id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
---|---|---|---|
CVE-2024-11282
|
Passster – Password Protect Pages and Content <= 4.2.10 - Unauthenticated Content Restriction Bypass to Sensitive Information Exposure
|
The Passster – Password Protect Pages and Content plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.2.10 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator.
|
[] |
GHSA-x327-9wx8-qg3h
|
A vulnerability was found in Projectworlds Life Insurance Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /insertagent.php. The manipulation of the argument agent_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] |
|
GHSA-39ch-rg26-gmq5
|
Magento DOM-based Cross-Site Scripting vulnerability on mage-messages cookies
|
Magento versions 2.4.2 (and earlier), 2.4.1-p1 (and earlier) and 2.3.6-p1 (and earlier) are affected by a DOM-based Cross-Site Scripting vulnerability on mage-messages cookies. Successful exploitation could lead to arbitrary JavaScript execution by an unauthenticated attacker. User interaction is required for successful exploitation.
|
[] |
GHSA-2ggg-6j2g-7jfc
|
Crash in the EAP dissector in Wireshark 4.0.0 to 4.0.2 allows denial of service via packet injection or crafted capture file
|
[] |
|
GHSA-vh5p-gf3p-64qv
|
Adobe Flash Player versions 24.0.0.221 and earlier have a vulnerability in the random number generator used for constant blinding. Successful exploitation could lead to information disclosure.
|
[] |
|
CVE-2013-3530
|
SQL injection vulnerability in playlist.php in the Spiffy XSPF Player plugin 0.1 for WordPress allows remote attackers to execute arbitrary SQL commands via the playlist_id parameter.
|
[
"cpe:2.3:a:fabricio_zuardi:xspf_player_plugin:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*"
] |
|
CVE-2006-0818
|
Absolute path directory traversal vulnerability in (1) MERAK Mail Server for Windows 8.3.8r with before IceWarp Web Mail 5.6.1 and (2) VisNetic MailServer before 8.5.0.5 allows remote authenticated users to include arbitrary files via a modified language parameter and a full Windows or UNC pathname in the lang_settings parameter to mail/index.html, which is not properly sanitized by the validatefolder PHP function, possibly due to an incomplete fix for CVE-2005-4558.
|
[
"cpe:2.3:a:deerfield:visnetic_mail_server:8.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:icewarp:web_mail:5.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:merak:mail_server:8.3.8r:*:windows:*:*:*:*:*"
] |
|
GHSA-g22c-72wp-3974
|
A non-existent chrome.manifest file will attempt to be loaded during startup from the primary installation directory. If a malicious user with local access puts chrome.manifest and other referenced files in this directory, they will be loaded and activated during startup. This could result in malicious software being added without consent or modification of referenced installed files. This vulnerability affects Firefox < 52.
|
[] |
|
CVE-2025-3167
|
Tenda AC23 API Interface VerAPIMant denial of service
|
A vulnerability, which was classified as problematic, has been found in Tenda AC23 16.03.07.52. This issue affects some unknown processing of the file /goform/VerAPIMant of the component API Interface. The manipulation of the argument getuid leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] |
CVE-2024-7188
|
Bylancer Quicklancer GET Parameter listing sql injection
|
A vulnerability was found in Bylancer Quicklancer 2.4. It has been rated as critical. This issue affects some unknown processing of the file /listing of the component GET Parameter Handler. The manipulation of the argument range2 leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-272609 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:bylancer:quicklancer:2.4:*:*:*:*:*:*:*"
] |
GHSA-hc26-w2fh-482m
|
The TimeZoneCalculator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'timezonecalculator_output' shortcode in all versions up to, and including, 3.37 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] |
|
CVE-2023-28162
|
While implementing AudioWorklets, some code may have casted one type to another, invalid, dynamic type. This could have led to a potentially exploitable crash. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] |
|
GHSA-m274-9pp4-jrr2
|
scart.cgi in SCart 2.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the page parameter of a show_text action.
|
[] |
|
GHSA-8q5j-74vg-j4hr
|
A malicious website could have used a combination of exiting fullscreen mode and `requestPointerLock` to cause the user's mouse to be re-positioned unexpectedly, which could have led to user confusion and inadvertently granting permissions they did not intend to grant. This vulnerability affects Firefox < 123 and Firefox ESR < 115.8.
|
[] |
|
CVE-2002-1159
|
Canna 3.6 and earlier does not properly validate requests, which allows remote attackers to cause a denial of service or information leak.
|
[
"cpe:2.3:a:canna:canna:3.5b2:*:*:*:*:*:*:*",
"cpe:2.3:a:canna:canna:3.6:*:*:*:*:*:*:*"
] |
|
GHSA-r6vx-c8r8-fm3x
|
TRENDnet TEW-751DR v1.03B03, TEW-752DRU v1.03B01, and TEW733GR v1.03B01 devices allow authentication bypass via an AUTHORIZED_GROUP=1 value, as demonstrated by a request for getcfg.php.
|
[] |
|
GHSA-4mr3-vcgr-j557
|
PKP Vendor Open Journal System v2.4.8 to v3.3.8 allows attackers to perform reflected cross-site scripting (XSS) attacks via crafted HTTP headers.
|
[] |
|
GHSA-26gj-f778-xvm7
|
Adobe Reader and Acrobat 9.x before 9.5.2 and 10.x before 10.1.4 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2051, CVE-2012-4147, CVE-2012-4148, CVE-2012-4149, CVE-2012-4150, CVE-2012-4151, CVE-2012-4152, CVE-2012-4154, CVE-2012-4155, CVE-2012-4156, CVE-2012-4157, CVE-2012-4158, CVE-2012-4159, and CVE-2012-4160.
|
[] |
|
GHSA-mp6x-mf6g-rcqj
|
Cross-Site Request Forgery (CSRF) vulnerability in SwitchWP WP Client Reports.This issue affects WP Client Reports: from n/a through 1.0.22.
|
[] |
|
CVE-2022-39217
|
Improper Neutralization of Formula Elements in a CSV File in ghas-to-csv
|
some-natalie/ghas-to-csv (GitHub Advanced Security to CSV) is a GitHub action which scrapes the GitHub Advanced Security API and shoves it into a CSV. In affected versions this GitHub Action creates a CSV file without sanitizing the output of the APIs. If an alert is dismissed or any other custom field contains executable code / formulas, it might be run when an endpoint opens that CSV file in a spreadsheet program. This issue has been addressed in version `v1`. Users are advised to use `v1` or later. There are no known workarounds for this issue.
|
[
"cpe:2.3:a:ghas-to-csv_project:ghas-to-csv:*:*:*:*:*:*:*:*"
] |
GHSA-j33f-4jf8-cwjq
|
Multiple cross-site scripting (XSS) vulnerabilities in the WP Ultimate Email Marketer plugin 1.1.0 and possibly earlier for Wordpress allow remote attackers to inject arbitrary web script or HTML via the (1) siteurl parameter to campaign/campaignone.php; the (2) action, (3) campaignname, (4) campaignformat, or (5) emailtemplate parameter to campaign/campaigntwo.php; the (6) listid parameter to list/edit.php; the (7) campaignid or (8) siteurl parameter to campaign/editcampaign.php; the (9) campaignid parameter to campaign/selectlistb4send.php; the (10) campaignid, (11) campaignname, (12) campaignsubject, or (13) selectedcampaigns parameter to campaign/sendCampaign.php; or the (14) campaignid, (15) campaignname, (16) campaignformat, or (17) action parameter to campaign/updatecampaign.php.
|
[] |
|
GHSA-jcxw-q3cp-p5r4
|
An issue was discovered in the Self Service Portal in Zoho ManageEngine Desktop Central before 10.0.282. A clickable company logo in a window running as SYSTEM can be abused to escalate privileges. In cloud, the issue is fixed in 10.0.470 agent version.
|
[] |
|
CVE-2023-24930
|
Microsoft OneDrive for MacOS Elevation of Privilege Vulnerability
|
Microsoft OneDrive for MacOS Elevation of Privilege Vulnerability
|
[
"cpe:2.3:a:microsoft:onedrive:*:*:*:*:*:macos:*:*"
] |
CVE-2025-26630
|
Microsoft Access Remote Code Execution Vulnerability
|
Use after free in Microsoft Office Access allows an unauthorized attacker to execute code locally.
|
[] |
CVE-2021-46509
|
Cesanta MJS v2.20.0 was discovered to contain a stack overflow via snquote at mjs/src/mjs_json.c.
|
[
"cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-52265
|
IDURAR (aka idurar-erp-crm) through 2.0.1 allows stored XSS via a PATCH request with a crafted JSON email template in the /api/email/update data.
|
[
"cpe:2.3:a:idurarapp:idurar:*:*:*:*:*:*:*:*"
] |
|
CVE-2011-2811
|
WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.
|
[
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*"
] |
|
GHSA-4m4j-w3qr-4gcc
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in PenciDesign Soledad – Multipurpose, Newspaper, Blog & WooCommerce WordPress Theme.This issue affects Soledad – Multipurpose, Newspaper, Blog & WooCommerce WordPress Theme: from n/a through 8.4.1.
|
[] |
|
GHSA-3gvm-x6cp-xc44
|
IBM Rational Team Concert 5.0 through 6.0.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 154137.
|
[] |
|
CVE-2016-10512
|
MultiTech FaxFinder before 4.1.2 stores Passwords unencrypted for maintaining the test connectivity function of its LDAP configuration. These credentials are retrieved by the system when the LDAP configuration page is opened and are embedded directly into the HTML source code in cleartext.
|
[
"cpe:2.3:a:multitech:faxfinder:-:*:*:*:*:*:*:*"
] |
|
GHSA-cr9c-4pg9-32j3
|
An improper handling of insufficient permissions or privileges affects HCL BigFix Inventory. An attacker having access via a read-only account can possibly change certain configuration parameters by crafting a specific REST API call.
|
[] |
|
GHSA-p9j9-qqwf-j574
|
MaxQueryDuration not honoured in Samba AD DC LDAP
|
[] |
|
CVE-2024-10161
|
PHPGurukul Boat Booking System Update Boat Image Page change-image.php unrestricted upload
|
A vulnerability, which was classified as critical, was found in PHPGurukul Boat Booking System 1.0. This affects an unknown part of the file change-image.php of the component Update Boat Image Page. The manipulation of the argument image leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:phpgurukul:boat_booking_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:phpgurukul:boat_booking_system:1.0:*:*:*:*:*:*:*"
] |
CVE-2022-41427
|
Bento4 v1.6.0-639 was discovered to contain a memory leak in the AP4_AvcFrameParser::Feed function in mp4mux.
|
[
"cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*"
] |
|
GHSA-2f7m-3653-hg2p
|
IBM Aspera Console 3.4.0 through 3.4.4is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
|
[] |
|
CVE-2024-25247
|
SQL Injection vulnerability in /app/api/controller/Store.php in Niushop B2B2C V5 allows attackers to run arbitrary SQL commands via latitude and longitude parameters.
|
[
"cpe:2.3:a:niushop:b2b2c_multi-business:5.0:*:*:*:*:*:*:*"
] |
|
GHSA-c8rx-j79x-463v
|
PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of EMF files.
The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22146.
|
[] |
|
CVE-2004-1676
|
Heap-based buffer overflow in the image sending feature in Gadu-Gadu 6.0 build 149 allows remote attackers to execute arbitrary code via a crafted GG_MSG_IMAGE_REPLY message.
|
[
"cpe:2.3:a:gadu-gadu:gadu-gadu_instant_messenger:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gadu-gadu:gadu-gadu_instant_messenger:6.0_build149:*:*:*:*:*:*:*"
] |
|
CVE-2025-32543
|
WordPress Canonical Attachments Plugin <= 1.7 - Stored Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in hivedigital Canonical Attachments allows Reflected XSS. This issue affects Canonical Attachments: from n/a through 1.7.
|
[] |
GHSA-3mg4-6264-fvx2
|
S-CMS v5.0 was discovered to contain a SQL injection vulnerability via the A_newsauth parameter at /admin/ajax.php.
|
[] |
|
GHSA-97h7-vfr6-636x
|
Cross-site request forgery (CSRF) vulnerability in the Horde Application Framework before 3.3.9 allows remote attackers to hijack the authentication of unspecified victims for requests to a preference form.
|
[] |
|
GHSA-wh9h-xpmv-wgch
|
Memory safety bugs were reported in Firefox 50.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 51.
|
[] |
|
CVE-2008-4468
|
SQL injection vulnerability in view_news.php in Vastal I-Tech Share Zone allows remote attackers to execute arbitrary SQL commands via the id parameter.
|
[
"cpe:2.3:a:vastal_i-tech:share_zone:*:*:*:*:*:*:*:*"
] |
|
CVE-2015-9317
|
The awesome-support plugin before 3.1.7 for WordPress has XSS via custom information messages.
|
[
"cpe:2.3:a:getawesomesupport:awesome_support:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2024-5118
|
SourceCodester Event Registration System login.php sql injection
|
A vulnerability has been found in SourceCodester Event Registration System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/login.php. The manipulation of the argument username/password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-265198 is the identifier assigned to this vulnerability.
|
[
"cpe:2.3:a:sourcecodester:event_registration_system:*:*:*:*:*:*:*:*"
] |
CVE-2023-32961
|
WordPress Zotpress Plugin <= 7.3.3 is vulnerable to Cross Site Scripting (XSS)
|
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Katie Seaborn Zotpress plugin <= 7.3.3 versions.
|
[
"cpe:2.3:a:zotpress_project:zotpress:*:*:*:*:*:wordpress:*:*"
] |
CVE-2008-3510
|
Cross-site scripting (XSS) vulnerability in livehelp_js.php in Crafty Syntax Live Help (CSLH) 2.14.6 allows remote attackers to inject arbitrary web script or HTML via the department parameter.
|
[
"cpe:2.3:a:crafty_syntax_live_help:crafty_syntax_live_help:2.4.16:*:*:*:*:*:*:*"
] |
|
CVE-2007-2879
|
Cross-site scripting (XSS) vulnerability in mods.php in GTP GNUTurk Portal System 3G allows remote attackers to inject arbitrary web script or HTML via the month parameter.
|
[
"cpe:2.3:a:gnuturk:gnuturk_portal_system:3g:*:*:*:*:*:*:*"
] |
|
CVE-2021-32454
|
SITEL CAP/PRX hardcoded credentials
|
SITEL CAP/PRX firmware version 5.2.01 makes use of a hardcoded password. An attacker with access to the device could modify these credentials, leaving the administrators of the device without access.
|
[
"cpe:2.3:o:sitel-sa:remote_cap\\/prx_firmware:5.2.01:*:*:*:*:*:*:*",
"cpe:2.3:h:sitel-sa:remote_cap\\/prx:-:*:*:*:*:*:*:*"
] |
CVE-2024-29752
|
In tmu_set_tr_num_thresholds of tmu.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[
"cpe:2.3:a:google:android_kernel:android_kernel:*:*:*:*:*:*:*"
] |
|
GHSA-h6w2-v77h-v84w
|
Folder Lock 5.9.5 and earlier uses weak encryption (ROT-25) for the password, which allows local administrators to obtain sensitive information by reading and decrypting the QualityControl\_pack registry value.
|
[] |
|
CVE-2020-5794
|
A vulnerability in Nessus Network Monitor versions 5.11.0, 5.11.1, and 5.12.0 for Windows could allow an authenticated local attacker to execute arbitrary code by copying user-supplied files to a specially constructed path in a specifically named user directory. The attacker needs valid credentials on the Windows system to exploit this vulnerability.
|
[
"cpe:2.3:a:tenable:nessus_network_monitor:5.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tenable:nessus_network_monitor:5.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tenable:nessus_network_monitor:5.12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-vgrf-j225-8963
|
LibreOffice has a feature where documents can specify that pre-installed macros can be executed on various script events such as mouse-over, document-open etc. Access is intended to be restricted to scripts under the share/Scripts/python, user/Scripts/python sub-directories of the LibreOffice install. Protection was added, to address CVE-2018-16858, to avoid a directory traversal attack where scripts in arbitrary locations on the file system could be executed. However this new protection could be bypassed by a URL encoding attack. In the fixed versions, the parsed url describing the script location is correctly encoded before further processing. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6.
|
[] |
|
GHSA-5p52-chjc-g56x
|
Ming 0.4.8 has an out-of-bounds buffer access issue in the function getString() in decompiler.c file that causes a direct segmentation fault and leads to denial of service.
|
[] |
|
CVE-2020-9502
|
Some Dahua products with Build time before December 2019 have Session ID predictable vulnerabilities. During normal user access, an attacker can use the predicted Session ID to construct a data packet to attack the device.
|
[
"cpe:2.3:o:dahuasecurity:sd6al_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:sd6al:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:sd5a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:sd5a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:sd1a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:sd1a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:ptz1a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:ptz1a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:sd50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:sd50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:sd52c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:sd52c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:ipc-hx5842h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:ipc-hx5842h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:ipc-hx7842h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:ipc-hx7842h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:ipc-hx2xxx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:ipc-hx2xxx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:ipc-hxxx5x4x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:ipc-hxxx5x4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:n42b1p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:n42b1p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:n42b2p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:n42b2p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:n42b3p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:n42b3p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:n52a4p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:n52a4p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:n54a4p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:n54a4p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:n52b2p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:n52b2p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:n52b5p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:n52b5p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:n52b3p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:n52b3p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:n54b2p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:n54b2p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:ipc-hdbw1320e-w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:ipc-hdbw1320e-w:-:*:*:*:*:*:*:*"
] |
|
GHSA-4vvm-5cw4-4q22
|
Missing authentication for critical function in Microsoft Azure PolicyWatch allows an unauthorized attacker to elevate privileges over a network.
|
[] |
|
GHSA-qvv5-5865-pfw8
|
Cross-Site Request Forgery (CSRF) vulnerability in stesvis Frontpage category filter allows Cross Site Request Forgery. This issue affects Frontpage category filter: from n/a through 1.0.2.
|
[] |
|
GHSA-8h3h-xphv-c9r4
|
IBM API Connect 5.0.0.0 and 5.0.8.4 is affected by a NoSQL Injection in MongoDB connector for the LoopBack framework. IBM X-Force ID: 148807.
|
[] |
|
CVE-2018-16362
|
An issue was discovered in the Source Integration plugin before 1.5.9 and 2.x before 2.1.5 for MantisBT. A cross-site scripting (XSS) vulnerability in the Manage Repository and Changesets List pages allows execution of arbitrary code (if CSP settings permit it) via repo_manage_page.php or list.php.
|
[
"cpe:2.3:a:mantisbt:source_integration:*:*:*:*:*:mantisbt:*:*"
] |
|
CVE-2016-1150
|
Cross-site scripting (XSS) vulnerability in Cybozu Office 9.0.0 through 10.3.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2015-7795, CVE-2015-7796, CVE-2015-7797, CVE-2015-7798, and CVE-2016-1149.
|
[
"cpe:2.3:a:cybozu:office:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.3.0:*:*:*:*:*:*:*"
] |
|
CVE-2014-3628
|
Cross-site scripting (XSS) vulnerability in the Admin UI Plugin / Stats page in Apache Solr 4.x before 4.10.3 allows remote attackers to inject arbitrary web script or HTML via the fieldvaluecache object.
|
[
"cpe:2.3:a:apache:solr:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.0.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.0.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.10.2:*:*:*:*:*:*:*"
] |
|
CVE-2024-0074
|
CVE
|
NVIDIA GPU Display Driver for Linux contains a vulnerability where an attacker may access a memory location after the end of the buffer. A successful exploit of this vulnerability may lead to denial of service and data tampering.
|
[] |
GHSA-gvhr-pgjg-87rj
|
Airties 5444 1.0.0.18 and 5444TT 1.0.0.18 devices allow XSS.
|
[] |
|
GHSA-36fw-723j-3pvw
|
muttprint in muttprint 0.72d allows local users to overwrite arbitrary files via a symlink attack on the /tmp/muttprint.log temporary file.
|
[] |
|
CVE-2020-15206
|
Denial of Service in Tensorflow
|
In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, changing the TensorFlow's `SavedModel` protocol buffer and altering the name of required keys results in segfaults and data corruption while loading the model. This can cause a denial of service in products using `tensorflow-serving` or other inference-as-a-service installments. Fixed were added in commits f760f88b4267d981e13f4b302c437ae800445968 and fcfef195637c6e365577829c4d67681695956e7d (both going into TensorFlow 2.2.0 and 2.3.0 but not yet backported to earlier versions). However, this was not enough, as #41097 reports a different failure mode. The issue is patched in commit adf095206f25471e864a8e63a0f1caef53a0e3a6, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
|
[
"cpe:2.3:a:google:tensorflow:*:*:*:*:-:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"
] |
GHSA-2g99-g8qj-f679
|
A valid, authenticated LXCA user with elevated privileges may be able to delete folders in the LXCA filesystem through a specifically crafted web API call due to insufficient input validation.
|
[] |
|
CVE-2015-0760
|
The IKEv1 implementation in Cisco ASA Software 7.x, 8.0.x, 8.1.x, and 8.2.x before 8.2.2.13 allows remote authenticated users to bypass XAUTH authentication via crafted IKEv1 packets, aka Bug ID CSCus47259.
|
[
"cpe:2.3:a:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*"
] |
|
GHSA-mgxw-53vp-m2rh
|
A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions). Affected devices do not conduct certain validations when interacting with them. This could allow an unauthenticated remote attacker to manipulate the devices IP address, which means the device would not be reachable and could only be recovered by power cycling the device.
|
[] |
|
CVE-2023-47467
|
Directory Traversal vulnerability in jeecg-boot v.3.6.0 allows a remote privileged attacker to obtain sensitive information via the file directory structure.
|
[
"cpe:2.3:a:jeecg:jeecg-boot:3.6.0:*:*:*:*:*:*:*"
] |
|
GHSA-cjgf-3j3h-j6hg
|
Ultimate PHP Board (UPB) 1.0 allows remote attackers to view the physical path of the message board via a direct request to add.php, which leaks the path in an error message.
|
[] |
|
CVE-2014-4880
|
Buffer overflow in Hikvision DVR DS-7204 Firmware 2.2.10 build 131009, and other models and versions, allows remote attackers to execute arbitrary code via an RTSP PLAY request with a long Authorization header.
|
[
"cpe:2.3:o:hikvision:dvr_ds-7204_firmware:2.2.10:build_131009:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:dvr_ds-7204:-:*:*:*:*:*:*:*"
] |
|
GHSA-58qr-c3xr-5m9v
|
Passwork On-Premise Edition before 4.6.13 allows migration/uploadExportFile Directory Traversal (to upload files).
|
[] |
|
CVE-2008-0442
|
PHP remote file inclusion vulnerability in inc/linkbar.php in Small Axe Weblog 0.3.1 allows remote attackers to execute arbitrary PHP code via a URL in the ffile parameter, a different vector than CVE-2008-0376. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:small_axe_solutions:weblog:0.3.1:*:*:*:*:*:*:*"
] |
|
GHSA-w36j-5cvw-5rr3
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
|
[] |
|
CVE-2016-3136
|
The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_live_patching:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_module_for_public_cloud:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
] |
|
CVE-2023-33794
|
A stored cross-site scripting (XSS) vulnerability in the Create Tenants (/tenancy/tenants/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
|
[
"cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*"
] |
|
CVE-2018-1785
|
IBM Tivoli Storage Manager (IBM Spectrum Protect 7.1 and 8.1) uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt sensitive information. IBM X-Force ID: 148870.
|
[
"cpe:2.3:a:ibm:spectrum_protect_client:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:spectrum_protect_for_virtual_environments:*:*:*:*:*:hyper-v:*:*",
"cpe:2.3:a:ibm:spectrum_protect_for_virtual_environments:*:*:*:*:*:vmware:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"
] |
|
CVE-2016-10855
|
cPanel before 11.54.0.4 allows unauthenticated arbitrary code execution via cpsrvd (SEC-91).
|
[
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] |
|
GHSA-fc4q-75jx-jv8h
|
Some Huawei products have an integer overflow vulnerability. Successful exploitation of this vulnerability may lead to kernel crash.
|
[] |
|
CVE-2019-11004
|
In Materialize through 1.0.0, XSS is possible via the Toast feature.
|
[
"cpe:2.3:a:materializecss:materialize:*:*:*:*:*:*:*:*"
] |
|
GHSA-9r7j-5v58-v463
|
Use after free in WebRTC in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
[] |
|
GHSA-rm6j-m6w6-q2q3
|
A vulnerability, which was classified as problematic, was found in Webmin. Affected is an unknown function of the file xterm/index.cgi. The manipulation leads to basic cross site scripting. It is possible to launch the attack remotely. The name of the patch is d3d33af3c0c3fd3a889c84e287a038b7a457d811. It is recommended to apply a patch to fix this issue. VDB-212862 is the identifier assigned to this vulnerability.
|
[] |
|
GHSA-5j36-w363-p3jq
|
The Poptin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'poptin-form' shortcode in versions up to, and including, 1.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] |
|
GHSA-73xh-vvgv-rr67
|
Buffer overflow in Sun Java System Web Proxy Server (aka Sun ONE Proxy Server) 3.6 SP6 allows remote attackers to execute arbitrary code via unknown vectors.
|
[] |
|
CVE-2015-1984
|
IBM InfoSphere Master Data Management Collaborative Edition 9.1, 10.1, 11.0, 11.3, and 11.4 before FP03 allows remote authenticated users to bypass intended access restrictions and read arbitrary profiles via unspecified vectors, as demonstrated by discovering usernames for use in brute-force attacks.
|
[
"cpe:2.3:a:ibm:infosphere_master_data_management:9.1:*:*:*:collaborative:*:*:*",
"cpe:2.3:a:ibm:infosphere_master_data_management:10.1:*:*:*:collaborative:*:*:*",
"cpe:2.3:a:ibm:infosphere_master_data_management:11.0:*:*:*:collaborative:*:*:*",
"cpe:2.3:a:ibm:infosphere_master_data_management:11.3:*:*:*:collaborative:*:*:*",
"cpe:2.3:a:ibm:infosphere_master_data_management:11.4:*:*:*:collaborative:*:*:*"
] |
|
GHSA-2m2x-qh8q-wgqq
|
Unrestricted Upload of File with Dangerous Type vulnerability in CreedAlly Bulk Featured Image allows Upload a Web Shell to a Web Server. This issue affects Bulk Featured Image: from n/a through 1.2.1.
|
[] |
|
GHSA-f6j9-c274-5x52
|
The Java Key Store (JKS) for WebSphere Application Server (WAS) for IBM Tivoli Identity Manager (ITIM) 4.6 places the JKS password in a -Djavax.net.ssl.trustStorePassword command line argument, which allows local users to obtain the password by listing the process or using other methods.
|
[] |
|
CVE-2023-51427
|
Some Honor products are affected by type confusion vulnerability, successful exploitation could cause information leak.
|
[
"cpe:2.3:o:hihonor:magic_os:*:*:*:*:*:*:*:*"
] |
|
GHSA-rw58-qmcf-p57g
|
In exiftags 1.01, nikon_prop1 in nikon.c has a heap-based buffer overflow (write of size 28) because snprintf can write to an unexpected address.
|
[] |
|
CVE-2002-1222
|
Buffer overflow in the embedded HTTP server for Cisco Catalyst switches running CatOS 5.4 through 7.3 allows remote attackers to cause a denial of service (reset) via a long HTTP request.
|
[
"cpe:2.3:o:cisco:catos:5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:5.5\\(13a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:6.1\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:7.4:*:*:*:*:*:*:*"
] |
|
GHSA-5qfj-j9fm-c9q4
|
Cross-site scripting vulnerability in Cybozu Mailwise 5.0.0 to 5.4.1 allows remote attackers to inject arbitrary web script or HTML 'Address' via unspecified vectors.
|
[] |
|
GHSA-jwx8-gp36-w5vm
|
apply.cgi on the TRENDnet TEW-632BRP 1.010B32 router has a buffer overflow via long strings to the SOAPACTION:HNAP1 interface.
|
[] |
|
GHSA-xvm7-544m-j5w9
|
Product: AndroidVersions: Android kernelAndroid ID: A-204956204References: N/A
|
[] |
|
GHSA-2wgx-r653-jrmq
|
An issue in Hangzhou Bobo Technology Co Ltd UU Game Booster iOS 10.6.13 allows attackers to access sensitive user information via supplying a crafted link.
|
[] |
|
CVE-2019-0124
|
Insufficient memory protection in Intel(R) 6th Generation Core Processors and greater, supporting TXT, may allow a privileged user to potentially enable escalation of privilege via local access.
|
[
"cpe:2.3:o:intel:core_i7-6970hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6920hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6870hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6822eq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6820hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6820hk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6820eq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6785r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6785r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6700k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6700t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6700te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6770hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6700hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6660u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6650u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6600u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6567u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6560u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6500u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7920hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7820hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7820hk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7820eq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7700hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7700k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7700t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7660u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7600u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7567u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7560u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7500u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7y75_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8665ue_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8665u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8557u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8850h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8809g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8750h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8709g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8705g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8700t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8700k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8700b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7\\+8700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7\\+8700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8569u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8650u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8565u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8559u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8550u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8500y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8086k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9980hk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9880h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9900t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9900t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9900ks_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9900ks:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9900kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9900k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9850hl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9850hl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9850he_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9850he:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9850h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9750hf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9750h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9750h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9700te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9700te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9700t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9700kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9700k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9700f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9700f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9700e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9700e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10710u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10510u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10510y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1585_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1585l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1578l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1575m_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1565l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1558l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1545m_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1535m_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1515m_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1505m_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1505l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1280_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1275_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1270_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1268l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1260l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1245_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1240l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1240_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1235l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1230_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1225_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1220_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1535m_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1505m_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1505l_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1505l_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1501l_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1501m_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1285_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1285_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1280_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1275_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1270_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1245_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1240_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1230_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1225_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1220_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2286m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2286g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2278gel_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2278ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2276ml_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2276me_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2276m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2276g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2274g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2254ml_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2254me_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2246g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2244g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2236_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2234_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2226ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2226g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2224_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2224g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2186g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2186m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2176g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2176m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2174g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2146g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2144g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2136_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2134_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2126g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*"
] |
|
CVE-2025-48746
|
Netwrix Directory Manager (formerly Imanami GroupID) v.11.0.0.0 and before, as well as after v.11.1.25134.03 lacks Authentication for a Critical Function.
|
[] |
|
CVE-2023-45278
|
Directory Traversal vulnerability in the storage functionality of the API in Yamcs 5.8.6 allows attackers to delete arbitrary files via crafted HTTP DELETE request.
|
[
"cpe:2.3:a:spaceapplications:yamcs:5.8.6:*:*:*:*:*:*:*"
] |
|
GHSA-hg68-h73w-q4qq
|
** DISPUTED ** Directory traversal vulnerability in data/inc/theme.php in Pluck 4.3, when register_globals is enabled, allows remote attackers to read arbitrary local files via a .. (dot dot) in the file parameter. NOTE: CVE and a reliable third party dispute this vulnerability because the code uses a fixed argument when invoking fputs, which cannot be used to read files.
|
[] |
|
CVE-2024-22253
|
Use-after-free vulnerability
|
VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the UHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.
|
[
"cpe:2.3:o:vmware:esxi:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_workstation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*"
] |
GHSA-rm7h-f39f-xc8f
|
Some Lenovo Notebook, ThinkPad, and Lenovo Desktop systems have BIOS modules unprotected by Intel Boot Guard that could allow an attacker with physical access the ability to write to the SPI flash storage.
|
[] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.