id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2014-6354 | Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, and Internet Explorer 11 allows remote attackers to execute arbitrary code. | [
"cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*"
] |
|
CVE-2018-0062 | Junos OS: Denial of Service in J-Web | A Denial of Service vulnerability in J-Web service may allow a remote unauthenticated user to cause Denial of Service which may prevent other users to authenticate or to perform J-Web operations. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D77 on SRX Series; 12.3 versions prior to 12.3R12-S10; 12.3X48 versions prior to 12.3X48-D60 on SRX Series; 15.1 versions prior to 15.1R7; 15.1F6; 15.1X49 versions prior to 15.1X49-D120 on SRX Series; 15.1X53 versions prior to 15.1X53-D59 on EX2300/EX3400 Series; 15.1X53 versions prior to 15.1X53-D67 on QFX10K Series; 15.1X53 versions prior to 15.1X53-D234 on QFX5200/QFX5110 Series; 15.1X53 versions prior to 15.1X53-D470, 15.1X53-D495 on NFX Series; 16.1 versions prior to 16.1R6; 16.2 versions prior to 16.2R2-S6, 16.2R3; 17.1 versions prior to 17.1R2-S6, 17.1R3; 17.2 versions prior to 17.2R3; 17.3 versions prior to 17.3R2. No other Juniper Networks products or platforms are affected by this issue. | [
"cpe:2.3:o:juniper:junos:12.1x46:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d15:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d20:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d25:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d30:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d35:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d40:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d45:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d50:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d55:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d60:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d65:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:d10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:d15:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:d20:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:d25:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:d30:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:d35:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:d40:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:d45:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:d50:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:d55:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:d60:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d100:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d110:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d30:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d35:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d40:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d45:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d50:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d55:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d60:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d65:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d70:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d75:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d80:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d90:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d50:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d51:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d52:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d55:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d57:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d58:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d20:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d21:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d30:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d32:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d33:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d34:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d60:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d61:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d62:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d63:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d64:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d65:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d66:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx10000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d210:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d230:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d231:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d232:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx5110:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx5200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d40:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d45:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d495:*:*:*:*:*:*",
"cpe:2.3:h:juniper:nfx_series:-:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*"
] |
GHSA-wx3p-jg9w-g5x7 | Multiple cross-site request forgery (CSRF) vulnerabilities in NexusPHP 1.5 allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) linkname, (2) url, or (3) title parameter in an add action to linksmanage.php. | [] |
|
CVE-2024-40334 | idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/serverFile_deal.php?mudi=upFileDel&dataID=3 | [
"cpe:2.3:a:idccms_project:idccms:1.35:*:*:*:*:*:*:*",
"cpe:2.3:a:idccms:idccms:1.35:*:*:*:*:*:*:*"
] |
|
GHSA-r4xv-4m8v-9gfg | The TRE library in Libc in Apple iOS before 8.4.1 and OS X before 10.10.5 allows context-dependent attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted regular expression, a different vulnerability than CVE-2015-3796 and CVE-2015-3797. | [] |
|
CVE-2021-39773 | In VpnManagerService, there is a possible disclosure of installed VPN packages due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-191276656 | [
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*"
] |
|
CVE-2022-22266 | (Applicable to China models only) Unprotected WifiEvaluationService in TencentWifiSecurity application prior to SMR Jan-2022 Release 1 allows untrusted applications to get WiFi information without proper permission. | [
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] |
|
CVE-2017-2953 | Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability in the image conversion module when processing a TIFF image. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] |
|
GHSA-jf4c-392q-69v3 | An issue was discovered on Samsung mobile devices with N(7.x) software. Dex Station allows App Pinning bypass and lock-screen bypass via the "Use screen lock type to unpin" option. The Samsung ID is SVE-2017-11106 (February 2018). | [] |
|
GHSA-3g2p-5q22-h774 | An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message where an array length is inconsistent with the size of the element type. | [] |
|
CVE-2022-2869 | libtiff's tiffcrop tool has a uint32_t underflow which leads to out of bounds read and write in the extractContigSamples8bits routine. An attacker who supplies a crafted file to tiffcrop could trigger this flaw, most likely by tricking a user into opening the crafted file with tiffcrop. Triggering this flaw could cause a crash or potentially further exploitation. | [
"cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] |
|
GHSA-3gv9-wvwh-jv5c | The Georgia Packing (aka com.tapatalk.georgiapackingorg) application 3.9.16 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
CVE-2024-45687 | HTTP Server incorrectly accepting disallowed characters within header values | Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') vulnerability in Payara Platform Payara Server (Grizzly, REST Management Interface modules), Payara Platform Payara Micro (Grizzly modules) allows Manipulating State, Identity Spoofing.This issue affects Payara Server: from 4.1.151 through 4.1.2.191.51, from 5.20.0 through 5.70.0, from 5.2020.2 through 5.2022.5, from 6.2022.1 through 6.2024.12, from 6.0.0 through 6.21.0; Payara Micro: from 4.1.152 through 4.1.2.191.51, from 5.20.0 through 5.70.0, from 5.2020.2 through 5.2022.5, from 6.2022.1 through 6.2024.12, from 6.0.0 through 6.21.0. | [] |
CVE-2022-23576 | Integer overflow in Tensorflow | Tensorflow is an Open Source Machine Learning Framework. The implementation of `OpLevelCostEstimator::CalculateOutputSize` is vulnerable to an integer overflow if an attacker can create an operation which would involve tensors with large enough number of elements. We can have a large enough number of dimensions in `output_shape.dim()` or just a small number of dimensions being large enough to cause an overflow in the multiplication. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | [
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.7.0:*:*:*:*:*:*:*"
] |
GHSA-pjm3-f4vh-3h3h | Stored Cross-site Scripting in Jenkins Mask Passwords Plugin | Jenkins Mask Passwords Plugin 3.0 and earlier does not escape the name and description of Non-Stored Password parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. | [] |
GHSA-3m5j-r9wr-wr68 | The Kunena extension before 5.1.14 for Joomla! allows XSS via BBCode. | [] |
|
GHSA-r2pp-jg8w-vm6w | ImageMagick 7.0.6-1 has a large loop vulnerability in the ReadPWPImage function in coders\pwp.c. | [] |
|
CVE-2018-20913 | cPanel before 70.0.23 allows attackers to read the root accesshash via the WHM /cgi/trustclustermaster.cgi (SEC-364). | [
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] |
|
GHSA-p3gx-x4c5-c23m | Sandline Centraleyezer (On Premises) allows Stored XSS using HTML entities in the name field of the Category section. | [] |
|
CVE-2021-21623 | An incorrect permission check in Jenkins Matrix Authorization Strategy Plugin 2.6.5 and earlier allows attackers with Item/Read permission on nested items to access them, even if they lack Item/Read permission for parent folders. | [
"cpe:2.3:a:jenkins:matrix_authorization_strategy:*:*:*:*:*:jenkins:*:*"
] |
|
GHSA-g3gj-632x-fhrh | SSRF vulnerability due to missing permission check in Jenkins JMS Messaging Plugin | A server-side request forgery vulnerability exists in Jenkins JMS Messaging Plugin 1.1.1 and earlier in SSLCertificateAuthenticationMethod.java, UsernameAuthenticationMethod.java that allows attackers with Overall/Read permission to have Jenkins connect to a JMS endpoint. | [] |
CVE-2004-0580 | DHCP on Linksys BEFSR11, BEFSR41, BEFSR81, and BEFSRU31 Cable/DSL Routers, firmware version 1.45.7, does not properly clear previously used buffer contents in a BOOTP reply packet, which allows remote attackers to obtain sensitive information. | [
"cpe:2.3:h:linksys:befcmu10:*:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befn2ps4:*:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befn2ps4:1.42.7:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsr11:1.40.2:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsr11:1.41:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsr11:1.42.3:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsr11:1.42.7:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsr11:1.43:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsr11:1.43.3:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsr11:1.44:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsr41:1.35:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsr41:1.36:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsr41:1.37:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsr41:1.38.5:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsr41:1.39:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsr41:1.40.2:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsr41:1.41:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsr41:1.42.3:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsr41:1.42.7:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsr41:1.43:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsr41:1.43.3:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsr41:1.44:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsr41:1.45.7:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsr41w:*:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsr81:*:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsr81:2.42.7.1:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsr81:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsru31:1.40.2:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsru31:1.41:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsru31:1.42.3:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsru31:1.42.7:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsru31:1.43:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsru31:1.43.3:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsru31:1.44:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsx41:1.42.7:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsx41:1.43:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsx41:1.43.3:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsx41:1.43.4:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsx41:1.44:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsx41:1.44.3:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsx41:1.45.3:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befvp41:*:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befvp41:1.39.64:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befvp41:1.40.3f:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befvp41:1.40.4:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befvp41:1.42.7:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:rv082:*:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:wap55ag:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:wrt54g:1.42.3:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:wrt54g:2.00.8:*:*:*:*:*:*:*"
] |
|
GHSA-gqr9-4fcc-c9jq | Use after free in WebGPU in Google Chrome prior to 120.0.6099.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | [] |
|
CVE-2021-33550 | UDP Technology/Geutebrück camera devices: Command injection in date parameter leading to RCE | Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code. | [
"cpe:2.3:o:geutebrueck:g-cam_ebc-2110_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2110_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2110_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ebc-2110:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2111_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2111_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2111_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ebc-2111:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2241_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2241_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2241_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_efd-2241:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2250_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2250_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_efd-2250:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2230_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2230_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2230_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ethc-2230:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2239_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2239_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2239_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ethc-2239:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2240_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2240_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ethc-2240:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2249_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2249_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2249_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ethc-2249:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2270_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2270_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2270_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ewpc-2270:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_eec-2400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_eec-2400_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_eec-2400_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-code_eec-2400:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_een-2010_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_een-2010_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_een-2010_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-code_een-2010:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_een-2040_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_een-2040_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_een-2040_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-code_een-2040:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2112_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2112_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2112_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ebc-2112:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2251_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2251_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2251_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_efd-2251:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2275_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2275_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2275_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ewpc-2275:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2271_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2271_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2271_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ewpc-2271:*:*:*:*:*:*:*:*"
] |
CVE-2024-45621 | The Electron desktop application of Rocket.Chat through 6.3.4 allows stored XSS via links in an uploaded file, related to failure to use a separate browser upon encountering third-party external actions from PDF documents. | [
"cpe:2.3:a:rocket.chat:rocket.chat:*:*:*:*:*:*:*:*"
] |
|
GHSA-jxwx-xvh2-mgc2 | Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: All Modules). Supported versions that are affected are 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0 and 12.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N). | [] |
|
GHSA-597x-fg43-vrh4 | Cross-site scripting (XSS) vulnerability in (1) search.php and (2) topics.php for Invision Power Board (IPB) 2.0.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the highlite parameter. | [] |
|
GHSA-h282-h49g-gvfm | Cross-Site Request Forgery (CSRF) vulnerability in FameThemes FameTheme Demo Importer.This issue affects FameTheme Demo Importer: from n/a through 1.1.5. | [] |
|
GHSA-fj35-m94r-9h4c | Maltego incorrectly shares a MISP connection across users in a remote-transform use case | MISP MISP-maltego 1.4.4 incorrectly shares a MISP connection across users in a remote-transform use case. Version 1.4.5 contains a patch. | [] |
CVE-2000-1106 | Trend Micro InterScan VirusWall creates an "Intscan" share to the "InterScan" directory with permissions that grant Full Control permissions to the Everyone group, which allows attackers to gain privileges by modifying the VirusWall programs. | [
"cpe:2.3:a:trend_micro:interscan_viruswall:*:*:*:*:*:*:*:*"
] |
|
GHSA-689c-7h72-pfpf | Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to a buffer overflow. An attacker can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_openvpn_client function with the old_remote_subnet and the old_remote_mask variables. | [] |
|
GHSA-7q5p-8p3w-vc5f | Missing authorization in Power Platform allows an unauthenticated attacker to view sensitive information through a network attack vector. | [] |
|
CVE-2015-5072 | The BIRT Engine servlet in the AR System Mid Tier component before 9.0 SP1 for BMC Remedy AR System Server allows remote authenticated users to "navigate" to arbitrary local files via the __imageid parameter. | [
"cpe:2.3:a:bmc:remedy_ar_system_server:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bmc:remedy_ar_system_server:9.0:*:*:*:*:*:*:*"
] |
|
GHSA-mcg2-gcq9-c6xf | Terminology before 1.3.1 allows Remote Code Execution because popmedia is mishandled, as demonstrated by an unsafe "cat README.md" command when \e}pn is used. A popmedia control sequence can allow the malicious execution of executable file formats registered in the X desktop share MIME types (/usr/share/applications). The control sequence defers unknown file types to the handle_unknown_media() function, which executes xdg-open against the filename specified in the sequence. The use of xdg-open for all unknown file types allows executable file formats with a registered shared MIME type to be executed. An attacker can achieve remote code execution by introducing an executable file and a plain text file containing the control sequence through a fake software project (e.g., in Git or a tarball). When the control sequence is rendered (such as with cat), the executable file will be run. | [] |
|
CVE-2018-17004 | An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for wlan_access name. | [
"cpe:2.3:o:tp-link:tl-wr886n_firmware:6.0_2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:tl-wr886n_firmware:7.0_1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr886n:-:*:*:*:*:*:*:*"
] |
|
GHSA-rj3c-33c5-42hm | The user_ldap (aka LDAP user and group backend) application in ownCloud before 5.0.18, 6.x before 6.0.6, and 7.x before 7.0.3 allows remote attackers to bypass authentication via a null byte in the password and a valid user name, which triggers an unauthenticated bind. | [] |
|
GHSA-x35g-752c-r3xh | In the Linux kernel, the following vulnerability has been resolved:ata: libata-core: Fix double free on errorIf e.g. the ata_port_alloc() call in ata_host_alloc() fails, we will jump
to the err_out label, which will call devres_release_group().
devres_release_group() will trigger a call to ata_host_release().
ata_host_release() calls kfree(host), so executing the kfree(host) in
ata_host_alloc() will lead to a double free:kernel BUG at mm/slub.c:553!
Oops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
CPU: 11 PID: 599 Comm: (udev-worker) Not tainted 6.10.0-rc5 #47
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014
RIP: 0010:kfree+0x2cf/0x2f0
Code: 5d 41 5e 41 5f 5d e9 80 d6 ff ff 4d 89 f1 41 b8 01 00 00 00 48 89 d9 48 89 da
RSP: 0018:ffffc90000f377f0 EFLAGS: 00010246
RAX: ffff888112b1f2c0 RBX: ffff888112b1f2c0 RCX: ffff888112b1f320
RDX: 000000000000400b RSI: ffffffffc02c9de5 RDI: ffff888112b1f2c0
RBP: ffffc90000f37830 R08: 0000000000000000 R09: 0000000000000000
R10: ffffc90000f37610 R11: 617461203a736b6e R12: ffffea00044ac780
R13: ffff888100046400 R14: ffffffffc02c9de5 R15: 0000000000000006
FS: 00007f2f1cabe980(0000) GS:ffff88813b380000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f2f1c3acf75 CR3: 0000000111724000 CR4: 0000000000750ef0
PKRU: 55555554
Call Trace:
<TASK>
? __die_body.cold+0x19/0x27
? die+0x2e/0x50
? do_trap+0xca/0x110
? do_error_trap+0x6a/0x90
? kfree+0x2cf/0x2f0
? exc_invalid_op+0x50/0x70
? kfree+0x2cf/0x2f0
? asm_exc_invalid_op+0x1a/0x20
? ata_host_alloc+0xf5/0x120 [libata]
? ata_host_alloc+0xf5/0x120 [libata]
? kfree+0x2cf/0x2f0
ata_host_alloc+0xf5/0x120 [libata]
ata_host_alloc_pinfo+0x14/0xa0 [libata]
ahci_init_one+0x6c9/0xd20 [ahci]Ensure that we will not call kfree(host) twice, by performing the kfree()
only if the devres_open_group() call failed. | [] |
|
CVE-2020-14030 | An issue was discovered in Ozeki NG SMS Gateway through 4.17.6. It stores SMS messages in .NET serialized format on the filesystem. By generating (and writing to the disk) malicious .NET serialized files, an attacker can trick the product into deserializing them, resulting in arbitrary code execution. | [
"cpe:2.3:a:ozeki:ozeki_ng_sms_gateway:*:*:*:*:*:*:*:*"
] |
|
GHSA-c7c5-c859-5x65 | SQL injection vulnerability in view_products_cat.php in Vastal I-Tech Cosmetics Zone allows remote attackers to execute arbitrary SQL commands via the cat_id parameter. | [] |
|
GHSA-wpmh-p66j-c5pr | Cross-site scripting (XSS) vulnerability in the Fizzle 0.5 extension for Firefox allows remote attackers to inject arbitrary web script or HTML via RSS feeds, which are executed by the chrome: URI handler. | [] |
|
GHSA-798v-p58f-mw7j | In the Linux kernel, the following vulnerability has been resolved:btrfs: don't drop extent_map for free space inode on write errorWhile running the CI for an unrelated change I hit the following panic
with generic/648 on btrfs_holes_spacecache.assertion failed: block_start != EXTENT_MAP_HOLE, in fs/btrfs/extent_io.c:1385
------------[ cut here ]------------
kernel BUG at fs/btrfs/extent_io.c:1385!
invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
CPU: 1 PID: 2695096 Comm: fsstress Kdump: loaded Tainted: G W 6.8.0-rc2+ #1
RIP: 0010:__extent_writepage_io.constprop.0+0x4c1/0x5c0
Call Trace:
<TASK>
extent_write_cache_pages+0x2ac/0x8f0
extent_writepages+0x87/0x110
do_writepages+0xd5/0x1f0
filemap_fdatawrite_wbc+0x63/0x90
__filemap_fdatawrite_range+0x5c/0x80
btrfs_fdatawrite_range+0x1f/0x50
btrfs_write_out_cache+0x507/0x560
btrfs_write_dirty_block_groups+0x32a/0x420
commit_cowonly_roots+0x21b/0x290
btrfs_commit_transaction+0x813/0x1360
btrfs_sync_file+0x51a/0x640
__x64_sys_fdatasync+0x52/0x90
do_syscall_64+0x9c/0x190
entry_SYSCALL_64_after_hwframe+0x6e/0x76This happens because we fail to write out the free space cache in one
instance, come back around and attempt to write it again. However on
the second pass through we go to call btrfs_get_extent() on the inode to
get the extent mapping. Because this is a new block group, and with the
free space inode we always search the commit root to avoid deadlocking
with the tree, we find nothing and return a EXTENT_MAP_HOLE for the
requested range.This happens because the first time we try to write the space cache out
we hit an error, and on an error we drop the extent mapping. This is
normal for normal files, but the free space cache inode is special. We
always expect the extent map to be correct. Thus the second time
through we end up with a bogus extent map.Since we're deprecating this feature, the most straightforward way to
fix this is to simply skip dropping the extent map range for this failed
range.I shortened the test by using error injection to stress the area to make
it easier to reproduce. With this patch in place we no longer panic
with my error injection test. | [] |
|
GHSA-gvp7-4cxg-vpqq | In the Linux kernel, the following vulnerability has been resolved:tracing/timerlat: Only clear timer if a kthread existsThe timerlat tracer can use user space threads to check for osnoise and
timer latency. If the program using this is killed via a SIGTERM, the
threads are shutdown one at a time and another tracing instance can start
up resetting the threads before they are fully closed. That causes the
hrtimer assigned to the kthread to be shutdown and freed twice when the
dying thread finally closes the file descriptors, causing a use-after-free
bug.Only cancel the hrtimer if the associated thread is still around. Also add
the interface_lock around the resetting of the tlat_var->kthread.Note, this is just a quick fix that can be backported to stable. A real
fix is to have a better synchronization between the shutdown of old
threads and the starting of new ones. | [] |
|
GHSA-283x-v98v-cchv | Due to missing permissions in Android Manifest file, Sensitive information disclosure issue can happen in PCI RCS app in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, QCA6574AU, QCS605, SD 210/SD 212/SD 205, SD 615/16/SD 415, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM630, SDM660 | [] |
|
CVE-2024-0889 | Kmint21 Golden FTP Server PASV Command denial of service | A vulnerability was found in Kmint21 Golden FTP Server 2.02b and classified as problematic. This issue affects some unknown processing of the component PASV Command Handler. The manipulation leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252041 was assigned to this vulnerability. | [
"cpe:2.3:a:kmint21:golden_ftp_server:2.02b:*:*:*:professional:*:*:*"
] |
GHSA-95qc-g5wc-qh7x | ioquake3 before r2253 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/ioq3.pid temporary file. | [] |
|
CVE-2021-0887 | In PVRSRVBridgeHeapCfgHeapConfigName, there is a possible leak of kernel heap content due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-236848817 | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-20823 | Implicit intent hijacking vulnerability in SamsungAccount of Galaxy Store prior to version 4.5.63.6 allows local attackers to access sensitive information via implicit intent. | [
"cpe:2.3:a:samsung:galaxy_store:*:*:*:*:*:*:*:*"
] |
|
GHSA-xf6r-6c2v-5fv9 | Cross-Site Request Forgery (CSRF) vulnerability in DAEXT Autolinks Manager plugin <= 1.10.04 versions. | [] |
|
GHSA-2qw5-q54w-h479 | Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, and 4.6.1 allows man-in-the-middle attackers to obtain sensitive cleartext information via vectors involving injection of cleartext data into the client-server data stream, aka "TLS/SSL Information Disclosure Vulnerability." | [] |
|
GHSA-7c3v-2jjv-hq3c | Cross-Site Request Forgery in Jenkins Autocomplete Parameter Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins Autocomplete Parameter Plugin 1.1 and earlier allows attackers to execute arbitrary code without sandbox protection if the victim is an administrator. | [] |
CVE-2015-7915 | Sauter EY-WS505F0x0 moduWeb Vision before 1.6.0 sends cleartext credentials, which allows remote attackers to obtain sensitive information by sniffing the network. | [
"cpe:2.3:o:sauter:moduweb_vision:*:*:*:*:*:*:*:*"
] |
|
GHSA-m8mf-8j96-ph83 | A vulnerability in the web conference chat component of MiCollab, versions 7.3 PR6 (7.3.0.601) and earlier, and 8.0 (8.0.0.40) through 8.0 SP2 FP2 (8.0.2.202), and MiVoice Business Express versions 7.3 PR3 (7.3.1.302) and earlier, and 8.0 (8.0.0.40) through 8.0 SP2 FP1 (8.0.2.202), could allow creation of unauthorized chat sessions, due to insufficient access controls. A successful exploit could allow execution of arbitrary commands. | [] |
|
GHSA-gqh7-2v33-8jc4 | Improper restriction of broadcasting Intent in ShareLive prior to version 13.2.03.5 leaks MAC address of the connected Bluetooth device. | [] |
|
CVE-2021-22391 | There is an Incorrect Calculation of Buffer Size in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. | [
"cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-pc78-jp75-w4gw | A Type Confusion vulnerability in Autodesk 2018, 2017, 2013, 2012, 2011 can occur when processing a maliciously crafted PDF file. An attacker can leverage this to execute arbitrary code. | [] |
|
GHSA-m6wj-p6f5-m5w3 | The Windows Graphics Device Interface (GDI) in Microsoft Windows Server 2008 SP2 and R2 SP1 and Windows 7 SP1 allows an elevation of privilege vulnerability due to the way objects are handled in memory, aka "Windows GDI Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0816, and CVE-2018-0817. | [] |
|
CVE-2022-26109 | When a user opens a manipulated Portable Document Format (.pdf, PDFView.x3d) received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9.0, the application crashes and becomes temporarily unavailable to the user until restart of the application. | [
"cpe:2.3:a:sap:3d_visual_enterprise_viewer:9:*:*:*:*:*:*:*"
] |
|
GHSA-g4pw-ghhq-vh5m | Tor before 0.1.1.20 uses improper logic to validate the "OR" destination, which allows remote attackers to perform a man-in-the-middle (MITM) attack via unspecified vectors. | [] |
|
GHSA-v5fw-32vg-j8r3 | WebKit in Apple iOS before 10, Safari before 10, and tvOS before 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-4611, CVE-2016-4733, CVE-2016-4734, and CVE-2016-4735. | [] |
|
CVE-2025-23440 | WordPress radSLIDE plugin <= 2.1 - Broken Access Control to Stored Cross-Site Scripting vulnerability | Missing Authorization vulnerability in radicaldesigns radSLIDE allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects radSLIDE: from n/a through 2.1. | [] |
CVE-2024-28556 | SQL Injection vulnerability in Sourcecodester php task management system v1.0, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via crafted payload to admin-manage-user.php. | [
"cpe:2.3:a:task_management_system_project:task_management_system:1.0:*:*:*:*:wordpress:*:*"
] |
|
CVE-2024-27803 | A permissions issue was addressed with improved validation. This issue is fixed in iOS 17.5 and iPadOS 17.5. An attacker with physical access may be able to share items from the lock screen. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] |
|
GHSA-vxf4-qh89-w2r6 | The Hospira LifeCare PCA Infusion System before 7.0 does not validate network traffic associated with sending a (1) drug library, (2) software update, or (3) configuration change, which allows remote attackers to modify settings or medication data via packets on the (a) TELNET, (b) HTTP, (c) HTTPS, or (d) UPNP port. NOTE: this issue might overlap CVE-2015-3459. | [] |
|
CVE-2024-5189 | Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders <= 5.9.23 - Authenticated (Contributor+) Stored Cross-Site Scripting | The Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘custom_js’ parameter in all versions up to, and including, 5.9.23 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
CVE-2022-32820 | An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5, Security Update 2022-005 Catalina. An app may be able to execute arbitrary code with kernel privileges. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:10.15.7:security_update_2022-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
GHSA-33wx-mh64-x7f5 | SQL injection vulnerability in LetoDMS_Core/Core/inc.ClassDMS.php in LetoDMS (formerly MyDMS) before 3.3.8 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | [] |
|
CVE-2000-0249 | The AIX Fast Response Cache Accelerator (FRCA) allows local users to modify arbitrary files via the configuration capability in the frcactrl program. | [
"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.3.2:*:*:*:*:*:*:*"
] |
|
GHSA-34f9-54m9-rwj4 | cat_for_gen.php in Annuaire Netref 4.2 allows remote attackers to execute arbitrary PHP code by setting the ad_direct parameter to reference cat_for_gen.php, then including the code in the m_for_racine parameter, which is then written to cat_for_gen.php. | [] |
|
GHSA-fq3j-rpjj-667v | This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader 12.0.1.12430. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-18894. | [] |
|
CVE-2010-4459 | Unspecified vulnerability in Oracle Solaris 11 Express allows local users to affect availability via unknown vectors related to SCTP and Kernel/sockfs. | [
"cpe:2.3:o:sun:sunos:5.11:*:express:*:*:*:*:*"
] |
|
CVE-2022-24404 | Ciphertext Malleability in TETRA | Lack of cryptographic integrity check on TETRA air-interface encrypted traffic. Since a stream cipher is employed, this allows an active adversary to manipulate cleartext data in a bit-by-bit fashion. | [
"cpe:2.3:a:midnightblue:tetra\\:burst:-:*:*:*:*:*:*:*"
] |
CVE-2014-7268 | Cross-site scripting (XSS) vulnerability in the data-export feature in the Ricksoft WBS Gantt-Chart add-on 7.8.1 and earlier for JIRA allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-7267. | [
"cpe:2.3:a:ricksoft:wbs_gantt-chart:7.8.1:*:*:*:*:jira:*:*"
] |
|
GHSA-34f8-28cp-wmcg | Microsoft Edge allows remote attackers to bypass the Same Origin Policy for HTML elements in other browser windows, aka "Microsoft Edge Security Feature Bypass Vulnerability." This vulnerability is different from those described in CVE-2017-0135 and CVE-2017-0140. | [] |
|
GHSA-7jp3-77c6-fgrr | Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site, aka "CFormElement Use After Free Vulnerability." | [] |
|
GHSA-h5xm-fgq6-3pjv | An elevation of privilege vulnerability in the MediaTek command queue driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: N/A. Android ID: A-35310230. References: M-ALPS03162263. | [] |
|
CVE-2023-28244 | Windows Kerberos Elevation of Privilege Vulnerability | Windows Kerberos Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] |
CVE-2006-1237 | Multiple SQL injection vulnerabilities in DSNewsletter 1.0, with magic_quotes_gpc disabled, allow remote attackers to execute arbitrary SQL commands via the email parameter to (1) include/sub.php, (2) include/confirm.php, or (3) include/unconfirm.php. | [
"cpe:2.3:a:dsportal:dsnewsletter:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2019-13281 | In Xpdf 4.01.01, a heap-based buffer overflow could be triggered in DCTStream::decodeImage() in Stream.cc when writing to frameBuf memory. It can, for example, be triggered by sending a crafted PDF document to the pdftotext tool. It allows an attacker to use a crafted pdf file to cause Denial of Service, an information leak, or possibly unspecified other impact. | [
"cpe:2.3:a:glyphandcog:xpdfreader:4.01.01:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
] |
|
CVE-2024-44208 | This issue was addressed through improved state management. This issue is fixed in macOS Sequoia 15. An app may be able to bypass certain Privacy preferences. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-32795 | WordPress WPCal.io <= 0.9.5.8 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Revmakx WPCal.Io – Easy Meeting Scheduler.This issue affects WPCal.Io – Easy Meeting Scheduler: from n/a through 0.9.5.8.
| [] |
GHSA-9fpp-3wjr-pgj6 | Cross-site scripting (XSS) vulnerability in index.php in Google API Search 1.3.1 and earlier allows remote attackers to inject arbitrary web script or HTML via hex-encoded values in the REQ parameter. | [] |
|
GHSA-8j9x-7hf9-69wq | XXE issue in Airsonic before 10.1.2 during parse. | [] |
|
GHSA-w64q-ccr3-358g | The issue was addressed with improved checks. This issue is fixed in watchOS 11.2, visionOS 2.2, tvOS 18.2, macOS Sequoia 15.2, Safari 18.2, iOS 18.2 and iPadOS 18.2. Processing maliciously crafted web content may lead to an unexpected process crash. | [] |
|
CVE-2022-22542 | S/4HANA Supplier Factsheet exposes the private address and bank details of an Employee Business Partner with Supplier Role, AND Enterprise Search for Customer, Supplier and Business Partner objects exposes the private address fields of Employee Business Partners, to an actor that is not explicitly authorized to have access to that information, which could compromise Confidentiality. | [
"cpe:2.3:a:sap:s\\/4hana:104:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:s\\/4hana:105:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:s\\/4hana:106:*:*:*:*:*:*:*"
] |
|
CVE-2016-5920 | Cross-site scripting (XSS) vulnerability in the Web UI in IBM Financial Transaction Manager (FTM) for ACH Services 3.0.0.x before fp0015 and 3.0.1.0 before iFix0002 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.0:*:*:*:*:cps_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.1:*:*:*:*:cps_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.2:*:*:*:*:cps_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.3:*:*:*:*:cps_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.4:*:*:*:*:cps_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.5:*:*:*:*:cps_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.6:*:*:*:*:cps_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.7:*:*:*:*:cps_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.8:*:*:*:*:cps_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.9:*:*:*:*:cps_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.10:*:*:*:*:cps_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.11:*:*:*:*:cps_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.12:*:*:*:*:cps_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.13:*:*:*:*:cps_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.14:*:*:*:*:cps_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.0:*:*:*:*:check_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.1:*:*:*:*:check_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.2:*:*:*:*:check_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.3:*:*:*:*:check_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.4:*:*:*:*:check_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.5:*:*:*:*:check_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.6:*:*:*:*:check_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.7:*:*:*:*:check_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.8:*:*:*:*:check_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.9:*:*:*:*:check_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.10:*:*:*:*:check_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.11:*:*:*:*:check_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.12:*:*:*:*:check_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.13:*:*:*:*:check_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.14:*:*:*:*:check_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.1.0:*:*:*:*:check_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.0:*:*:*:*:ach_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.1:*:*:*:*:ach_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.2:*:*:*:*:ach_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.3:*:*:*:*:ach_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.4:*:*:*:*:ach_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.5:*:*:*:*:ach_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.6:*:*:*:*:ach_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.7:*:*:*:*:ach_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.8:*:*:*:*:ach_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.9:*:*:*:*:ach_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.10:*:*:*:*:ach_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.11:*:*:*:*:ach_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.12:*:*:*:*:ach_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.13:*:*:*:*:ach_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.0.14:*:*:*:*:ach_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:3.0.1.0:*:*:*:*:ach_services:*:*"
] |
|
CVE-2015-8979 | Stack-based buffer overflow in the parsePresentationContext function in storescp in DICOM dcmtk-3.6.0 and earlier allows remote attackers to cause a denial of service (segmentation fault) via a long string sent to TCP port 4242. | [
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dicom:dcmtk:*:*:*:*:*:*:*:*"
] |
|
GHSA-7wp7-h784-jvqx | OpenShift Enterprise version 3.x is vulnerable to a stored XSS via the log viewer for pods. The flaw is due to lack of sanitation of user input, specifically terminal escape characters, and the creation of clickable links automatically when viewing the log files for a pod. | [] |
|
CVE-2024-26040 | Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] |
CVE-2008-1134 | OMEGA (aka Omegasoft) INterneSErvicesLosungen (INSEL) 7 supports authentication with a cookie that lacks a shared secret, which allows remote attackers to login as an arbitrary user via a modified cookie. | [
"cpe:2.3:a:omegasoft:interneserviceslosungen:7:*:*:*:*:*:*:*"
] |
|
CVE-2019-7956 | Adobe Dreamweaver direct download installer versions 19.0 and below, 18.0 and below have an Insecure Library Loading (DLL hijacking) vulnerability. Successful exploitation could lead to Privilege Escalation in the context of the current user. | [
"cpe:2.3:a:adobe:dreamweaver:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-53804 | WordPress WP Mailster plugin <= 1.8.16.0 - Sensitive Data Exposure vulnerability | Insertion of Sensitive Information Into Sent Data vulnerability in brandtoss WP Mailster allows Retrieve Embedded Sensitive Data.This issue affects WP Mailster: from n/a through 1.8.16.0. | [
"cpe:2.3:a:brandtoss:wpmailster:*:*:*:*:*:*:*:*"
] |
CVE-2015-2189 | Off-by-one error in the pcapng_read function in wiretap/pcapng.c in the pcapng file parser in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via an invalid Interface Statistics Block (ISB) interface ID in a crafted packet. | [
"cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.12:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*"
] |
|
GHSA-3w3w-cf2p-7mw7 | The Hippo Studio (aka com.appgreen.hippostudio) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
GHSA-x47w-j4pm-p7c6 | systest.php on IBM GCM16 and GCM32 Global Console Manager switches with firmware before 1.20.20.23447 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the lpres parameter. | [] |
|
CVE-2022-46855 | WordPress Responsive Pricing Table Plugin <= 5.1.6 is vulnerable to Cross Site Scripting (XSS) | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in WP Darko Responsive Pricing Table plugin <= 5.1.6 versions. | [
"cpe:2.3:a:wpdarko:responsive_pricing_table:*:*:*:*:*:wordpress:*:*"
] |
CVE-2024-33148 | J2EEFAST v2.7.0 was discovered to contain a SQL injection vulnerability via the sql_filter parameter in the list function. | [] |
|
CVE-2017-3306 | Vulnerability in the MySQL Enterprise Monitor component of Oracle MySQL (subcomponent: Monitoring: Server). Supported versions that are affected are 3.1.6.8003 and earlier, 3.2.1182 and earlier and 3.3.2.1162 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Enterprise Monitor. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Enterprise Monitor, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Enterprise Monitor accessible data as well as unauthorized access to critical data or complete access to all MySQL Enterprise Monitor accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Enterprise Monitor. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L). | [
"cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*"
] |
|
CVE-2008-5284 | The web server in IEA Software RadiusNT and RadiusX 5.1.38 and other versions before 5.1.44, Emerald 5.0.49 and other versions before 5.0.52, Air Marshal 2.0.4 and other versions before 2.0.8, and Radius test client (aka Radlogin) 4.0.20 and earlier, allows remote attackers to cause a denial of service (crash) via an HTTP Content-Length header with a negative value, which triggers a single byte overwrite of memory using a NULL terminator. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:iea_software:air_marshal:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:air_marshal:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:air_marshal:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:air_marshal:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:air_marshal:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:air_marshal:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:air_marshal:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:air_marshal:1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:air_marshal:1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:air_marshal:1.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:air_marshal:1.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:air_marshal:1.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:air_marshal:1.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:air_marshal:1.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:air_marshal:1.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:air_marshal:1.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:air_marshal:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:air_marshal:2.0.0.b.7:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:air_marshal:2.0.0.b1:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:air_marshal:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:air_marshal:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:air_marshal:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:air_marshal:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:emerald:5.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:emerald:5.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:emerald:5.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:emerald:5.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:emerald:5.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:emerald:5.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:emerald:5.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:emerald:5.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:emerald:5.0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:emerald:5.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:emerald:5.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:emerald:5.0.36:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:emerald:5.0.37:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:emerald:5.0.39:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:emerald:5.0.40:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:emerald:5.0.41:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:emerald:5.0.42:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:emerald:5.0.44:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:emerald:5.0.46:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:emerald:5.0.48:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:emerald:5.0.49:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:emerald:5.0.50:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:emerald:5.0.51:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radius_test_client:4.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radius_test_client:4.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:*:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:3.0.145:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:3.0.147:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:3.0.149:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:3.0.150:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:3.0.154:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:3.0.158:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:3.0.162:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:3.0.167:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:3.0.168:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:3.0.171:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:3.0.172:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:3.0.173:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:3.0.174:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:3.0.175:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:3.0.176:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:3.0.177:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:3.0.178:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:3.0.179:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:3.0.182:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:3.0.183:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:3.0.184:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:3.0.185:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:3.0.186:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:3.0.188:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:3.0.189:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:3.0.190:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:3.0.191:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.34:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.38:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.39:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.40:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.41:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.43:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.44:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.47:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.49:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.51:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.54:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.55:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.56:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.57:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.59:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.60:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.62:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.63:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.67:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.68:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.69:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.70:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.71:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.72:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.73:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.74:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.75:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.76:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.77:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.79:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.80:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.81:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.82:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.83:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.84:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.85:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.86:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.0.193:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:4.09:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.0.4a:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.0.7a:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.0.8b:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.0.9b:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.0.10b:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.0.13b:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.0.15b:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.0.36:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.0.38:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.0.39:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.0.42:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.0.43:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.0.45:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.0.49:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.0.50:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.0.54:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.0.55:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.0.58:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.1.24:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.1.25:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.1.29:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.1.35:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.1.38:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.1.40:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusnt:5.1.41:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:*:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:3.0.145:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:3.0.147:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:3.0.149:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:3.0.150:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:3.0.154:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:3.0.158:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:3.0.162:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:3.0.167:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:3.0.168:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:3.0.171:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:3.0.172:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:3.0.173:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:3.0.174:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:3.0.175:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:3.0.176:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:3.0.177:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:3.0.178:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:3.0.179:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:3.0.182:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:3.0.183:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:3.0.184:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:3.0.185:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:3.0.186:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:3.0.188:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:3.0.189:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:3.0.190:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:3.0.191:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.34:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.38:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.39:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.40:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.41:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.43:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.44:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.47:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.49:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.51:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.54:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.55:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.56:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.57:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.59:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.60:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.62:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.63:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.67:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.68:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.69:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.70:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.71:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.72:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.73:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.74:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.75:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.76:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.77:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.79:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.80:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.81:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.82:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.83:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.84:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.85:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.86:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.87:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.88:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:4.0.193:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.0.4a:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.0.7a:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.0.8b:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.0.9b:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.0.10b:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.0.13b:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.0.15b:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.0.36:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.0.38:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.0.39:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.0.42:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.0.43:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.0.45:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.0.49:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.0.50:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.0.54:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.0.55:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.0.57:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.0.58:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.1.24:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.1.25:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.1.29:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.1.35:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.1.38:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.1.40:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radiusx:5.1.41:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radlogin:4.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:iea_software:radlogin:4.0.20:*:*:*:*:*:*:*"
] |
|
GHSA-xm7g-wx4h-pfxq | Improper Access Control in GitHub repository openemr/openemr prior to 7.0.1. | [] |
|
CVE-2021-34433 | In Eclipse Californium version 2.0.0 to 2.6.4 and 3.0.0-M1 to 3.0.0-M3, the certificate based (x509 and RPK) DTLS handshakes accidentally succeeds without verifying the server side's signature on the client side, if that signature is not included in the server's ServerKeyExchange. | [
"cpe:2.3:a:eclipse:californium:*:*:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:californium:3.0.0:m1:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:californium:3.0.0:m2:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:californium:3.0.0:m3:*:*:*:*:*:*"
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.