id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2022-21132 | Directory traversal vulnerability in pfSense-pkg-WireGuard pfSense-pkg-WireGuard 0.1.5 versions prior to 0.1.5_4 and pfSense-pkg-WireGuard 0.1.6 versions prior to 0.1.6_1 allows a remote authenticated attacker to lead a pfSense user to view a file outside the public folder. | [
"cpe:2.3:a:pfsense:pfsense-pkg-wireguard:*:*:*:*:*:*:*:*",
"cpe:2.3:a:pfsense:pfsense-pkg-wireguard:0.1.6:*:*:*:*:*:*:*"
] |
|
CVE-2017-9957 | A vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which the web service contains a hidden system account with a hardcoded password. An attacker can use this information to log into the system with high-privilege credentials. | [
"cpe:2.3:a:schneider-electric:u.motion_builder:*:*:*:*:*:*:*:*"
] |
|
GHSA-vj5c-ccv3-x6fh | In AlarmManagerActivity of AlarmManagerActivity.java, there is a possible way to bypass background activity launch restrictions via a pendingIntent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12LAndroid ID: A-195756028 | [] |
|
GHSA-r7cm-47vv-77vj | Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from UFO to non-UFO one, which leads to a memory corruption. In case UFO packet lengths exceeds MTU, copy = maxfraglen - skb->len becomes negative on the non-UFO path and the branch to allocate new skb is taken. This triggers fragmentation and computation of fraggap = skb_prev->len - maxfraglen. Fraggap can exceed MTU, causing copy = datalen - transhdrlen - fraggap to become negative. Subsequently skb_copy_and_csum_bits() writes out-of-bounds. A similar issue is present in IPv6 code. The bug was introduced in e89e9cf539a2 ("[IPv4/IPv6]: UFO Scatter-gather approach") on Oct 18 2005. | [] |
|
CVE-2024-52360 | IBM Concert Software SQL injection | IBM Concert Software 1.0.0, 1.0.1, 1.0.2, and 1.0.2.1 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database. | [
"cpe:2.3:a:ibm:concert:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:concert:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:concert:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:concert:1.0.2.1:*:*:*:*:*:*:*"
] |
CVE-2022-38017 | StorSimple 8000 Series Elevation of Privilege Vulnerability | StorSimple 8000 Series Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:storsimple_8000_series:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:storsimple_8010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microsoft:storsimple_8010:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:storsimple_8020_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microsoft:storsimple_8020:-:*:*:*:*:*:*:*"
] |
GHSA-v7mh-qpq8-5g5p | The /n software IPWorks SSH library SFTPServer component can be induced to make unintended filesystem or network path requests when loading a SSH public key or certificate. To be exploitable, an application calling the SFTPServer component must grant user access without verifying the SSH public key or certificate (which would most likely be a separate vulnerability in the calling application). IPWorks SSH versions 22.0.8945 and 24.0.8945 were released to address this condition by blocking all filesystem and network path requests for SSH public keys or certificates. | [] |
|
CVE-2024-5227 | TP-Link Omada ER605 PPTP VPN username Command Injection Remote Code Execution Vulnerability | TP-Link Omada ER605 PPTP VPN username Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are only vulnerable if configured to use a PPTP VPN with LDAP authentication.
The specific flaw exists within the handling of the username parameter provided to the /usr/bin/pppd endpoint. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-22446. | [
"cpe:2.3:o:tp-link:omada_er605_firmware:2.6_2.2.2build20231017:*:*:*:*:*:*:*"
] |
CVE-2012-3548 | The dissect_drda function in epan/dissectors/packet-drda.c in Wireshark 1.6.x through 1.6.10 and 1.8.x through 1.8.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a small value for a certain length field in a capture file. | [
"cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*"
] |
|
GHSA-m48v-hpw2-8w3j | Cross-Site Request Forgery (CSRF) vulnerability in Robert Macchi WP Links Page.This issue affects WP Links Page: from n/a through 4.9.4. | [] |
|
CVE-2017-13175 | An information disclosure vulnerability in the NVIDIA libwilhelm. Product: Android. Versions: Android kernel. Android ID A-64339309. References: N-CVE-2017-13175. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-21511 | Versions of the package mysql2 before 3.9.7 are vulnerable to Arbitrary Code Injection due to improper sanitization of the timezone parameter in the readCodeFor function by calling a native MySQL Server date/time function. | [
"cpe:2.3:a:mysql2:mysql2:-:*:*:*:*:*:*:*"
] |
|
GHSA-p27h-rx3j-x2q4 | Unspecified vulnerability in Oracle Sun Solaris 10 allows local users to affect availability via vectors related to CPU performance counters drivers. | [] |
|
GHSA-7hq7-q2f8-9mp4 | In Flexense SysGauge Server 3.6.18, the Control Protocol suffers from a denial of service. The attack vector is a crafted SERVER_GET_INFO packet sent to control port 9221. | [] |
|
CVE-2016-10653 | xd-testing is a testing library for cross-device (XD) web applications. xd-testing downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server. | [
"cpe:2.3:a:xd-testing_project:xd-testing:-:*:*:*:*:node.js:*:*"
] |
|
CVE-2017-9696 | In android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, buffer over-read is possible in camera driver function msm_isp_stop_stats_stream. Variable stream_cfg_cmd->num_streams is from userspace, and it is not checked against "MSM_ISP_STATS_MAX". | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
CVE-2020-3517 | Cisco FXOS and NX-OS Software Cisco Fabric Services Denial of Service Vulnerability | A vulnerability in the Cisco Fabric Services component of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated attacker to cause process crashes, which could result in a denial of service (DoS) condition on an affected device. The attack vector is configuration dependent and could be remote or adjacent. For more information about the attack vector, see the Details section of this advisory. The vulnerability is due to insufficient error handling when the affected software parses Cisco Fabric Services messages. An attacker could exploit this vulnerability by sending malicious Cisco Fabric Services messages to an affected device. A successful exploit could allow the attacker to cause a reload of an affected device, which could result in a DoS condition. | [
"cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4112:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4115:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4125:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4145:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a3\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a3\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a3\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a4\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a4\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a4\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a4\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a4\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a4\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(2a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(3a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(4a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(5a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(5b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(8\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a7\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a7\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a7\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a7\\(2a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(4a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(6.213\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(7a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(7b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(8\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(9\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(9.7\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(10\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(10a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(11\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(11a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(11b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(8\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(9\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u4\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u4\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u4\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u4\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u5\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u5\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u5\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u5\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(0.46\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(2a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(3a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(4a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(5a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(5b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(5c\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(8\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(9\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(10\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(10a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(2a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(3n\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(5a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(6a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(6b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(8\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(8a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(8b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(10\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(11b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(12\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(14\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(14a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(14b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(16\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(18\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(20\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(20a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(22\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(24\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(25\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(27\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(0\\)n1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(1\\)n1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(3a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(3b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(3c\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i2\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i2\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i2\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i2\\(2a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i2\\(2b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i2\\(2c\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i2\\(2d\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i2\\(2e\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i2\\(2r\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i2\\(2s\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i2\\(2v\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i2\\(2w\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i2\\(2x\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i2\\(2y\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i3\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(1t\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(6t\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(8\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(8a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(8b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(8z\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(9\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i5\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i5\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i5\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i5\\(3a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i5\\(3b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i6\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i6\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(3z\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(5a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(6z\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(8\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)ia7\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)ia7\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)ic4\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)im3\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)im3\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)im3\\(2a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)im3\\(2b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)im3\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)im7\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(4\\)n1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(4\\)n1\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(5\\)n1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(5\\)n1\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(6\\)n1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(6\\)n1\\(2s\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(6\\)n1\\(3s\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(6\\)n1\\(4s\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(7\\)n1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(7\\)n1\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(7\\)n1\\(1b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(8\\)n1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(8\\)n1\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.1\\(0\\)n1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.1\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.1\\(0\\)n1\\(1b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.1\\(0.1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.1\\(1\\)n1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.1\\(1\\)n1\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.1\\(2\\)n1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.1\\(2\\)n1\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(2a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.1\\(4\\)n1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.1\\(4\\)n1\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.1\\(4\\)n1\\(1c\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.1\\(4\\)n1\\(1d\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.1\\(5\\)n1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.1\\(5\\)n1\\(1b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.2\\(0\\)d1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.2\\(0\\)n1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.2\\(1\\)d\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.2\\(2\\)d1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.2\\(2\\)d1\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.2\\(2\\)d1\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.2\\(2\\)d1\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(0\\)d1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(0\\)dx\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(0\\)n1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(0\\)n1\\(1b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(1\\)d1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(1\\)n1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(2\\)d1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(2\\)d1\\(1d\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(2\\)d1\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(2\\)d1\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(2\\)d1\\(3a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(2\\)n1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(2\\)n1\\(1b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(2\\)n1\\(1c\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(3\\)d1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(4\\)d1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(4\\)n1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(4\\)n1\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(5\\)d1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(5\\)n1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(6\\)n1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(6\\)n1\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(7\\)n1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(7\\)n1\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(7\\)n1\\(1b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.1\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.1\\(1b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.1\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.1\\(2a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.2\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.2\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.2\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.2\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.2\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.3\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.3\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.4\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.4\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.2\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.2\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.2\\(2t\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.2\\(2v\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.2\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.2\\(3y\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(1z\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_6001:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_6004:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9000v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6248up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6296up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6324:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_64108:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6454:-:*:*:*:*:*:*:*"
] |
GHSA-7j97-8xvp-r6f3 | The nrlakin/homepage repository through 2017-03-06 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. | [] |
|
GHSA-78qm-jggg-xmvh | Hoteldruid v3.0.5 was discovered to contain multiple SQL injection vulnerabilities at /hoteldruid/clienti.php via the annonascita, annoscaddoc, giornonascita, giornoscaddoc, lingua_cli, mesenascita, and mesescaddoc parameters. | [] |
|
GHSA-fw7j-849m-mpv4 | ** DISPUTED ** KNX ETS6 through 6.0.0 uses the hard-coded password ETS5Password, with a salt value of Ivan Medvedev, allowing local users to read project information, a similar issue to CVE-2021-36799. NOTE: The vendor disputes this because it is not the responsibility of the ETS to securely store cryptographic key material when it is not being exported. | [] |
|
GHSA-6ff3-hp98-m9fj | This candidate was in a CNA pool that was not assigned to any issues during 2022. | [] |
|
GHSA-w526-pr9q-g5j8 | An issue was discovered in Activision Infinity Ward Call of Duty Modern Warfare 2 through 2019-12-11. PartyHost_HandleJoinPartyRequest has a buffer overflow vulnerability and can be exploited by using a crafted joinParty packet. This can be utilized to conduct arbitrary code execution on a victim's machine. | [] |
|
GHSA-p5m3-262w-g7wv | Stack-based buffer overflow in Apple Type Services (ATS) in Apple Mac OS X 10.5.8 and 10.6.x before 10.6.5 allows remote attackers to execute arbitrary code via a crafted embedded font in a document. | [] |
|
CVE-2010-1508 | Heap-based buffer overflow in Apple QuickTime before 7.6.9 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Track Header (aka tkhd) atoms. | [
"cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-11181 | Out of bound access issue while handling cvp process control command due to improper validation of buffer pointer received from HLOS in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile | [
"cpe:2.3:o:qualcomm:pm3003a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm3003a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm8009_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8009:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm8150a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8150a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm8150b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8150b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm8150c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8150c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm8150l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8150l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm8250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pmk8002_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmk8002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pmr525_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmr525:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pmx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmx55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qbt2000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qbt2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfs2530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfs2530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfs2580_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfs2580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qsm8250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qsm8250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qtc800h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qtc800h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qtc801s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qtc801s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdr8250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdr8250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdr865_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdr865:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:smb1355_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb1355:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:smb1390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb1390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:smr525_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smr525:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:smr526_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smr526:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*"
] |
|
GHSA-w9qp-xc8f-8xcq | This vulnerability exists in SyroTech SY-GPON-1110-WDONT Router due to missing HTTPOnly flag for the session cookies associated with the router's web management interface. An attacker with remote access could exploit this by intercepting transmission within an HTTP session on the vulnerable system.Successful exploitation of this vulnerability could allow the attacker to capture cookies and obtain sensitive information on the targeted system. | [] |
|
CVE-2011-3246 | CFNetwork in Apple iOS before 5.0.1 and Mac OS X 10.7 before 10.7.2 does not properly parse URLs, which allows remote attackers to trigger visits to unintended web sites, and transmission of cookies to unintended web sites, via a crafted (1) http or (2) https URL. | [
"cpe:2.3:o:apple:mac_os_x:10.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.5:-:ipad:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.5:-:ipodtouch:*:*:*:*:*"
] |
|
CVE-2019-0548 | A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka "ASP.NET Core Denial of Service Vulnerability." This affects ASP.NET Core 2.2, ASP.NET Core 2.1. This CVE ID is unique from CVE-2019-0564. | [
"cpe:2.3:a:microsoft:asp.net_core:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:asp.net_core:2.2:*:*:*:*:*:*:*"
] |
|
CVE-2023-20555 | Insufficient input validation in
CpmDisplayFeatureSmm may allow an attacker to corrupt SMM memory by overwriting
an arbitrary bit in an attacker-controlled pointer potentially leading to
arbitrary code execution in SMM.
| [
"cpe:2.3:o:amd:ryzen_3_3300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3300x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3600_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3600x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_3700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_3700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_3700x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_3800x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_3800x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_3850x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_3850x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5950x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5900x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_pro_5945_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_pro_5945:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5800x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5700x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_pro_5845_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_pro_5845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600x3d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600x3d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_pro_5645_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_pro_5645:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5700ge_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600ge_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5300g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5300ge_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_7950x3d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_7950x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_7900x3d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_7900x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_7900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_pro_7945_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_7800x3d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_7700x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_7700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_pro_7745_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_7600x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_7600_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_pro_7645_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_pro_7645:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_7500f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_4700s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_4700s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_4500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_4500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_4100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_4100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_pro_300ge_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_pro_300ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_gold_3150ge_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_gold_3150ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_gold_pro_3150ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_gold_3150g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_gold_pro_3150g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_silver_3050e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_pro_3045b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_silver_3050u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_silver_3050c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_pro_3145b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_gold_3150u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_gold_3150c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_3015e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_3015e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_3015ce_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_3015ce:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_3780u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_3750h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_3700c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_3700u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3580u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3550h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3500c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3500u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3450u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3350u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3300u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_4900h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_4900hs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_4800h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_4800hs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_4800hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_4980u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_4980u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_4800u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_4800u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_4700u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_4600h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_4600hs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_4600hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_4680u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_4680u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_4600u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_4500u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_4300u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5700u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5500u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5300u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5980hx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5980hs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5900hx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5900hs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5800h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5800hs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5825u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5800u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600hs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5625u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5560u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5425u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5400u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5125c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_6980hx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_6980hs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_6900hx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_6900hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_6900hs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_6900hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_6800h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_6800hs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_6800u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_6800u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_6600h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_6600hs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_6600u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_7520u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_7320u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_pro_7730u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_pro_7730u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_pro_7530u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_pro_7530u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_pro_7330u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_pro_7330u:-:*:*:*:*:*:*:*"
] |
|
GHSA-h2mj-pqgp-xmmj | A vulnerability in the web interface of the Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. It is also possible on certain software releases that the ASA will not reload, but an attacker could view sensitive system information without authentication by using directory traversal techniques. The vulnerability is due to lack of proper input validation of the HTTP URL. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. An exploit could allow the attacker to cause a DoS condition or unauthenticated disclosure of information. This vulnerability applies to IPv4 and IPv6 HTTP traffic. This vulnerability affects Cisco ASA Software and Cisco Firepower Threat Defense (FTD) Software that is running on the following Cisco products: 3000 Series Industrial Security Appliance (ISA), ASA 1000V Cloud Firewall, ASA 5500 Series Adaptive Security Appliances, ASA 5500-X Series Next-Generation Firewalls, ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Adaptive Security Virtual Appliance (ASAv), Firepower 2100 Series Security Appliance, Firepower 4100 Series Security Appliance, Firepower 9300 ASA Security Module, FTD Virtual (FTDv). Cisco Bug IDs: CSCvi16029. | [] |
|
GHSA-wxxj-43fh-x378 | A vulnerability has been found in Shanxi Diankeyun Technology NODERP up to 6.0.2 and classified as critical. This vulnerability affects unknown code of the file /runtime/log. The manipulation leads to files or directories accessible. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-252274 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] |
|
GHSA-hq4h-fvjm-7fqw | A vulnerability in Trend Micro Apex One on macOS may allow an attacker to manipulate a certain binary to load and run a script from a user-writable folder, which then would allow them to execute arbitrary code as root. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | [] |
|
CVE-2018-5862 | In __wlan_hdd_cfg80211_vendor_scan() in all Android releases from CAF using the Linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before security patch level 2018-07-05, when SCAN_SSIDS and QCA_WLAN_VENDOR_ATTR_SCAN_FREQUENCIES are parsed, a buffer overwrite can potentially occur. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
GHSA-27hg-xg89-rq4f | A vulnerability has been identified in SIMATIC STEP 7 Safety V16 (All versions < V16 Update 7), SIMATIC STEP 7 Safety V17 (All versions < V17 Update 7), SIMATIC STEP 7 Safety V18 (All versions < V18 Update 2), SIMATIC STEP 7 V16 (All versions < V16 Update 7), SIMATIC STEP 7 V17 (All versions < V17 Update 7), SIMATIC STEP 7 V18 (All versions < V18 Update 2), SIMATIC WinCC Unified V16 (All versions < V16 Update 7), SIMATIC WinCC Unified V17 (All versions < V17 Update 7), SIMATIC WinCC Unified V18 (All versions < V18 Update 2), SIMATIC WinCC V16 (All versions < V16.7), SIMATIC WinCC V17 (All versions < V17.7), SIMATIC WinCC V18 (All versions < V18 Update 2), SIMOCODE ES V16 (All versions < V16 Update 7), SIMOCODE ES V17 (All versions < V17 Update 7), SIMOCODE ES V18 (All versions < V18 Update 2), SIMOTION SCOUT TIA V5.4 SP1 (All versions), SIMOTION SCOUT TIA V5.4 SP3 (All versions), SIMOTION SCOUT TIA V5.5 SP1 (All versions), SINAMICS Startdrive V16 (All versions), SINAMICS Startdrive V17 (All versions), SINAMICS Startdrive V18 (All versions), SIRIUS Safety ES V17 (All versions < V17 Update 7), SIRIUS Safety ES V18 (All versions < V18 Update 2), SIRIUS Soft Starter ES V17 (All versions < V17 Update 7), SIRIUS Soft Starter ES V18 (All versions < V18 Update 2), Soft Starter ES V16 (All versions < V16 Update 7), TIA Portal Cloud V3.0 (All versions < V18 Update 2). Affected applications do not properly restrict the .NET BinaryFormatter when deserializing hardware configuration profiles. This could allow an attacker to cause a type confusion and execute arbitrary code within the affected application.This is the same issue that exists for .NET BinaryFormatter https://docs.microsoft.com/en-us/visualstudio/code-quality/ca2300. | [] |
|
GHSA-jx8m-xm6x-225q | cci_dir in IBM U2 UniVerse 10.0.0.9 and earlier creates hard links and unlinks files as root, which allows local users to gain privileges by deleting and overwriting arbitrary files. | [] |
|
GHSA-cm54-3vvf-f5p8 | OpenStack Nova Arbitrary file injection/corruption through directory traversal issues | `virt/disk/api.py` in OpenStack Compute (Nova) Folsom (2012.2), Essex (2012.1), and Diablo (2011.3) allows remote authenticated users to overwrite arbitrary files via a symlink attack on a file in an image. | [] |
CVE-2017-20070 | Hindu Matrimonial Script communitymanagement.php privileges management | A vulnerability classified as critical was found in Hindu Matrimonial Script. This vulnerability affects unknown code of the file /admin/communitymanagement.php. The manipulation leads to improper privilege management. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:hindu_matrimonial_script_project:hindu_matrimonial_script:-:*:*:*:*:*:*:*"
] |
CVE-2021-3772 | A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.20:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.25:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30.5r3:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.3r2:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.5:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:-:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:p1:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.3:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.2:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:solidfire_\\&_hci_storage_node:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h610c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h615c:-:*:*:*:*:*:*:*"
] |
|
CVE-2022-48021 | A vulnerability in Zammad v5.3.0 allows attackers to execute arbitrary code or escalate privileges via a crafted message sent to the server. | [
"cpe:2.3:a:zammad:zammad:5.3.0:*:*:*:*:*:*:*"
] |
|
CVE-2006-2289 | Buffer overflow in avahi-core in Avahi before 0.6.10 allows local users to execute arbitrary code via unknown vectors. | [
"cpe:2.3:a:avahi:avahi:0.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:avahi:avahi:0.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:avahi:avahi:0.6.9:*:*:*:*:*:*:*"
] |
|
CVE-2017-17585 | FS Monster Clone 1.0 has SQL Injection via the Employer_Details.php id parameter. | [
"cpe:2.3:a:monster_clone_project:monster_clone:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-4qxc-qxrp-33cw | Moodle denial-of-service risk in the draft files area | A denial-of-service risk was identified in the draft files area, due to it not respecting user file upload limits. Moodle versions 3.10 to 3.10.3, 3.9 to 3.9.6, 3.8 to 3.8.8, 3.5 to 3.5.17 and earlier unsupported versions are affected. | [] |
CVE-2022-42934 | A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process. | [
"cpe:2.3:a:autodesk:autocad:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad:2020:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad:2021:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:macos:*:*",
"cpe:2.3:a:autodesk:autocad:2023:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_advance_steel:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_advance_steel:2020:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_advance_steel:2021:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_advance_steel:2022:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_advance_steel:2023:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_architecture:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_architecture:2020:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_architecture:2021:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_architecture:2022:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_architecture:2023:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_civil_3d:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_civil_3d:2020:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_civil_3d:2021:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_civil_3d:2022:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_civil_3d:2023:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_electrical:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_electrical:2020:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_electrical:2021:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_electrical:2022:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_electrical:2023:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_lt:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_lt:2020:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_lt:2021:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:macos:*:*",
"cpe:2.3:a:autodesk:autocad_lt:2023:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_map_3d:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_map_3d:2020:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_map_3d:2021:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_map_3d:2022:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_map_3d:2023:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mechanical:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mechanical:2020:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mechanical:2021:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mechanical:2022:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mechanical:2023:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mep:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mep:2020:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mep:2021:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mep:2022:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mep:2023:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_plant_3d:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_plant_3d:2020:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_plant_3d:2021:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_plant_3d:2022:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_plant_3d:2023:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*"
] |
|
CVE-2024-2834 | OpenText ArcSight Management Center and ArcSight Platform Stored XSS | A Stored Cross-Site Scripting (XSS) vulnerability has been identified in OpenText ArcSight Management Center and ArcSight Platform. The vulnerability could be remotely exploited. | [
"cpe:2.3:a:microfocus:arcsight_management_center:-:*:*:*:*:*:*:*"
] |
CVE-2020-3354 | Cisco Data Center Network Manager Stored Cross-Site Scripting Vulnerability | A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker with administrative credentials to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need administrative credentials on the affected device. | [
"cpe:2.3:a:cisco:data_center_network_manager:*:*:*:*:*:*:*:*"
] |
CVE-2020-0003 | In onCreate of InstallStart.java, there is a possible package validation bypass due to a time-of-check time-of-use vulnerability. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.0 Android ID: A-140195904 | [
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-42329 | JS - Crash on unexpected HTTP server response | The webdriver for the Browser object expects an error object to be initialized when the webdriver_session_query function fails. But this function can fail for various reasons without an error description and then the wd->error will be NULL and trying to read from it will result in a crash. | [] |
CVE-2021-38978 | IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 212783. | [
"cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_key_lifecycle_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_key_lifecycle_manager:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_key_lifecycle_manager:4.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_key_lifecycle_manager:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-mppc-8qxh-4wjw | Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network. | [] |
|
GHSA-c778-g7jg-99x4 | Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.1.0, and 12.1.2.0 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to WLS - Web Services. | [] |
|
GHSA-3pvm-h88r-3692 | cPanel before 60.0.25 allows attackers to discover file contents during file copy operations (SEC-185). | [] |
|
GHSA-3mwv-hq37-h7fr | SQL injection vulnerability in index.php in Tilde CMS 4.x and earlier allows remote attackers to execute arbitrary SQL commands via the aarstal parameter in a yeardetail action, a different vector than CVE-2006-1500. | [] |
|
GHSA-3gcg-p5c5-qpcw | The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘title’ parameter in all versions up to, and including, 4.15.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
GHSA-4h7v-854h-79hf | Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). | [] |
|
GHSA-cppx-x244-mfpp | Absolute path traversal vulnerability in a certain ActiveX control in vielib.dll 2.2.5.42958 in EMC VMware 6.0.0 allows remote attackers to execute arbitrary local programs via a full pathname in the first argument to the StartProcess method. | [] |
|
GHSA-63g3-6533-36p6 | RSH service utility RSHSVC in Windows NT 3.5 through 4.0 does not properly restrict access as specified in the .Rhosts file when a user comes from an authorized host, which could allow unauthorized users to access the service by logging in from an authorized host. | [] |
|
CVE-2014-1782 | Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-1769, CVE-2014-1785, CVE-2014-2753, CVE-2014-2755, CVE-2014-2760, CVE-2014-2761, CVE-2014-2772, and CVE-2014-2776. | [
"cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*"
] |
|
CVE-2022-35632 | XSS in User Interface | The Velociraptor GUI contains an editor suggestion feature that can display the description field of a VQL function, plugin or artifact. This field was not properly sanitized and can lead to cross-site scripting (XSS). This issue was resolved in Velociraptor 0.6.5-2. | [
"cpe:2.3:a:rapid7:velociraptor:*:*:*:*:*:*:*:*"
] |
GHSA-wccr-wh3m-8q5c | An information disclosure vulnerability exists in the way Azure WaLinuxAgent creates swap files on resource disks, aka 'Azure Linux Agent Information Disclosure Vulnerability'. | [] |
|
CVE-2022-37336 | Improper input validation in BIOS firmware for some Intel(R) NUC may allow a privileged user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnhn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnhn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnkn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnkn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnkn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnkn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnhn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnhn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnkn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnkn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnhja_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnhja:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnhf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnhf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnkpa_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnkpa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnhca_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnhca:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i3fnhfa_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i3fnhfa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhj_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhj:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnhc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnhc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnhja_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnhja:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i3fnhja_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i3fnhja:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnhaa_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnhaa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnh_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnh_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnkpa_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnkpa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnh_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnkp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnkp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnkp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnkp:-:*:*:*:*:*:*:*"
] |
|
CVE-2018-1000009 | Jenkins Checkstyle Plugin 3.49 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks. | [
"cpe:2.3:a:jenkins:checkstyle:*:*:*:*:*:jenkins:*:*"
] |
|
GHSA-h4f8-93hw-pp9f | Command-injection vulnerability in Huawei E587 3G Mobile Hotspot 11.203.27 allows remote attackers to execute arbitrary shell commands with root privileges due to an error in the Web UI. | [] |
|
CVE-2016-1471 | Cross-site scripting (XSS) vulnerability in the web-based management interface on Cisco Small Business 220 devices with firmware before 1.0.1.1 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCuz76232. | [
"cpe:2.3:a:cisco:small_business_220_series_smart_plus_switches:1.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:small_business_220_series_smart_plus_switches:1.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:small_business_220_series_smart_plus_switches:1.0.0.19:*:*:*:*:*:*:*"
] |
|
GHSA-rrx7-84fw-cxr2 | samurai 0.7 has a heap-based buffer overflow in canonpath in util.c via a crafted build file. | [] |
|
CVE-2017-1000017 | phpMyAdmin 4.0, 4.4 and 4.6 are vulnerable to a weakness where a user with appropriate permissions is able to connect to an arbitrary MySQL server | [
"cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*"
] |
|
GHSA-m2w3-ww5p-6g7f | Unspecified vulnerability in MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via vectors related to "materializing a derived table that required a temporary table for grouping" and "user variable assignments." | [] |
|
CVE-2013-0566 | Multiple cross-site scripting (XSS) vulnerabilities in the (1) Accelerator JSPs, (2) Organization Administration Console JSPs, and (3) Administration Console JSPs in WebSphere Commerce Tools in IBM WebSphere Commerce 5.6.1.0 through 5.6.1.5, 6.0.0.0 through 6.0.0.11, and 7.0.0.0 through 7.0.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:ibm:websphere_commerce:5.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:5.6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:5.6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:5.6.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:5.6.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:5.6.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:7.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:7.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:7.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:7.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:7.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:7.0.0.7:*:*:*:*:*:*:*"
] |
|
CVE-2012-6713 | The job-manager plugin before 0.7.19 for WordPress has multiple XSS issues. | [
"cpe:2.3:a:wp-jobmanager:job_manager:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2023-49493 | DedeCMS v5.7.111 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the v parameter at selectimages.php. | [
"cpe:2.3:a:dedecms:dedecms:5.7.111:*:*:*:*:*:*:*"
] |
|
CVE-2015-6273 | Cisco IOS XE before 3.1.2S on ASR 1000 devices mishandles the automatic setup of Virtual Fragment Reassembly (VFR) by certain firewall and NAT components, which allows remote attackers to cause a denial of service (Embedded Services Processor crash) via crafted IP packets, aka Bug IDs CSCtf87624, CSCte93229, CSCtd19103, and CSCti63623. | [
"cpe:2.3:o:cisco:ios_xe:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.1.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.1.1s:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*"
] |
|
GHSA-g9hq-653x-v4qf | Multiple integer overflows in the (1) old_codec37 and (2) old_codec47 functions in libavcodec/sanm.c in FFmpeg before 1.1.3 allow remote attackers to have an unspecified impact via crafted LucasArts Smush data, which triggers an out-of-bounds array access. | [] |
|
CVE-2017-11283 | Adobe ColdFusion has an Untrusted Data Deserialization vulnerability. This affects Update 4 and earlier versions for ColdFusion 2016, and Update 12 and earlier versions for ColdFusion 11. | [
"cpe:2.3:a:adobe:coldfusion:11.0:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:11.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:11.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:11.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:11.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:11.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:11.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:11.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:11.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:11.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:11.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:11.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:11.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update4:*:*:*:*:*:*"
] |
|
GHSA-xh27-gh58-w45h | WebKit in Apple iOS before 9.2, Safari before 9.0.2, and tvOS before 9.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2015-7048, CVE-2015-7095, CVE-2015-7096, CVE-2015-7097, CVE-2015-7098, CVE-2015-7099, CVE-2015-7100, CVE-2015-7101, and CVE-2015-7103. | [] |
|
GHSA-wg7q-pxh9-xfv8 | IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.1 contains a vulnerability that could allow a local user to overwrite arbitrary files owned by the DB2 instance owner. IBM X-Force ID: 140045. | [] |
|
GHSA-p9j6-5f4r-fcwc | The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) "body[p", (2) "binary[p", or (3) "binary[p") that cause an index increment error that leads to an out-of-bounds memory corruption. | [] |
|
CVE-2021-31376 | Junos OS: ACX Series: Packet Forwarding Engine manager (FXPC) process crashes when processing DHCPv6 packets | An Improper Input Validation vulnerability in Packet Forwarding Engine manager (FXPC) process of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) by sending specific DHCPv6 packets to the device and crashing the FXPC service. Continued receipt and processing of this specific packet will create a sustained Denial of Service (DoS) condition. This issue affects only the following platforms in ACX Series: ACX500, ACX1000, ACX1100, ACX2100, ACX2200, ACX4000, ACX5048, ACX5096 devices. Other ACX platforms are not affected from this issue. This issue affects Juniper Networks Junos OS on ACX500, ACX1000, ACX1100, ACX2100, ACX2200, ACX4000, ACX5048, ACX5096: 18.4 version 18.4R3-S7 and later versions prior to 18.4R3-S8. This issue does not affect: Juniper Networks Junos OS 18.4 versions prior to 18.4R3-S7 on ACX500, ACX1000, ACX1100, ACX2100, ACX2200, ACX4000, ACX5048, ACX5096. | [
"cpe:2.3:o:juniper:junos:18.4:r3-s7:*:*:*:*:*:*",
"cpe:2.3:h:juniper:acx1000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:acx1100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:acx2100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:acx2200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:acx4000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:acx500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:acx5048:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:acx5096:-:*:*:*:*:*:*:*"
] |
CVE-2020-13178 | A function in the Teradici PCoIP Standard Agent for Windows and Graphics Agent for Windows prior to version 20.04.1 does not properly validate the signature of an external binary, which could allow an attacker to gain elevated privileges via execution in the context of the PCoIP Agent process. | [
"cpe:2.3:a:teradici:graphics_agent:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:teradici:pcoip_standard_agent:*:*:*:*:*:windows:*:*"
] |
|
GHSA-q6mf-24rq-66wc | Multiple Sitecore products allow remote code execution. This affects Experience Manager, Experience Platform, and Experience Commerce through 10.3. | [] |
|
GHSA-6h64-q58h-x62c | tcpdump before 4.9.3 mishandles the printing of SMB data (issue 1 of 2). | [] |
|
CVE-2021-2160 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.30 and prior and 8.0.17 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
] |
|
CVE-2016-2837 | Heap-based buffer overflow in the ClearKey Content Decryption Module (CDM) in the Encrypted Media Extensions (EME) API in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 might allow remote attackers to execute arbitrary code by providing a malformed video and leveraging a Gecko Media Plugin (GMP) sandbox bypass. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"
] |
|
CVE-2022-4467 | Search & Filter < 1.2.16 - Contributor+ Stored XSS | The Search & Filter WordPress plugin before 1.2.16 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admin. | [
"cpe:2.3:a:codeamp:search_\\&_filter:*:*:*:*:*:wordpress:*:*"
] |
GHSA-2267-86vq-8f86 | A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-SeeNet Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability. | [] |
|
GHSA-36pf-cqvc-w9hx | Tenable Appliance 4.4.0, and possibly prior, contains a flaw in the Web UI that allows for the unauthorized manipulation of the admin password. | [] |
|
CVE-2024-12203 | RSS Icon Widget <= 5.2 - Authenticated (Administrator+) Stored Cross-Site Scripting | The RSS Icon Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘link_color’ parameter in all versions up to, and including, 5.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | [] |
GHSA-c228-4gh7-9r76 | In the Linux kernel, the following vulnerability has been resolved:f2fs: fix to drop meta_inode's page cache in f2fs_put_super()syzbot reports a kernel bug as below:F2FS-fs (loop1): detect filesystem reference count leak during umount, type: 10, count: 1
kernel BUG at fs/f2fs/super.c:1639!
CPU: 0 PID: 15451 Comm: syz-executor.1 Not tainted 6.5.0-syzkaller-09338-ge0152e7481c6 #0
RIP: 0010:f2fs_put_super+0xce1/0xed0 fs/f2fs/super.c:1639
Call Trace:
generic_shutdown_super+0x161/0x3c0 fs/super.c:693
kill_block_super+0x3b/0x70 fs/super.c:1646
kill_f2fs_super+0x2b7/0x3d0 fs/f2fs/super.c:4879
deactivate_locked_super+0x9a/0x170 fs/super.c:481
deactivate_super+0xde/0x100 fs/super.c:514
cleanup_mnt+0x222/0x3d0 fs/namespace.c:1254
task_work_run+0x14d/0x240 kernel/task_work.c:179
resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]
exit_to_user_mode_loop kernel/entry/common.c:171 [inline]
exit_to_user_mode_prepare+0x210/0x240 kernel/entry/common.c:204
__syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline]
syscall_exit_to_user_mode+0x1d/0x60 kernel/entry/common.c:296
do_syscall_64+0x44/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x63/0xcdIn f2fs_put_super(), it tries to do sanity check on dirty and IO
reference count of f2fs, once there is any reference count leak,
it will trigger panic.The root case is, during f2fs_put_super(), if there is any IO error
in f2fs_wait_on_all_pages(), we missed to truncate meta_inode's page
cache later, result in panic, fix this case. | [] |
|
CVE-2020-26146 | An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WPA, WPA2, and WPA3 implementations reassemble fragments with non-consecutive packet numbers. An adversary can abuse this to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. Note that WEP is vulnerable to this attack by design. | [
"cpe:2.3:o:samsung:galaxy_i9305_firmware:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:galaxy_i9305:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:c-250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:c-260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:c-230_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:c-235_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:c-200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:c-120_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:c-120:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:c-130_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:c-130:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:c-100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:c-100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:c-110_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:c-110:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:o-105_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:o-105:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:w-118_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:w-118:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:c-75_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:o-90_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:c-65_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:c-65:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:w-68_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w700_ieee_802.11n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w700_ieee_802.11n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w1700_ieee_802.11ac_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w1700_ieee_802.11ac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w1750d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*"
] |
|
CVE-2022-43473 | A blind XML External Entity (XXE) vulnerability exists in the Add UCS Device functionality of ManageEngine OpManager 12.6.168. A specially crafted XML file can lead to SSRF. An attacker can serve
a malicious XML payload to trigger this vulnerability. | [
"cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126000:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126001:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126002:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126004:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126005:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126100:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126101:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126102:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126103:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126104:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126107:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126108:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126109:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126110:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126113:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126114:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126115:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126116:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126117:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126118:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126119:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126120:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126121:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126122:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126130:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126131:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126132:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126134:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126135:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126136:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126139:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126141:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126147:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126148:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126149:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126150:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126151:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126154:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126155:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126162:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126163:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126164:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126165:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126166:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126167:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.6:build126168:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_plus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126001:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126002:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126100:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126103:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126104:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126107:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126113:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126117:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126119:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126122:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126139:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126140:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126141:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126154:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126155:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_plus:12.6:build126264:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_msp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126001:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126002:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126100:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126103:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126104:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126107:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126113:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126117:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126119:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126122:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126139:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126140:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126141:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126154:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126155:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager_msp:12.6:build126264:*:*:*:*:*:*"
] |
|
GHSA-69c5-v3mv-r438 | Azure RTOS Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42303, CVE-2021-42304. | [] |
|
CVE-2007-4683 | Directory traversal vulnerability in the kernel in Apple Mac OS X 10.4 through 10.4.10 allows local users to bypass the chroot mechanism via a relative path when changing the current working directory. | [
"cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*"
] |
|
GHSA-fv48-hjhp-94c7 | Incorrect Authorization in TeamPass | The REST API functions in TeamPass 2.1.27.36 allow any user with a valid API token to bypass IP address whitelist restrictions via an X-Forwarded-For client HTTP header to the getIp function. | [] |
CVE-2024-1656 | Affected versions of Octopus Server had a weak content security policy. | [] |
|
GHSA-x9j3-j6j9-8j5g | Multiple out-of-bounds write vulnerabilities exist in the VZT vzt_rd_get_facname decompression functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write perfomed by the string copy loop. | [] |
|
CVE-2018-5991 | SQL Injection exists in the Form Maker 3.6.12 component for Joomla! via the id, from, or to parameter in a view=stats request, a different vulnerability than CVE-2015-2798. | [
"cpe:2.3:a:web-dorado:form_maker:3.6.12:*:*:*:*:joomla\\!:*:*"
] |
|
CVE-2012-0869 | Cross-site scripting (XSS) vulnerability in fup in Frams' Fast File EXchange (F*EX, aka fex) before 20120215 allows remote attackers to inject arbitrary web script or HTML via the id parameter. | [
"cpe:2.3:a:ulli_horlacher:fex:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:2011205:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20100208:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110609:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110610:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110614:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110615:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110616:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110621:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110622:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110627:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110630:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110701:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110714:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110716:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110722:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110726:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110727:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110730:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110731:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110803:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110807:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110808:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110809:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110810:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110811:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110813:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110826:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110829:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110830:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110901:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110905:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110906:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110907:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110919:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110920:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110921:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20110930:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20111003:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20111005:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20111013:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20111028:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20111102:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20111108:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20111115:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20111129:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20111230:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20111231:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20120102:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20120106:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20120117:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20120125:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20120201:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20120202:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20120203:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20120204:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20120301:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20120305:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20120404:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20120406:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20120407:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20120426:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20120502:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20120504:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20120601:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20120605:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20120606:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20120621:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20120701:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20120702:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20120705:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20120709:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20120710:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20120711:*:*:*:*:*:*:*",
"cpe:2.3:a:ulli_horlacher:fex:20120718:*:*:*:*:*:*:*"
] |
|
GHSA-8crq-7xw5-3644 | SQL injection vulnerability in index.php in SazCart 1.5.1 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the prodid parameter in a details action. | [] |
|
GHSA-947w-h9h4-59r7 | Cross-site scripting (XSS) vulnerability in the Parental Controls section in Linksys EA6500 with firmware 1.1.28.147876 allows remote authenticated users to inject arbitrary web script or HTML via vectors related to the Blocked Specific Sites section. | [] |
|
GHSA-677v-x6v7-4m5c | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Spider Themes Spider Elements – Addons for Elementor allows Stored XSS. This issue affects Spider Elements – Addons for Elementor: from n/a through 1.6.2. | [] |
|
CVE-2020-1987 | Global Protect Agent: VPN cookie local information disclosure | An information exposure vulnerability in the logging component of Palo Alto Networks Global Protect Agent allows a local authenticated user to read VPN cookie information when the troubleshooting logging level is set to "Dump". This issue affects Palo Alto Networks Global Protect Agent 5.0 versions prior to 5.0.9; 5.1 versions prior to 5.1.1. | [
"cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:*:*:*"
] |
CVE-2020-36144 | Redash 8.0.0 is affected by LDAP Injection. There is an information leak through the crafting of special queries, escaping the provided template since the username included in the search filter lacks sanitization. | [
"cpe:2.3:a:redash:redash:8.0.0:*:*:*:*:*:*:*"
] |
Subsets and Splits