.11:*:*:*:*:check_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.12:*:*:*:*:check_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.13:*:*:*:*:check_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.14:*:*:*:*:check_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.1.0:*:*:*:*:check_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.0:*:*:*:*:ach_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.1:*:*:*:*:ach_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.2:*:*:*:*:ach_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.3:*:*:*:*:ach_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.4:*:*:*:*:ach_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.5:*:*:*:*:ach_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.6:*:*:*:*:ach_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.7:*:*:*:*:ach_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.8:*:*:*:*:ach_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.9:*:*:*:*:ach_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.10:*:*:*:*:ach_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.11:*:*:*:*:ach_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.12:*:*:*:*:ach_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.13:*:*:*:*:ach_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.14:*:*:*:*:ach_services:*:*", "cpe:2.3:a:ibm:financial_transaction_manager:3.0.1.0:*:*:*:*:ach_services:*:*" ]
CVE-2015-8979
Stack-based buffer overflow in the parsePresentationContext function in storescp in DICOM dcmtk-3.6.0 and earlier allows remote attackers to cause a denial of service (segmentation fault) via a long string sent to TCP port 4242.
[ "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:dicom:dcmtk:*:*:*:*:*:*:*:*" ]
GHSA-7wp7-h784-jvqx
OpenShift Enterprise version 3.x is vulnerable to a stored XSS via the log viewer for pods. The flaw is due to lack of sanitation of user input, specifically terminal escape characters, and the creation of clickable links automatically when viewing the log files for a pod.
[]
CVE-2024-26040
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[ "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*" ]
CVE-2008-1134
OMEGA (aka Omegasoft) INterneSErvicesLosungen (INSEL) 7 supports authentication with a cookie that lacks a shared secret, which allows remote attackers to login as an arbitrary user via a modified cookie.
[ "cpe:2.3:a:omegasoft:interneserviceslosungen:7:*:*:*:*:*:*:*" ]
CVE-2019-7956
Adobe Dreamweaver direct download installer versions 19.0 and below, 18.0 and below have an Insecure Library Loading (DLL hijacking) vulnerability. Successful exploitation could lead to Privilege Escalation in the context of the current user.
[ "cpe:2.3:a:adobe:dreamweaver:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2024-53804
WordPress WP Mailster plugin <= 1.8.16.0 - Sensitive Data Exposure vulnerability
Insertion of Sensitive Information Into Sent Data vulnerability in brandtoss WP Mailster allows Retrieve Embedded Sensitive Data.This issue affects WP Mailster: from n/a through 1.8.16.0.
[ "cpe:2.3:a:brandtoss:wpmailster:*:*:*:*:*:*:*:*" ]
CVE-2015-2189
Off-by-one error in the pcapng_read function in wiretap/pcapng.c in the pcapng file parser in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via an invalid Interface Statistics Block (ISB) interface ID in a crafted packet.
[ "cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.10.4:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.10.5:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.10.6:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.10.7:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.10.8:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.10.9:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.10.10:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.10.11:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.10.12:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*" ]
GHSA-3w3w-cf2p-7mw7
The Hippo Studio (aka com.appgreen.hippostudio) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
GHSA-x47w-j4pm-p7c6
systest.php on IBM GCM16 and GCM32 Global Console Manager switches with firmware before 1.20.20.23447 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the lpres parameter.
[]
CVE-2022-46855
WordPress Responsive Pricing Table Plugin <= 5.1.6 is vulnerable to Cross Site Scripting (XSS)
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in WP Darko Responsive Pricing Table plugin <= 5.1.6 versions.
[ "cpe:2.3:a:wpdarko:responsive_pricing_table:*:*:*:*:*:wordpress:*:*" ]
CVE-2024-33148
J2EEFAST v2.7.0 was discovered to contain a SQL injection vulnerability via the sql_filter parameter in the list function.
[]
CVE-2017-3306
Vulnerability in the MySQL Enterprise Monitor component of Oracle MySQL (subcomponent: Monitoring: Server). Supported versions that are affected are 3.1.6.8003 and earlier, 3.2.1182 and earlier and 3.3.2.1162 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Enterprise Monitor. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Enterprise Monitor, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Enterprise Monitor accessible data as well as unauthorized access to critical data or complete access to all MySQL Enterprise Monitor accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Enterprise Monitor. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L).
[ "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*" ]
CVE-2008-5284
The web server in IEA Software RadiusNT and RadiusX 5.1.38 and other versions before 5.1.44, Emerald 5.0.49 and other versions before 5.0.52, Air Marshal 2.0.4 and other versions before 2.0.8, and Radius test client (aka Radlogin) 4.0.20 and earlier, allows remote attackers to cause a denial of service (crash) via an HTTP Content-Length header with a negative value, which triggers a single byte overwrite of memory using a NULL terminator. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:iea_software:air_marshal:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:air_marshal:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:air_marshal:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:air_marshal:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:air_marshal:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:air_marshal:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:air_marshal:1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:air_marshal:1.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:air_marshal:1.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:air_marshal:1.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:air_marshal:1.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:air_marshal:1.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:air_marshal:1.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:air_marshal:1.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:air_marshal:1.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:air_marshal:1.0.22:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:air_marshal:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:air_marshal:2.0.0.b.7:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:air_marshal:2.0.0.b1:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:air_marshal:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:air_marshal:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:air_marshal:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:air_marshal:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:emerald:5.0.24:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:emerald:5.0.25:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:emerald:5.0.26:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:emerald:5.0.27:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:emerald:5.0.28:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:emerald:5.0.29:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:emerald:5.0.30:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:emerald:5.0.31:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:emerald:5.0.32:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:emerald:5.0.33:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:emerald:5.0.35:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:emerald:5.0.36:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:emerald:5.0.37:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:emerald:5.0.39:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:emerald:5.0.40:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:emerald:5.0.41:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:emerald:5.0.42:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:emerald:5.0.44:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:emerald:5.0.46:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:emerald:5.0.48:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:emerald:5.0.49:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:emerald:5.0.50:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:emerald:5.0.51:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radius_test_client:4.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radius_test_client:4.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:*:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:3.0.145:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:3.0.147:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:3.0.149:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:3.0.150:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:3.0.154:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:3.0.158:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:3.0.162:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:3.0.167:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:3.0.168:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:3.0.171:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:3.0.172:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:3.0.173:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:3.0.174:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:3.0.175:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:3.0.176:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:3.0.177:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:3.0.178:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:3.0.179:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:3.0.182:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:3.0.183:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:3.0.184:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:3.0.185:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:3.0.186:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:3.0.188:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:3.0.189:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:3.0.190:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:3.0.191:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.23:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.24:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.26:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.27:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.28:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.29:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.30:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.31:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.32:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.33:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.34:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.35:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.38:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.39:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.40:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.41:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.43:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.44:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.47:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.49:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.51:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.54:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.55:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.56:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.57:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.59:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.60:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.62:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.63:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.67:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.68:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.69:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.70:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.71:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.72:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.73:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.74:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.75:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.76:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.77:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.79:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.80:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.81:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.82:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.83:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.84:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.85:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.86:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.0.193:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:4.09:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.0.4a:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.0.7a:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.0.8b:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.0.9b:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.0.10b:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.0.13b:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.0.15b:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.0.22:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.0.27:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.0.29:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.0.31:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.0.35:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.0.36:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.0.38:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.0.39:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.0.42:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.0.43:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.0.45:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.0.49:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.0.50:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.0.54:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.0.55:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.0.58:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.1.19:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.1.24:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.1.25:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.1.29:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.1.35:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.1.38:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.1.40:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusnt:5.1.41:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:*:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:3.0.145:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:3.0.147:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:3.0.149:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:3.0.150:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:3.0.154:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:3.0.158:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:3.0.162:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:3.0.167:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:3.0.168:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:3.0.171:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:3.0.172:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:3.0.173:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:3.0.174:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:3.0.175:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:3.0.176:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:3.0.177:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:3.0.178:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:3.0.179:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:3.0.182:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:3.0.183:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:3.0.184:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:3.0.185:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:3.0.186:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:3.0.188:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:3.0.189:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:3.0.190:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:3.0.191:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.23:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.24:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.26:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.27:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.28:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.29:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.30:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.31:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.32:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.33:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.34:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.35:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.38:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.39:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.40:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.41:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.43:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.44:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.47:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.49:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.51:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.54:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.55:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.56:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.57:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.59:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.60:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.62:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.63:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.67:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.68:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.69:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.70:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.71:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.72:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.73:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.74:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.75:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.76:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.77:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.79:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.80:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.81:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.82:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.83:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.84:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.85:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.86:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.87:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.88:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:4.0.193:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.0.4a:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.0.7a:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.0.8b:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.0.9b:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.0.10b:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.0.13b:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.0.15b:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.0.22:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.0.27:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.0.29:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.0.31:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.0.35:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.0.36:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.0.38:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.0.39:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.0.42:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.0.43:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.0.45:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.0.49:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.0.50:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.0.54:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.0.55:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.0.57:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.0.58:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.1.19:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.1.24:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.1.25:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.1.29:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.1.35:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.1.38:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.1.40:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radiusx:5.1.41:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radlogin:4.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:iea_software:radlogin:4.0.20:*:*:*:*:*:*:*" ]
GHSA-xm7g-wx4h-pfxq
Improper Access Control in GitHub repository openemr/openemr prior to 7.0.1.
[]
CVE-2021-34433
In Eclipse Californium version 2.0.0 to 2.6.4 and 3.0.0-M1 to 3.0.0-M3, the certificate based (x509 and RPK) DTLS handshakes accidentally succeeds without verifying the server side's signature on the client side, if that signature is not included in the server's ServerKeyExchange.
[ "cpe:2.3:a:eclipse:californium:*:*:*:*:*:*:*:*", "cpe:2.3:a:eclipse:californium:3.0.0:m1:*:*:*:*:*:*", "cpe:2.3:a:eclipse:californium:3.0.0:m2:*:*:*:*:*:*", "cpe:2.3:a:eclipse:californium:3.0.0:m3:*:*:*:*:*:*" ]