Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
GHSA-x9qv-5m74-x74p
A vulnerability has been identified in CP-8031 MASTER MODULE (All versions < CPCI85 V05), CP-8050 MASTER MODULE (All versions < CPCI85 V05). Affected devices are vulnerable to command injection via the web server port 443/tcp, if the parameter “Remote Operation” is enabled. The parameter is disabled by default. The vulnerability could allow an unauthenticated remote attacker to perform arbitrary code execution on the device.
[]
GHSA-c4wm-h8mm-vr45
A vulnerability has been identified in SIMATIC CN 4100 (All versions < V2.7). The "intermediate installation" system state of the affected application allows an attacker to add their own login credentials to the device. This allows an attacker to remotely login as root and take control of the device even after the affected device is fully set up.
[]
GHSA-7c52-4c49-68xc
An issue was discovered in gif2apng 1.9. There is a stack-based buffer overflow involving a while loop. An attacker has little influence over the data written to the stack, making it unlikely that the flow of control can be subverted.
[]
GHSA-xhp9-gjxc-5c88
The Envo Extra plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.9.3 via the 'elementor-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created by Elementor that they should not have access to.
[]
GHSA-59pm-5fmx-c85c
Wyse Device Agent version 14.6.1.4 and below contain an Improper Authentication vulnerability. A malicious user could potentially exploit this vulnerability by providing invalid input in order to obtain a connection to WMS server.
[]
GHSA-4x52-w829-4qvm
Dell PowerScale OneFS, 8.2.x-9.5.0.x, contains an information disclosure vulnerability in NFS. A low privileged attacker could potentially exploit this vulnerability, leading to information disclosure.
[]
GHSA-3gm6-xhv6-72q8
FreeBSD 7.1 through 8.1-PRERELEASE does not copy the read-only flag when creating a duplicate mbuf buffer reference, which allows local users to cause a denial of service (system file corruption) and gain privileges via the sendfile system call.
[]
CVE-2008-1019
Heap-based buffer overflow in quickTime.qts in Apple QuickTime before 7.4.5 allows remote attackers to execute arbitrary code via a crafted PICT image file, related to an improperly terminated memory copy loop.
[ "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*" ]
CVE-2025-31840
WordPress Simple Fixed Notice Plugin <= 1.6 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in digireturn Simple Fixed Notice allows Cross Site Request Forgery. This issue affects Simple Fixed Notice: from n/a through 1.6.
[]
CVE-2005-3632
Multiple buffer overflows in pnmtopng in netpbm 10.0 and earlier allow attackers to execute arbitrary code via a crafted PNM file.
[ "cpe:2.3:a:netpbm:netpbm:9.20:*:*:*:*:*:*:*", "cpe:2.3:a:netpbm:netpbm:9.21:*:*:*:*:*:*:*", "cpe:2.3:a:netpbm:netpbm:9.22:*:*:*:*:*:*:*", "cpe:2.3:a:netpbm:netpbm:9.23:*:*:*:*:*:*:*", "cpe:2.3:a:netpbm:netpbm:9.24:*:*:*:*:*:*:*", "cpe:2.3:a:netpbm:netpbm:9.25:*:*:*:*:*:*:*", "cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*" ]
GHSA-prxc-h72j-qg6j
PwnDoc through 0.5.3 might allow remote attackers to identify disabled user account names by leveraging response timings for authentication attempts.
[]
CVE-2008-2168
Cross-site scripting (XSS) vulnerability in Apache 2.2.6 and earlier allows remote attackers to inject arbitrary web script or HTML via UTF-7 encoded URLs that are not properly handled when displaying the 403 Forbidden error page.
[ "cpe:2.3:a:apache:http_server:-:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.28:beta:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.32:beta:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.34:beta:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.56:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.60:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.0.61:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*" ]
GHSA-fjmh-w72c-m4f6
Unprotected Storage of Credentials vulnerability in McAfee Data Loss Prevention (DLP) for Mac prior to 11.5.2 allows local users to gain access to the ADRMS username and password via unprotected log files containing plain text
[]
GHSA-3j5c-gqf5-5qv4
There is a Cross Site Scripting (XSS) vulnerability in the "action" parameter of index.php in PHPJabbers Make an Offer Widget v1.0.
[]
GHSA-fgmw-jj4f-5935
SQL injection vulnerability in music.php in BPowerHouse BPMusic 1.0 allows remote attackers to execute arbitrary SQL commands via the music_id parameter.
[]
CVE-2017-12482
The ledger::parse_date_mask_routine function in times.cc in Ledger 3.1.1 allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.
[ "cpe:2.3:a:ledger-cli:ledger:3.1.1:*:*:*:*:*:*:*" ]
CVE-2001-0667
Internet Explorer 6 and earlier, when used with the Telnet client in Services for Unix (SFU) 2.0, allows remote attackers to execute commands by spawning Telnet with a log file option on the command line and writing arbitrary code into an executable file which is later executed, aka a new variant of the Telnet Invocation vulnerability as described in CVE-2001-0150.
[ "cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*" ]
CVE-2023-38059
External pictures can be loaded even if not allowed by configuration
The loading of external images is not blocked, even if configured, if the attacker uses protocol-relative URL in the payload. This can be used to retreive the IP of the user.This issue affects OTRS: from 7.0.X before 7.0.47, from 8.0.X before 8.0.37; ((OTRS)) Community Edition: from 6.0.X through 6.0.34.
[ "cpe:2.3:a:otrs:otrs:*:*:*:*:community:*:*:*", "cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*" ]
GHSA-j4xh-qhcf-rpxf
An attacker with network access to the affected PLC (CJ-series and CS-series PLCs, all versions) may use a network protocol to read and write files form the PLC internal memory and memory card.
[]
CVE-2021-45646
NETGEAR R7000 devices before 1.0.11.116 are affected by disclosure of sensitive information.
[ "cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*" ]
GHSA-89fc-749h-w2fj
Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
[]
GHSA-84wh-374p-jprq
System command injection in ajaxdata.php in TerraMaster TOS version 3.1.03 allows attackers to execute system commands via the "pwd" parameter during user creation.
[]
CVE-2024-33042
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in FM Host
Memory corruption when Alternative Frequency offset value is set to 255.
[ "cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8108_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8209_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8608_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6335_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm2150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qualcomm_205_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qualcomm_215_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:robotics_rb3_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd626_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7435_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8750_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:smart_audio_200_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_208_processor_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_210_processor_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_212_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_425_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_429_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_439_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_460_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_6_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_625_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_626_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_630_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_632_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_636_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_660_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_662_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_670_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_675_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_690_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_7_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_710_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_720g_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_820_automotive_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_835_mobile_pc_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_845_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_855_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_wear_2100_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_wear_2500_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_wear_3100_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_x50_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_xr1_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr1120_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:talynplus_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:vision_intelligence_400_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3680_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8108:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8209:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8608:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6320:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6335:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6564:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm2150:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm4325:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm4490:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm5430:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs5430:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs7230:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs8250:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:205:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:215_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:215:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:video_collaboration_vc1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:video_collaboration_vc1:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:video_collaboration_vc3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:video_collaboration_vc3:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:video_collaboration_vc5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:video_collaboration_vc5:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:robotics_rb3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:robotics_rb3:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa4150p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa4155p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8770p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8775p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_8_gen1_5g:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd626:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd660:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd670:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sg4150p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7435:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8635:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8750:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:smart_audio_200_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:smart_audio_200:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:smart_display_200_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:smart_display_200:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_208_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_208:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_210:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_212_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_212:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_4_gen_1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_4_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_4_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_425_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_425:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_429_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_429:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_439_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_439:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_460_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_460:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_480_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_480_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_480\\+_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_6_gen_1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_6_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_625_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_625:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_626_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_626:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_630:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_632_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_632:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_636_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_636:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_662_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_662:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_670_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_670:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_675_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_675:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_678_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_678:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_680_4g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_680_4g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_685_4g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_685_4g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_690_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_690_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_695_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_695_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_7_gen_1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_7_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_7\\+_gen_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_7\\+_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_710_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_710:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_720g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_720g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_730_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_730:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_730g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_730g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_732g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_732g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_765_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_765_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_765g_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_765g_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_768g_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_768g_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_778g_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_778g_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_778g\\+_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_778g\\+_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_780g_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_780g_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_782g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_782g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_820_automotive_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_820_automotive:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_835_mobile_pc_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_835_mobile_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_855_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_855:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_855\\+_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_855\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_860_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_860:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_865_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_865_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_865\\+_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_870_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_870_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_888_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_888_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_888\\+_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_888\\+_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_wear_2100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_wear_2100:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_wear_2500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_wear_2500:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_wear_3100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_wear_3100:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_x50_5g_modem-rf_system:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_x55_5g_modem-rf_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_xr1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_xr1:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_xr2_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_xr2\\+_gen_1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_xr2\\+_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr1120:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr2250p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:talynplus:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:vision_intelligence_100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:vision_intelligence_100:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:vision_intelligence_200_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:vision_intelligence_200:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:vision_intelligence_400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:vision_intelligence_400:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3680:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6755:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*" ]
GHSA-gp2r-2vq4-pw96
Cross-site scripting (XSS) vulnerability in neomail.pl in NeoMail 1.27 allows remote attackers to inject arbitrary web script or HTML via the sort parameter. NOTE: some sources say that the affected parameter is "date," but the demonstration URL shows that it is "sort".
[]
GHSA-gj53-5cf5-7ww5
CommScope URFboard SBG6950AC2 9.1.103AA23 devices allow Command Injection.
[]
CVE-2009-4879
The Identity Server in Novell Access Manager before 3.1 SP1 allows attackers with disabled Active Directory accounts to authenticate using X.509 authentication, which bypasses intended access restrictions.
[ "cpe:2.3:a:novell:access_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:novell:access_manager:3:*:*:*:*:*:*:*" ]
CVE-2021-28027
An issue was discovered in the bam crate before 0.1.3 for Rust. There is an integer underflow and out-of-bounds write during the loading of a bgzip block.
[ "cpe:2.3:a:bam_project:bam:*:*:*:*:*:rust:*:*" ]
CVE-2017-7107
An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
GHSA-w466-hvww-7wfm
Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 do not properly interact with extensions, which allows remote attackers to cause a denial of service via a crafted extension that triggers an uninitialized pointer.
[]
GHSA-m37r-wp9g-cfgf
A vulnerability was found in Privoxy which was fixed in process_encrypted_request_headers() by freeing header memory when failing to get the request destination.
[]
CVE-2012-1453
The CAB file parser in Dr.Web 5.0.2.03300, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Sophos Anti-Virus 4.61.0, Trend Micro AntiVirus 9.120.0.1004, McAfee Gateway (formerly Webwasher) 2010.1C, Emsisoft Anti-Malware 5.1.0.1, CA eTrust Vet Antivirus 36.1.8511, Antiy Labs AVL SDK 2.0.3.7, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Rising Antivirus 22.83.00.03, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via a CAB file with a modified coffFiles field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CAB parser implementations.
[ "cpe:2.3:a:antiy:avl_sdk:2.0.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:ca:etrust_vet_antivirus:36.1.8511:*:*:*:*:*:*:*", "cpe:2.3:a:drweb:dr.web_antivirus:5.0.2.03300:*:*:*:*:*:*:*", "cpe:2.3:a:emsisoft:anti-malware:5.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortinet_antivirus:4.2.254.0:*:*:*:*:*:*:*", "cpe:2.3:a:ikarus:ikarus_virus_utilities_t3_command_line_scanner:1.1.97.0:*:*:*:*:*:*:*", "cpe:2.3:a:kaspersky:kaspersky_anti-virus:7.0.0.125:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:gateway:2010.1c:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:security_essentials:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:pandasecurity:panda_antivirus:10.0.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:rising-global:rising_antivirus:22.83.00.03:*:*:*:*:*:*:*", "cpe:2.3:a:sophos:sophos_anti-virus:4.61.0:*:*:*:*:*:*:*", "cpe:2.3:a:trendmicro:housecall:9.120.0.1004:*:*:*:*:*:*:*", "cpe:2.3:a:trendmicro:trend_micro_antivirus:9.120.0.1004:*:*:*:*:*:*:*" ]
CVE-2019-11836
The Rediffmail (aka com.rediff.mail.and) application 2.2.6 for Android has cleartext mail content in file storage, persisting after a logout.
[ "cpe:2.3:a:rediff:rediffmail:2.2.6:*:*:*:*:android:*:*" ]
GHSA-rhwf-hqpr-q8g2
Code Injection in script-manager
An unintended require vulnerability in script-manager npm package version 0.8.6 and earlier may allow attackers to execute arbitrary code.
[]
GHSA-xjr2-g37g-hrjm
In the Linux kernel, the following vulnerability has been resolved:mm/secretmem: fix NULL page->mapping dereference in page_is_secretmem()Check for a NULL page->mapping before dereferencing the mapping in page_is_secretmem(), as the page's mapping can be nullified while gup() is running, e.g. by reclaim or truncation.BUG: kernel NULL pointer dereference, address: 0000000000000068 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: 0000 [#1] PREEMPT SMP NOPTI CPU: 6 PID: 4173897 Comm: CPU 3/KVM Tainted: G W RIP: 0010:internal_get_user_pages_fast+0x621/0x9d0 Code: <48> 81 7a 68 80 08 04 bc 0f 85 21 ff ff 8 89 c7 be RSP: 0018:ffffaa90087679b0 EFLAGS: 00010046 RAX: ffffe3f37905b900 RBX: 00007f2dd561e000 RCX: ffffe3f37905b934 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffe3f37905b900 ... CR2: 0000000000000068 CR3: 00000004c5898003 CR4: 00000000001726e0 Call Trace: get_user_pages_fast_only+0x13/0x20 hva_to_pfn+0xa9/0x3e0 try_async_pf+0xa1/0x270 direct_page_fault+0x113/0xad0 kvm_mmu_page_fault+0x69/0x680 vmx_handle_exit+0xe1/0x5d0 kvm_arch_vcpu_ioctl_run+0xd81/0x1c70 kvm_vcpu_ioctl+0x267/0x670 __x64_sys_ioctl+0x83/0xa0 do_syscall_64+0x56/0x80 entry_SYSCALL_64_after_hwframe+0x44/0xae
[]
CVE-2021-22485
There is a SSID vulnerability with Wi-Fi network connections in Huawei devices.Successful exploitation of this vulnerability may affect service confidentiality.
[ "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*" ]
CVE-2025-20058
BIG-IP message routing vulnerability
When a BIG-IP message routing profile is configured on a virtual server, undisclosed traffic can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
[]
CVE-2014-6933
The Toraware Takojyou (aka ltd.pte.wavea.torawaretakojyou) application 1.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:wavea:toraware_takojyou:1.3:*:*:*:*:android:*:*" ]
GHSA-8mxm-prp8-gc3w
Sourcecodester School Task Manager App 1.0 allows SQL Injection via the 'task' parameter.
[]
CVE-2024-10913
Clone <= 2.4.6 - Unauthenticated PHP Object Injection via 'recursive_unserialized_replace'
The Clone plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.4.6 via deserialization of untrusted input in the 'recursive_unserialized_replace' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
[ "cpe:2.3:a:migrate:clone:*:*:*:*:*:*:*:*" ]
CVE-2023-47772
WordPress Slider Revolution Plugin <= 6.6.14 is vulnerable to Cross Site Scripting (XSS)
Contributor+ Stored Cross-Site Scripting (XSS) vulnerability in Slider Revolution <= 6.6.14.
[ "cpe:2.3:a:themepunch:slider_revolution:*:*:*:*:*:wordpress:*:*" ]
CVE-2012-0571
Unspecified vulnerability in the Oracle FLEXCUBE Universal Banking component in Oracle Financial Services Software 10.0.0 through 10.5.0 and 11.0.0 through 11.4.0 allows remote authenticated users to affect integrity via unknown vectors related to Core, a different vulnerability than CVE-2012-0544.
[ "cpe:2.3:a:oracle:financial_services_software:10.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:financial_services_software:10.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:financial_services_software:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:financial_services_software:11.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:financial_services_software:11.4.0:*:*:*:*:*:*:*" ]
CVE-2001-1240
The default configuration of sudo in Engarde Secure Linux 1.0.1 allows any user in the admin group to run certain commands that could be leveraged to gain full root access.
[ "cpe:2.3:o:engardelinux:secure_linux:1.0.1:*:*:*:*:*:*:*" ]
CVE-2013-2909
Use-after-free vulnerability in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to inline-block rendering for bidirectional Unicode text in an element isolated from its siblings.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.40:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.41:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.42:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.43:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.44:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.47:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.50:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.51:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.52:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.53:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.56:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.57:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.58:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.59:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.60:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.61:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.64:*:*:*:*:*:*:*" ]
GHSA-23vg-8xc3-j64m
The Social Connect plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.2. This is due to insufficient verification on the OpenID server being supplied during the social login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email.
[]
GHSA-3q76-jpjg-96ff
A vulnerability in the bidirectional forwarding detection (BFD) hardware offload feature of Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers, ASR 9902 Compact High-Performance Routers, and ASR 9903 Compact High-Performance Routers could allow an unauthenticated, remote attacker to cause a line card to reset, resulting in a denial of service (DoS) condition. This vulnerability is due to the incorrect handling of malformed BFD packets that are received on line cards where the BFD hardware offload feature is enabled. An attacker could exploit this vulnerability by sending a crafted IPv4 BFD packet to an affected device. A successful exploit could allow the attacker to cause line card exceptions or a hard reset, resulting in loss of traffic over that line card while the line card reloads.
[]
CVE-2019-5012
An exploitable privilege escalation vulnerability exists in the Wacom, driver version 6.3.32-3, update helper service in the startProcess command. The command takes a user-supplied script argument and executes it under root context. A user with local access can use this vulnerability to raise their privileges to root. An attacker would need local access to the machine for a successful exploit.
[ "cpe:2.3:a:wacom:driver:6.3.32-3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*" ]
GHSA-ff7g-r4f4-qg7v
This issue was addressed with improved redaction of sensitive information. This issue is fixed in iOS 18.4 and iPadOS 18.4, tvOS 18.4, macOS Sequoia 15.4. An app may be able to access sensitive user data.
[]
CVE-2021-38650
Microsoft Office Spoofing Vulnerability
Microsoft Office Spoofing Vulnerability
[ "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:-:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:office:2016:*:-:*:-:*:-:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:macos:*:*", "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x86:*", "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x64:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x86:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x64:*" ]
CVE-2017-2832
An exploitable command injection vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.37. A specially crafted HTTP request can allow for a user to inject arbitrary shell characters during a password change resulting in command injection. An attacker can simply send an HTTP request to the device to trigger this vulnerability.
[ "cpe:2.3:o:foscam:c1_firmware:2.52.2.37:*:*:*:*:*:*:*", "cpe:2.3:h:foscam:c1:-:*:*:*:*:*:*:*" ]
CVE-2017-1550
IBM Sterling File Gateway 2.2 could allow an authenticated user to change other user's passwords. IBM X-Force ID: 131290.
[ "cpe:2.3:a:ibm:sterling_file_gateway:2.2:*:*:*:*:*:*:*" ]
CVE-2022-41732
IBM Maximo information disclosure
IBM Maximo Mobile 8.7 and 8.8 stores user credentials in plain clear text which can be read by a local user. IBM X-Force ID: 237407.
[ "cpe:2.3:a:ibm:maximo_application_suite:8.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_application_suite:8.8:*:*:*:*:*:*:*" ]
CVE-2025-31863
WordPress Agency Toolkit plugin <= 1.0.23 - Broken Access Control vulnerability
Missing Authorization vulnerability in inspry Agency Toolkit allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Agency Toolkit: from n/a through 1.0.23.
[]
CVE-2016-1078
Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1037, CVE-2016-1063, CVE-2016-1064, CVE-2016-1071, CVE-2016-1072, CVE-2016-1073, CVE-2016-1074, CVE-2016-1076, CVE-2016-1077, CVE-2016-1080, CVE-2016-1081, CVE-2016-1082, CVE-2016-1083, CVE-2016-1084, CVE-2016-1085, CVE-2016-1086, CVE-2016-1088, CVE-2016-1093, CVE-2016-1095, CVE-2016-1116, CVE-2016-1118, CVE-2016-1119, CVE-2016-1120, CVE-2016-1123, CVE-2016-1124, CVE-2016-1125, CVE-2016-1126, CVE-2016-1127, CVE-2016-1128, CVE-2016-1129, CVE-2016-1130, CVE-2016-4088, CVE-2016-4089, CVE-2016-4090, CVE-2016-4093, CVE-2016-4094, CVE-2016-4096, CVE-2016-4097, CVE-2016-4098, CVE-2016-4099, CVE-2016-4100, CVE-2016-4101, CVE-2016-4103, CVE-2016-4104, and CVE-2016-4105.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*" ]
CVE-2022-0574
Improper Access Control in publify/publify
Improper Access Control in GitHub repository publify/publify prior to 9.2.8.
[ "cpe:2.3:a:publify_project:publify:*:*:*:*:*:*:*:*" ]
CVE-2016-10845
cPanel before 11.54.0.4 allows arbitrary file-overwrite operations in scripts/check_system_storable (SEC-78).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
GHSA-6f8h-gp84-3439
NVIDIA UNIX graphics driver before 295.71 and before 304.32 allows local users to write to arbitrary physical memory locations and gain privileges by modifying the VGA window using /dev/nvidia0.
[]
GHSA-232w-p9jf-7fx8
SQL injection vulnerability in the Shape5 Bridge of Hope template for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in an article action to index.php.
[]
GHSA-753w-64gh-hm9r
Cross-site request forgery (CSRF) vulnerability in Cisco FireSIGHT System Software 4.10.2 through 6.1.0 and Firepower Management Center allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCva21636.
[]
CVE-2021-37196
A vulnerability has been identified in COMOS V10.2 (All versions only if web components are used), COMOS V10.3 (All versions < V10.3.3.3 only if web components are used), COMOS V10.3 (All versions >= V10.3.3.3 only if web components are used), COMOS V10.4 (All versions < V10.4.1 only if web components are used). The COMOS Web component of COMOS unpacks specially crafted archive files to relative paths. This vulnerability could allow an attacker to store files in any folder accessible by the COMOS Web webservice.
[ "cpe:2.3:a:siemens:comos:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:comos:10.4:*:*:*:*:*:*:*" ]
GHSA-8vvp-525h-cxf9
Cross-Site Request Forgery in Apache Wicket
An error in the evaluation of the fetch metadata headers could allow a bypass of the CSRF protection in Apache Wicket. This issue affects Apache Wicket: from 9.1.0 through 9.16.0, and the milestone releases for the 10.0 series. Apache Wicket 8.x does not support CSRF protection via the fetch metadata headers and as such is not affected.Users are recommended to upgrade to version 9.17.0 or 10.0.0, which fixes the issue.
[]
CVE-2013-1920
Xen 4.2.x, 4.1.x, and earlier, when the hypervisor is running "under memory pressure" and the Xen Security Module (XSM) is enabled, uses the wrong ordering of operations when extending the per-domain event channel tracking table, which causes a use-after-free and allows local guest kernels to inject arbitrary events and gain privileges via unspecified vectors.
[ "cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*" ]
CVE-2023-2524
Control iD RHiD direct request
A vulnerability classified as critical has been found in Control iD RHiD 23.3.19.0. This affects an unknown part of the file /v2/#/. The manipulation leads to direct request. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-228015. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:controlid:rhid:23.3.19.0:*:*:*:*:*:*:*" ]
GHSA-4pr4-pf4q-cm77
IBM Sterling Partner Engagement Manager 6.1.2, 6.2, and Cloud/SasS 22.2 could allow a remote authenticated attacker to conduct an LDAP injection. By using a specially crafted request, an attacker could exploit this vulnerability and could result in in granting permission to unauthorized resources. IBM X-Force ID: 220782.
[]
CVE-2023-22931
‘createrss’ External Search Command Overwrites Existing RSS Feeds in Splunk Enterprise
In Splunk Enterprise versions below 8.1.13 and 8.2.10, the ‘createrss’ external search command overwrites existing Resource Description Format Site Summary (RSS) feeds without verifying permissions. This feature has been deprecated and disabled by default.
[ "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*" ]
GHSA-47fc-5829-4cxj
SQL injection vulnerability in modules/arcade/index.php in PHP MySpace Gold Edition 8.0 and 8.10 allows remote attackers to execute arbitrary SQL commands via the gid parameter in a play_game action. NOTE: some of these details are obtained from third party information.
[]
CVE-2011-3782
phpLD 2-151.2.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by libs/smarty/Smarty_Compiler.class.php and certain other files.
[ "cpe:2.3:a:phplinkdirectory:phpld:2-151.2.0:*:*:*:*:*:*:*" ]
CVE-2024-39772
Silent Desktop Screenshot Capture
Mattermost Desktop App versions <=5.8.0 fail to safeguard screen capture functionality which allows an attacker to silently capture high-quality screenshots via JavaScript APIs.
[ "cpe:2.3:a:mattermost:mattermost_desktop:*:*:*:*:*:*:*:*" ]
CVE-2019-7865
A cross-site request forgery (CSRF) vulnerability exists in the checkout cart item of Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited at the time of editing or configuration.
[ "cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*" ]
CVE-2019-2432
Vulnerability in the Oracle Argus Safety component of Oracle Health Sciences Applications (subcomponent: Login). Supported versions that are affected are 8.1 and 8.2. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Argus Safety. While the vulnerability is in Oracle Argus Safety, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Argus Safety accessible data as well as unauthorized read access to a subset of Oracle Argus Safety accessible data. CVSS 3.0 Base Score 4.9 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:argus_safety:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:argus_safety:8.2:*:*:*:*:*:*:*" ]
GHSA-hpvv-j8c7-2q3x
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear MDM9206, MDM9650, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 820A, SD 835, SD 845, and SD 850, out of bounds memory access vulnerability may occur in the content protection manager due to improper validation of incoming messages.
[]
CVE-2018-0061
Junos OS: Denial of service in telnetd
A denial of service vulnerability in the telnetd service on Junos OS allows remote unauthenticated users to cause high CPU usage which may affect system performance. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D81 on SRX Series; 12.3 versions prior to 12.3R12-S11; 12.3X48 versions prior to 12.3X48-D80 on SRX Series; 15.1 versions prior to 15.1R7; 15.1X49 versions prior to 15.1X49-D150, 15.1X49-D160 on SRX Series; 15.1X53 versions prior to 15.1X53-D59 on EX2300/EX3400 Series; 15.1X53 versions prior to 15.1X53-D68 on QFX10K Series; 15.1X53 versions prior to 15.1X53-D235 on QFX5200/QFX5110 Series; 15.1X53 versions prior to 15.1X53-D495 on NFX Series; 16.1 versions prior to 16.1R4-S12, 16.1R6-S6, 16.1R7; 16.2 versions prior to 16.2R2-S7, 16.2R3; 17.1 versions prior to 17.1R2-S9, 17.1R3; 17.2 versions prior to 17.2R2-S6, 17.2R3; 17.2X75 versions prior to 17.2X75-D100; 17.3 versions prior to 17.3R2-S4, 17.3R3; 17.4 versions prior to 17.4R1-S5, 17.4R2; 18.2X75 versions prior to 18.2X75-D5.
[ "cpe:2.3:o:juniper:junos:12.1x46:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d15:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d20:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d25:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d30:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d35:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d40:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d45:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d50:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d55:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d60:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d65:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r11:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r9:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d15:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d20:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d25:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d30:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d35:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d40:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d45:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d50:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d55:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d60:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d65:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d70:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d75:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d100:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d110:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d120:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d140:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d30:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d35:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d40:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d45:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d50:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d55:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d60:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d65:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d70:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d75:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d80:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d90:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d50:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d51:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d52:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d55:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d57:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d58:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d20:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d21:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d30:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d32:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d33:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d34:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d60:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d61:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d62:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d63:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d64:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d65:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d66:*:*:*:*:*:*", "cpe:2.3:h:juniper:qfx10000:-:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d210:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d230:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d231:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d232:*:*:*:*:*:*", "cpe:2.3:h:juniper:qfx5110:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:qfx5200:-:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d40:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d45:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d490:*:*:*:*:*:*", "cpe:2.3:h:juniper:nfx150:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:nfx250:-:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.2:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.1:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.2:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.2x75:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.2x75:d50:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.2x75:d90:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2x75:*:*:*:*:*:*:*" ]
GHSA-5w88-p765-fm53
Buffer overflow in the Tiny SRP library (aka TinySRP) allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted size value for the username field.
[]
CVE-2025-0054
Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Application Server Java
SAP NetWeaver Application Server Java does not sufficiently handle user input, resulting in a stored cross-site scripting vulnerability. The application allows attackers with basic user privileges to store a Javascript payload on the server, which could be later executed in the victim's web browser. With this the attacker might be able to read or modify information associated with the vulnerable web page.
[]
GHSA-g35q-w93f-4c48
Cross-site request forgery (CSRF) vulnerability in the web-based administration console in Citrix Access Gateway before firmware 4.5.5 allows remote attackers to perform certain configuration changes as administrators.
[]
GHSA-m56w-85v9-828h
Auth. (subscriber+) Stored Cross-Site Scripting (XSS) vulnerability in Rymera Web Co Wholesale Suite plugin <= 2.1.5 versions.
[]
GHSA-g3f3-78rg-6fwv
openITCOCKPIT before 3.7.1 allows deletion of files, aka RVID 4-445b21.
[]
CVE-2024-8150
ContiNew Admin user sql injection
A vulnerability was found in ContiNew Admin 3.2.0 and classified as critical. Affected by this issue is the function top.continew.starter.extension.crud.controller.BaseController#page of the file /api/system/user?deptId=1&page=1&size=10. The manipulation of the argument sort leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:continew:admin:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:continew:continew_admin:3.2.0:*:*:*:*:*:*:*" ]
GHSA-xp69-6p8j-w8m5
An issue was discovered in PESCMS-V2.3.3. There is a CSRF vulnerability that can delete import information about a user's company.
[]
GHSA-x4pm-7m4x-8v58
The Canon MG3100, MG5300, MG6100, MP495, MX340, MX870, MX890, MX920, and MX922 printers allow remote attackers to cause a denial of service (device hang) via a crafted LAN_TXT24 parameter to English/pages_MacUS/cgi_lan.cgi followed by a direct request to English/pages_MacUS/lan_set_content.html. NOTE: the vendor has apparently responded by stating "Canon believes that its printers will not have to deal with unauthorized access to the network from an external location as long as the printers are used in a secured environment."
[]
CVE-2019-1010246
MailCleaner before c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9 is affected by: Unauthenticated MySQL database password information disclosure. The impact is: MySQL database content disclosure (e.g. username, password). The component is: The API call in the function allowAction() in NewslettersController.php. The attack vector is: HTTP Get request. The fixed version is: c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9.
[ "cpe:2.3:a:mailcleaner:mailcleaner:*:*:*:*:*:*:*:*" ]
CVE-2023-21973
Vulnerability in the Oracle iProcurement product of Oracle E-Business Suite (component: E-Content Manager Catalog). Supported versions that are affected are 12.2.3-12.2.12. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle iProcurement. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iProcurement, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle iProcurement accessible data as well as unauthorized read access to a subset of Oracle iProcurement accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:iprocurement:*:*:*:*:*:*:*:*" ]
GHSA-2x43-7p4j-28px
Vulnerability in the Oracle Solaris product of Oracle Systems (component: libsuri). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Solaris accessible data. CVSS 3.1 Base Score 3.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
[]
GHSA-58v4-qwx5-7f59
SQL Injection in knex
knex.js versions before 0.19.5 are vulnerable to SQL Injection attack. Identifiers are escaped incorrectly as part of the MSSQL dialect, allowing attackers to craft a malicious query to the host DB.
[]
CVE-2020-6765
D-Link DSL-GS225 J1 AU_1.0.4 devices allow an admin to execute OS commands by placing shell metacharacters after a supported CLI command, as demonstrated by ping -c1 127.0.0.1; cat/etc/passwd. The CLI is reachable by TELNET.
[ "cpe:2.3:o:dlink:dsl-gs225_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dsl-gs225:j1:*:*:*:*:*:*:*" ]
GHSA-qm27-chf9-f287
Improper Input Validation vulnerability in Group Arge Energy and Control Systems Smartpower Web allows SQL Injection.This issue affects Smartpower Web: before 23.01.01.
[]
CVE-2022-22263
Unprotected dynamic receiver in SecSettings prior to SMR Jan-2022 Release 1 allows untrusted applications to launch arbitrary activity.
[ "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
CVE-2024-56052
WordPress WPLMS plugin < 1.9.9.5.2 - Student+ Arbitrary File Upload vulnerability
Unrestricted Upload of File with Dangerous Type vulnerability in VibeThemes WPLMS allows Upload a Web Shell to a Web Server.This issue affects WPLMS: from n/a before 1.9.9.5.2.
[]
CVE-2016-2385
Heap-based buffer overflow in the encode_msg function in encode_msg.c in the SEAS module in Kamailio (formerly OpenSER and SER) before 4.3.5 allows remote attackers to cause a denial of service (memory corruption and process crash) or possibly execute arbitrary code via a large SIP packet.
[ "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:kamailio:kamailio:*:*:*:*:*:*:*:*" ]
CVE-2020-11020
Authentication and extension bypass in Faye
Faye (NPM, RubyGem) versions greater than 0.5.0 and before 1.0.4, 1.1.3 and 1.2.5, has the potential for authentication bypass in the extension system. The vulnerability allows any client to bypass checks put in place by server-side extensions, by appending extra segments to the message channel. It is patched in versions 1.0.4, 1.1.3 and 1.2.5.
[ "cpe:2.3:a:faye_project:faye:*:*:*:*:*:node.js:*:*", "cpe:2.3:a:faye_project:faye:*:*:*:*:*:ruby:*:*" ]
GHSA-4pqp-9qr3-h8vg
Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17064, CVE-2020-17065, CVE-2020-17066.
[]
GHSA-gq4f-x93r-43mj
FluxBB 1.5.11 is affected by cross-site scripting (XSS in the Blog Content component. This vulnerability can allow an attacker to inject the XSS payload in "Blog Content" and each time any user will visit the blog, the XSS triggers and the attacker can able to steal the cookie according to the crafted payload.
[]
CVE-2023-1911
Blocksy Companion < 1.8.82 - Subscriber+ Draft Post Access
The Blocksy Companion WordPress plugin before 1.8.82 does not ensure that posts to be accessed via a shortcode are already public and can be viewed, allowing any authenticated users, such as subscriber to access draft posts for example
[ "cpe:2.3:a:creativethemes:blocksy_companion:*:*:*:*:*:wordpress:*:*" ]
CVE-2022-21297
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*" ]
CVE-2013-0705
Directory traversal vulnerability in LSI 3ware Disk Manager (3DM) before 2 allows remote attackers to read arbitrary files via unspecified vectors.
[ "cpe:2.3:a:lsi:3ware_disk_manager:*:*:*:*:*:*:*:*" ]
GHSA-r5qv-83gw-6mgp
In BlackCat CMS 1.2, backend/addons/install.php allows remote authenticated users to execute arbitrary PHP code via a ZIP archive that contains a .php file.
[]
GHSA-78pq-6rh5-p9vx
SQL Injection vulnerability in Online Book Store v1.0 via the bookisbn parameter to admin_delete.php, which could let a remote malicious user execute arbitrary code.
[]
GHSA-7vj6-r4xq-5hwx
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the moveInstance method of a Form object. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6505.
[]
GHSA-x3mq-qq8q-g844
Multiple stack-based buffer overflows in the HyleosChemView.HLChemView ActiveX control (HyleosChemView.ocx) in Hyleos ChemView 1.9.5.1 allow remote attackers to execute arbitrary code via a large number of white space characters in the filename argument to the (1) SaveasMolFile and (2) ReadMolFile methods.
[]
GHSA-pqwj-p67x-f5r3
Chamilo 1.11.14 allows stored XSS via main/install/index.php and main/install/ajax.php through the port parameter.
[]
CVE-2022-36647
PKUVCL davs2 v1.6.205 was discovered to contain a global buffer overflow via the function parse_sequence_header() at source/common/header.cc:269.
[ "cpe:2.3:a:davs2_project:davs2:1.6.205:*:*:*:*:*:*:*" ]