id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
---|---|---|---|
GHSA-pvw4-3rwc-f79f
|
Multiple unspecified vulnerabilities in Epiware before 4.7.5 have unknown impact and attack vectors, possibly related to cross-site scripting (XSS) and other unspecified issues.
|
[] |
|
CVE-2024-11422
|
DWFX File Parsing Vulnerabilities in Autodesk Navisworks Desktop Software
|
A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, may force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
|
[] |
CVE-2022-26059
|
Delta Electronics DIAEnergie SQL Injection in GetQueryData
|
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability that exists in GetQueryData. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.
|
[
"cpe:2.3:a:deltaww:diaenergie:*:*:*:*:*:*:*:*"
] |
CVE-2024-33013
|
Buffer Over-read in WLAN Host
|
Transient DOS when driver accesses the ML IE memory and offset value is incremented beyond ML IE length.
|
[
"cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:immersive_home_214_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:immersive_home_216_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:immersive_home_316_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:immersive_home_318_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:immersive_home_3210_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:immersive_home_326_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5028_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5302_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5312_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5332_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq6000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq6010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq6028_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8070a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8071a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8072a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8074a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8076_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8076a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8078_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8078a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8173_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8174_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq9008_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq9554_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq9574_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca4024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6554a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8075_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8082_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8084_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8085_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8386_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9367_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9888_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9889_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcc2073_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcc2076_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcf8000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcf8001_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5022_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5052_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5122_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5124_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5152_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5154_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5164_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6023_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6112_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6122_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6132_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6402_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6412_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6422_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6432_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9022_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9072_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9160_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9274_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qxm8083_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:robotics_rb5_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx65m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x72_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:srv1l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:vision_intelligence_400_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:vision_intelligence_400_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2250p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr1230p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ssg2125p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ssg2115p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:srv1m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:srv1l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:srv1h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_x72_5g_modem-rf_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_8_gen_3_mobile_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx65m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8380xp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8775p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8770p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8650p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8620p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa7775p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa7255p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa4150p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:robotics_rb5_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qxm8083:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:video_collaboration_vc5_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:video_collaboration_vc3_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs8250:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs7230:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs5430:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9274:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9160:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9072:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9070:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9022:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6432:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6422:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6412:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6402:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6132:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6122:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6112:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6023:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5164:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5154:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5152:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5124:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5122:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5052:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5024:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5022:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm5430:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcf8001:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcf8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcc2076:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcc2073:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9889:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9888:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9367:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8386:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8085:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8084:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8082:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8075:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6797aq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6688aq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6678aq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6554a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca4024:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qamsrv1m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qamsrv1h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qam8620p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9628:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq9574:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq9554:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq9008:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8174:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8173:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8078a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8078:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8076a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8076:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8074a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8072a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8071a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8070a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq6028:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq6010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq6000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq5332:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq5312:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq5302:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq5300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq5028:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq5010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:immersive_home_326_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:immersive_home_3210_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:immersive_home_318_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:immersive_home_316_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:immersive_home_216_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:immersive_home_214_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:flight_rb5_5g_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csr8811:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*"
] |
CVE-2007-0480
|
Cisco IOS 9.x, 10.x, 11.x, and 12.x and IOS XR 2.0.x, 3.0.x, and 3.2.x allows remote attackers to cause a denial of service or execute arbitrary code via a crafted IP option in the IP header in a (1) ICMP, (2) PIMv2, (3) PGM, or (4) URD packet.
|
[
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0da:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0db:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0dc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0s:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0sc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0sl:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0sp:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0st:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0sx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0sy:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0sz:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0t:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0w:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0wc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0wt:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xa:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xd:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xe:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xf:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xg:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xh:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xi:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xj:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xk:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xl:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xm:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xq:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xr:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xs:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xv:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xw:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1aa:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ax:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ay:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1az:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1cx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1da:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1db:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1dc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1e:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ea:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1eb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ec:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1eo:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1eu:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ev:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ew:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ex:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ey:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ez:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1t:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1x:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xa:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xd:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xe:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xf:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xg:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xh:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xi:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xj:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xl:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xp:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xq:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xr:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xs:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xt:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xu:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xv:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xw:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xy:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xz:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ya:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yd:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ye:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yf:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yh:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yi:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yj:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2b:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2bc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2bw:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2by:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2bz:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2cx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2cy:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2cz:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2da:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2dd:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2dx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2eu:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ew:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ewa:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ex:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ey:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ez:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2fx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2fy:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2fz:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ixa:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ixb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ixc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ja:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2jk:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2mb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2mc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2s:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sbc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2se:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sea:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2seb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sec:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sed:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2see:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sef:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2seg:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sg:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sga:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2so:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sra:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2srb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2su:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sv:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sw:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sxa:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sxb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sxd:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sxe:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sxf:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sy:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sz:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2t:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2tpc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xa:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xd:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xe:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xf:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xg:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xh:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xi:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xj:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xk:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xl:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xm:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xn:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xq:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xr:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xs:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xt:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xu:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xv:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xw:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ya:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yd:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ye:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yf:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yg:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yh:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yj:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yk:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yl:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ym:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yn:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yo:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yp:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yq:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yr:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ys:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yt:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yu:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yv:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yw:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yy:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yz:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2za:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zd:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ze:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zf:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zg:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zh:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zj:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zl:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zn:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zp:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3b:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3bc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3bw:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3ja:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3jea:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3jeb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3jk:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3jx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3t:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3tpc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xa:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xc:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xd:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xe:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xf:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xg:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xh:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xi:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xj:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xk:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xq:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xr:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xs:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xu:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xw:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xy:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3ya:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yd:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yf:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yg:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yh:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yi:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yj:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yk:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3ym:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yq:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3ys:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yt:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yu:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yx:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yz:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.4:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.4mr:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.4sw:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.4t:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.4xa:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.4xb:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_transmission_control_protocol:12.4xc:*:*:*:*:*:*:*"
] |
|
CVE-2005-2777
|
Looking Glass 20040427 allows remote attackers to execute arbitrary commands via shell metacharacters in the DNS lookup query field.
|
[
"cpe:2.3:a:looking_glass:looking_glass:2004-04-27:*:*:*:*:*:*:*"
] |
|
GHSA-c382-6838-fr3r
|
Delta Electronics DTN Soft version 2.0.1 and prior are vulnerable to an attacker achieving remote code execution through a deserialization of untrusted data vulnerability.
|
[] |
|
CVE-2022-41032
|
NuGet Client Elevation of Privilege Vulnerability
|
NuGet Client Elevation of Privilege Vulnerability
|
[
"cpe:2.3:a:microsoft:.net:6.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_core:3.1:-:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:-:*:*",
"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:macos:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
] |
CVE-2025-30448
|
This issue was addressed with additional entitlement checks. This issue is fixed in macOS Sonoma 14.7.6, iPadOS 17.7.7, iOS 18.5 and iPadOS 18.5, visionOS 2.5, macOS Ventura 13.7.6, macOS Sequoia 15.4. An attacker may be able to turn on sharing of an iCloud folder without authentication.
|
[] |
|
CVE-2019-12210
|
In Yubico pam-u2f 1.0.7, when configured with debug and a custom debug log file is set using debug_file, that file descriptor is not closed when a new process is spawned. This leads to the file descriptor being inherited into the child process; the child process can then read from and write to it. This can leak sensitive information and also, if written to, be used to fill the disk or plant misinformation.
|
[
"cpe:2.3:a:yubico:pam-u2f:1.0.7:*:*:*:*:*:*:*"
] |
|
CVE-2019-1268
|
An elevation of privilege exists when Winlogon does not properly handle file path information, aka 'Winlogon Elevation of Privilege Vulnerability'.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
|
CVE-2005-2676
|
Cross-site scripting (XSS) vulnerability in displayimage.php in Coppermine Photo Gallery before 1.3.4 allows remote attackers to inject arbitrary web script or HTML via EXIF data.
|
[
"cpe:2.3:a:coppermine:coppermine_photo_gallery:1.0_rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine:coppermine_photo_gallery:1.1_.0:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine:coppermine_photo_gallery:1.1_beta_2:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine:coppermine_photo_gallery:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine:coppermine_photo_gallery:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine:coppermine_photo_gallery:1.2.2_b:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine:coppermine_photo_gallery:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine:coppermine_photo_gallery:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine:coppermine_photo_gallery:1.3.3:*:*:*:*:*:*:*"
] |
|
GHSA-5pm5-4gmv-q7c9
|
Improper boundary checks in petite.c in Clam AntiVirus (ClamAV) before 0.87.1 allows attackers to perform unknown attacks via unknown vectors.
|
[] |
|
GHSA-pwcf-p9qx-3948
|
The QMP migrate command in QEMU version 4.0.0 and earlier is vulnerable to OS command injection, which allows the remote attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server.
|
[] |
|
GHSA-657p-3992-5r6w
|
In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service targeting the build information request validation.
|
[] |
|
CVE-2009-5086
|
Cross-site scripting (XSS) vulnerability in Appliance Configuration Manager (ACM) in Juniper IDP 4.1 before 4.1r3 and 4.2 before 4.2r1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:juniper:idp:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:juniper:idp:4.1r1:*:*:*:*:*:*:*",
"cpe:2.3:a:juniper:idp:4.1r2:*:*:*:*:*:*:*",
"cpe:2.3:a:juniper:idp:4.2:*:*:*:*:*:*:*"
] |
|
CVE-2011-5291
|
The SaveData method in the Cygnicon.ViewControl.1 ActiveX control in CyViewer.ocx in Ashampoo 3D CAD Professional 3.x before 3.0.2 allows remote attackers to write to arbitrary files via a pathname in the first argument.
|
[
"cpe:2.3:a:ashampoo_gmbh_\\&_co.:ashampoo_3d_cad_professional_3:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ashampoo_gmbh_\\&_co.:ashampoo_3d_cad_professional_3:3.0.1:*:*:*:*:*:*:*"
] |
|
GHSA-2wmg-hcwc-fx57
|
The Open Microscopy Environment OMERO.server version 5.4.0 to 5.4.6 contains an Improper Access Control vulnerability in User management that can result in administrative user with privilege restrictions logging in as a more powerful administrator. This attack appear to be exploitable via Use user administration privilege to set the password of a more powerful administrator. This vulnerability appears to have been fixed in 5.4.7.
|
[] |
|
CVE-2000-0704
|
Buffer overflow in SGI Omron WorldView Wnn allows remote attackers to execute arbitrary commands via long JS_OPEN, JS_MKDIR, or JS_FILE_INFO commands.
|
[
"cpe:2.3:a:freewnn:freewnn:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freewnn:freewnn:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freewnn:freewnn:1.1.1_axxx:*:*:*:*:*:*:*",
"cpe:2.3:a:omron:worldview:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wnn:wnn4:4.2.2tl:*:*:*:*:*:*:*",
"cpe:2.3:a:wnn:wnn4:4.2.5tl:*:*:*:*:*:*:*",
"cpe:2.3:a:wnn:wnn4:4.2.8:*:*:*:*:*:*:*"
] |
|
GHSA-4x89-mjpg-vp94
|
An issue was discovered in the Linux kernel through 5.11.x. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation is not correctly accounted for when restricting subsequent operations.
|
[] |
|
GHSA-frp9-x49w-7c4w
|
Symphony 2.6.9 has XSS in publish/notes/edit/##/saved/ via the bottom form field.
|
[] |
|
GHSA-p892-cj2f-7wjx
|
Keep-alive vulnerability in the sticky broadcast mechanism. Successful exploitation of this vulnerability may cause malicious apps to run continuously in the background.
|
[] |
|
CVE-2024-30367
|
Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability
|
Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23013.
|
[
"cpe:2.3:a:foxit:pdf_reader:-:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:pdf_editor:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:pdf_editor:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:pdf_editor:13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:pdf_editor:2023.0:*:*:*:*:*:*:*"
] |
CVE-2024-32830
|
WordPress buddyforms plugin <= 2.8.8- Arbitrary File Read and SSRF vulnerability
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ThemeKraft BuddyForms allows Server Side Request Forgery, Relative Path Traversal.This issue affects BuddyForms: from n/a through 2.8.8.
|
[] |
CVE-2024-56497
|
An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiMail versions 7.2.0 through 7.2.4 and 7.0.0 through 7.0.6 and 6.4.0 through 6.4.7, FortiRecorder versions 7.0.0 and 6.4.0 through 6.4.4 allows attacker to execute unauthorized code or commands via the CLI.
|
[
"cpe:2.3:a:fortinet:fortimail:7.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:6.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:6.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:6.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:6.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:6.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortirecorder:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortirecorder:6.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortirecorder:6.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortirecorder:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortirecorder:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortirecorder:6.4.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-35266
|
Azure DevOps Server Spoofing Vulnerability
|
Azure DevOps Server Spoofing Vulnerability
|
[
"cpe:2.3:o:microsoft:azure_devops_server:2022.1.0:*:*:*:*:*:*:*"
] |
CVE-2024-47371
|
WordPress WP MyLinks plugin<= 1.0.6 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Walter Pinem WP MyLinks allows Stored XSS.This issue affects WP MyLinks: from n/a through 1.0.6.
|
[] |
GHSA-wrch-r746-jf7c
|
In the Linux kernel, the following vulnerability has been resolved:fs/ntfs3: Keep write operations atomicsyzbot reported a NULL pointer dereference in __generic_file_write_iter. [1]Before the write operation is completed, the user executes ioctl[2] to clear
the compress flag of the file, which causes the is_compressed() judgment to
return 0, further causing the program to enter the wrong process and call the
wrong ops ntfs_aops_cmpr, which triggers the null pointer dereference of
write_begin.Use inode lock to synchronize ioctl and write to avoid this case.[1]
Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
Mem abort info:
ESR = 0x0000000086000006
EC = 0x21: IABT (current EL), IL = 32 bits
SET = 0, FnV = 0
EA = 0, S1PTW = 0
FSC = 0x06: level 2 translation fault
user pgtable: 4k pages, 48-bit VAs, pgdp=000000011896d000
[0000000000000000] pgd=0800000118b44403, p4d=0800000118b44403, pud=0800000117517403, pmd=0000000000000000
Internal error: Oops: 0000000086000006 [#1] PREEMPT SMP
Modules linked in:
CPU: 0 UID: 0 PID: 6427 Comm: syz-executor347 Not tainted 6.13.0-rc3-syzkaller-g573067a5a685 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : 0x0
lr : generic_perform_write+0x29c/0x868 mm/filemap.c:4055
sp : ffff80009d4978a0
x29: ffff80009d4979c0 x28: dfff800000000000 x27: ffff80009d497bc8
x26: 0000000000000000 x25: ffff80009d497960 x24: ffff80008ba71c68
x23: 0000000000000000 x22: ffff0000c655dac0 x21: 0000000000001000
x20: 000000000000000c x19: 1ffff00013a92f2c x18: ffff0000e183aa1c
x17: 0004060000000014 x16: ffff800083275834 x15: 0000000000000001
x14: 0000000000000000 x13: 0000000000000001 x12: ffff0000c655dac0
x11: 0000000000ff0100 x10: 0000000000ff0100 x9 : 0000000000000000
x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000
x5 : ffff80009d497980 x4 : ffff80009d497960 x3 : 0000000000001000
x2 : 0000000000000000 x1 : ffff0000e183a928 x0 : ffff0000d60b0fc0
Call trace:
0x0 (P)
__generic_file_write_iter+0xfc/0x204 mm/filemap.c:4156
ntfs_file_write_iter+0x54c/0x630 fs/ntfs3/file.c:1267
new_sync_write fs/read_write.c:586 [inline]
vfs_write+0x920/0xcf4 fs/read_write.c:679
ksys_write+0x15c/0x26c fs/read_write.c:731
__do_sys_write fs/read_write.c:742 [inline]
__se_sys_write fs/read_write.c:739 [inline]
__arm64_sys_write+0x7c/0x90 fs/read_write.c:739
__invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49
el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132
do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151
el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:744
el0t_64_sync_handler+0x84/0x108 arch/arm64/kernel/entry-common.c:762[2]
ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x20)
|
[] |
|
CVE-2025-2304
|
Camaleon CMS Privilege Escalation
|
A Privilege Escalation through a Mass Assignment exists in Camaleon CMS
When a user wishes to change his password, the 'updated_ajax' method of the UsersController is called. The vulnerability stems from the use of the dangerous permit! method, which allows all parameters to pass through without any filtering.
|
[] |
CVE-2011-0961
|
Cross-site scripting (XSS) vulnerability in cwhp/device.center.do in the Help servlet in Cisco CiscoWorks Common Services 3.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the device parameter, aka Bug ID CSCto12704.
|
[
"cpe:2.3:a:cisco:ciscoworks_common_services:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ciscoworks_common_services:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ciscoworks_common_services:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ciscoworks_common_services:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ciscoworks_common_services:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ciscoworks_common_services:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ciscoworks_common_services:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ciscoworks_common_services:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ciscoworks_common_services:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ciscoworks_common_services:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ciscoworks_common_services:3.2:*:*:*:*:*:*:*"
] |
|
CVE-2025-25371
|
NASA cFS (Core Flight System) Aquila is vulnerable to path traversal in the OSAL module, allowing the override of any arbitrary file on the system.
|
[] |
|
CVE-2001-0710
|
NetBSD 1.5 and earlier and FreeBSD 4.3 and earlier allows a remote attacker to cause a denial of service by sending a large number of IP fragments to the machine, exhausting the mbuf pool.
|
[
"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-27030
|
In onCreate of HandleApiCalls.java, there is a possible permission bypass due to a confused deputy. This could lead to local escalation of privilege that allows an app to set or dismiss the alarm with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-150612638
|
[
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-51655
|
In JetBrains IntelliJ IDEA before 2023.3.2 code execution was possible in Untrusted Project mode via a malicious plugin repository specified in the project configuration
|
[
"cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*"
] |
|
GHSA-j2j5-3796-w5mq
|
Bitrix Site Manager 4.0.x allows remote attackers to obtain sensitive information via direct request to (1) subscr_form.php or (2) dbquery_error.php, which reveals the path in an error message.
|
[] |
|
CVE-2021-33975
|
Buffer Overflow vulnerability in Qihoo 360 Total Security v10.8.0.1060 and v10.8.0.1213 allows attacker to escalate privileges.
|
[
"cpe:2.3:a:browser.360:safe_browser:13.0.2170.0:*:*:*:*:*:*:*"
] |
|
CVE-2021-31329
|
Cross Site Scripting (XSS) in Remote Clinic v2.0 via the "Chat" and "Personal Address" field on staff/register.php
|
[
"cpe:2.3:a:remoteclinic:remote_clinic:2.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-57900
|
ila: serialize calls to nf_register_net_hooks()
|
In the Linux kernel, the following vulnerability has been resolved:
ila: serialize calls to nf_register_net_hooks()
syzbot found a race in ila_add_mapping() [1]
commit 031ae72825ce ("ila: call nf_unregister_net_hooks() sooner")
attempted to fix a similar issue.
Looking at the syzbot repro, we have concurrent ILA_CMD_ADD commands.
Add a mutex to make sure at most one thread is calling nf_register_net_hooks().
[1]
BUG: KASAN: slab-use-after-free in rht_key_hashfn include/linux/rhashtable.h:159 [inline]
BUG: KASAN: slab-use-after-free in __rhashtable_lookup.constprop.0+0x426/0x550 include/linux/rhashtable.h:604
Read of size 4 at addr ffff888028f40008 by task dhcpcd/5501
CPU: 1 UID: 0 PID: 5501 Comm: dhcpcd Not tainted 6.13.0-rc4-syzkaller-00054-gd6ef8b40d075 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Call Trace:
<IRQ>
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120
print_address_description mm/kasan/report.c:378 [inline]
print_report+0xc3/0x620 mm/kasan/report.c:489
kasan_report+0xd9/0x110 mm/kasan/report.c:602
rht_key_hashfn include/linux/rhashtable.h:159 [inline]
__rhashtable_lookup.constprop.0+0x426/0x550 include/linux/rhashtable.h:604
rhashtable_lookup include/linux/rhashtable.h:646 [inline]
rhashtable_lookup_fast include/linux/rhashtable.h:672 [inline]
ila_lookup_wildcards net/ipv6/ila/ila_xlat.c:127 [inline]
ila_xlat_addr net/ipv6/ila/ila_xlat.c:652 [inline]
ila_nf_input+0x1ee/0x620 net/ipv6/ila/ila_xlat.c:185
nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
nf_hook_slow+0xbb/0x200 net/netfilter/core.c:626
nf_hook.constprop.0+0x42e/0x750 include/linux/netfilter.h:269
NF_HOOK include/linux/netfilter.h:312 [inline]
ipv6_rcv+0xa4/0x680 net/ipv6/ip6_input.c:309
__netif_receive_skb_one_core+0x12e/0x1e0 net/core/dev.c:5672
__netif_receive_skb+0x1d/0x160 net/core/dev.c:5785
process_backlog+0x443/0x15f0 net/core/dev.c:6117
__napi_poll.constprop.0+0xb7/0x550 net/core/dev.c:6883
napi_poll net/core/dev.c:6952 [inline]
net_rx_action+0xa94/0x1010 net/core/dev.c:7074
handle_softirqs+0x213/0x8f0 kernel/softirq.c:561
__do_softirq kernel/softirq.c:595 [inline]
invoke_softirq kernel/softirq.c:435 [inline]
__irq_exit_rcu+0x109/0x170 kernel/softirq.c:662
irq_exit_rcu+0x9/0x30 kernel/softirq.c:678
instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline]
sysvec_apic_timer_interrupt+0xa4/0xc0 arch/x86/kernel/apic/apic.c:1049
|
[] |
GHSA-9f6h-w476-68gc
|
Vulnerability of improper device information processing in the device management module
Impact: Successful exploitation of this vulnerability may affect availability.
|
[] |
|
GHSA-76r6-j2q8-m63q
|
The open_envvar function in xdg-open in xdg-utils before 1.1.3 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL, as demonstrated by %s in this environment variable.
|
[] |
|
GHSA-f383-xpww-4f48
|
NVIDIA GPU Display Driver for Windows contains a vulnerability in the NVIDIA Control Panel application where it is susceptible to a Windows file system symbolic link attack where an unprivileged attacker can cause the applications to overwrite privileged files, resulting in potential denial of service or data loss.
|
[] |
|
CVE-2019-17607
|
HongCMS 3.0.0 has XSS via the install/index.php servername parameter.
|
[
"cpe:2.3:a:hongcms_project:hongcms:3.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-wxrm-2h86-v95f
|
Malicious Package in pizza-pasta
|
Version 1.0.3 of `pizza-pasta` contains malicious code as a install scripts. The package created folders in the system's Desktop and downloaded an image from `imgur.com`. The package also printed the users SSH keys to the console.RecommendationRemove the package from your environment. There are no evidences of further compromise.
|
[] |
CVE-2018-15846
|
An issue was discovered in fledrCMS through 2014-02-03. There is a CSRF vulnerability that can change the administrator's password via index.php?p=done&savedata=1.
|
[
"cpe:2.3:a:fledrcms_project:fledrcms:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-36915
|
nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies
|
In the Linux kernel, the following vulnerability has been resolved:
nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies
syzbot reported unsafe calls to copy_from_sockptr() [1]
Use copy_safe_from_sockptr() instead.
[1]
BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]
BUG: KASAN: slab-out-of-bounds in copy_from_sockptr include/linux/sockptr.h:55 [inline]
BUG: KASAN: slab-out-of-bounds in nfc_llcp_setsockopt+0x6c2/0x850 net/nfc/llcp_sock.c:255
Read of size 4 at addr ffff88801caa1ec3 by task syz-executor459/5078
CPU: 0 PID: 5078 Comm: syz-executor459 Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
print_address_description mm/kasan/report.c:377 [inline]
print_report+0x169/0x550 mm/kasan/report.c:488
kasan_report+0x143/0x180 mm/kasan/report.c:601
copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]
copy_from_sockptr include/linux/sockptr.h:55 [inline]
nfc_llcp_setsockopt+0x6c2/0x850 net/nfc/llcp_sock.c:255
do_sock_setsockopt+0x3b1/0x720 net/socket.c:2311
__sys_setsockopt+0x1ae/0x250 net/socket.c:2334
__do_sys_setsockopt net/socket.c:2343 [inline]
__se_sys_setsockopt net/socket.c:2340 [inline]
__x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340
do_syscall_64+0xfd/0x240
entry_SYSCALL_64_after_hwframe+0x6d/0x75
RIP: 0033:0x7f7fac07fd89
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 91 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fff660eb788 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f7fac07fd89
RDX: 0000000000000000 RSI: 0000000000000118 RDI: 0000000000000004
RBP: 0000000000000000 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000020000a80 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
|
[] |
CVE-2025-32246
|
WordPress 1-Click Backup & Restore Database <= 1.0.3 - Broken Access Control Vulnerability
|
Missing Authorization vulnerability in Tim Nguyen 1-Click Backup & Restore Database allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects 1-Click Backup & Restore Database: from n/a through 1.0.3.
|
[] |
GHSA-rj5h-39v8-hch3
|
The shellescape function in Vim 7.0 through 7.2, including 7.2a.10, allows user-assisted attackers to execute arbitrary code via the "!" (exclamation point) shell metacharacter in (1) the filename of a tar archive and possibly (2) the filename of the first file in a tar archive, which is not properly handled by the VIM TAR plugin (tar.vim) v.10 through v.22, as demonstrated by the shellescape, tarplugin.v2, tarplugin, and tarplugin.updated test cases. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2008-2712. NOTE: this issue has the same root cause as CVE-2008-3075. NOTE: due to the complexity of the associated disclosures and the incomplete information related to them, there may be inaccuracies in this CVE description and in external mappings to this identifier.
|
[] |
|
GHSA-cxgw-r5jg-7xwq
|
Code injection in grav
|
Grav is vulnerable to Server Side Template Injection via Twig. According to a previous vulnerability report, Twig should not render dangerous functions by default, such as system.
|
[] |
CVE-2016-10596
|
imageoptim is a Node.js wrapper for some images compression algorithms. imageoptim downloads zipped resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested tarball with an attacker controlled tarball if the attacker is on the network or positioned in between the user and the remote server.
|
[
"cpe:2.3:a:imageoptim_project:imageoptim:*:*:*:*:*:node.js:*:*"
] |
|
CVE-2007-3937
|
Multiple SQL injection vulnerabilities in A-shop 0.70 and earlier allow remote attackers to execute arbitrary SQL commands via unspecified vectors.
|
[
"cpe:2.3:a:a-shop:a-shop:*:*:*:*:*:*:*:*"
] |
|
GHSA-hhmx-45rr-9pcx
|
Unspecified vulnerability in the Oracle FLEXCUBE Universal Banking component in Oracle Financial Services Software 10.0.0 through 10.5.0 and 11.0.0 through 11.4.0 allows remote authenticated users to affect availability via unknown vectors related to Core.
|
[] |
|
CVE-2011-1689
|
Multiple cross-site scripting (XSS) vulnerabilities in Best Practical Solutions RT 2.0.0 through 3.6.10, 3.8.0 through 3.8.9, and 4.0.0rc through 4.0.0rc7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:bestpractical:rt:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.7:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.8:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.8:rc3:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.8:rc4:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.9:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.9:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.9:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.9:rc3:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc7:*:*:*:*:*:*"
] |
|
CVE-2012-2560
|
Directory traversal vulnerability in WellinTech KingView 6.53 allows remote attackers to read arbitrary files via a crafted HTTP request to port 8001.
|
[
"cpe:2.3:a:wellintech:kingview:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wellintech:kingview:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wellintech:kingview:6.5.30.2010.18018:*:*:*:*:*:*:*",
"cpe:2.3:a:wellintech:kingview:6.52:*:*:*:*:*:*:*",
"cpe:2.3:a:wellintech:kingview:65.30.2010.18018:*:*:*:*:*:*:*",
"cpe:2.3:a:wellintech:kingview:65.30.17249:*:*:*:*:*:*:*"
] |
|
GHSA-63w4-j7hq-v5qf
|
An issue was discovered in Lustre versions 2.13.x, 2.14.x, and 2.15.x before 2.15.4, allows attackers to escalate privileges and obtain sensitive information via Incorrect Access Control.
|
[] |
|
CVE-2023-25176
|
Pasteboard has an out-of-bounds read vulnerability
|
in OpenHarmony v3.2.4 and prior versions allow a local attacker cause information leak through out-of-bounds Read.
|
[
"cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*"
] |
GHSA-68gp-7m2f-pch3
|
Authentication Bypass Using an Alternate Path or Channel vulnerability in Envato Security Team Woffice allows Authentication Bypass.This issue affects Woffice: from n/a through 5.4.14.
|
[] |
|
GHSA-hv84-49c9-rmm6
|
Cross-Site Request Forgery (CSRF) vulnerability in Groundhogg Inc. Groundhogg plugin <= 2.7.11 versions.
|
[] |
|
CVE-2020-4369
|
IBM Verify Gateway (IVG) 1.0.0 and 1.0.1 stores highly sensitive information in cleartext that could be obtained by a user. IBM X-Force ID: 179004.
|
[
"cpe:2.3:a:ibm:verify_gateway:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:verify_gateway:1.0.1:*:*:*:*:*:*:*"
] |
|
CVE-2016-1458
|
The web-based GUI in Cisco Firepower Management Center 4.x and 5.x before 5.3.0.3, 5.3.1.x before 5.3.1.2, and 5.4.x before 5.4.0.1 and Cisco Adaptive Security Appliance (ASA) Software on 5500-X devices with FirePOWER Services 4.x and 5.x before 5.3.0.3, 5.3.1.x before 5.3.1.2, and 5.4.x before 5.4.0.1 allows remote authenticated users to increase user-account privileges via crafted HTTP requests, aka Bug ID CSCur25483.
|
[
"cpe:2.3:a:cisco:secure_firewall_management_center:4.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0:*:*:*:*:*:*:*"
] |
|
CVE-2022-45840
|
WordPress Auto Affiliate Links plugin <= 6.2.1.5 - Unauth. Broken Access Control vulnerability
|
Missing Authorization vulnerability in Lucian Apostol Auto Affiliate Links allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Auto Affiliate Links: from n/a through 6.2.1.5.
|
[] |
GHSA-8f6g-63pm-5fmx
|
The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below uses poor session management, allowing for an unauthenticated attacker to access administrator functionality if any other user is already signed in.
|
[] |
|
GHSA-g883-f564-phwg
|
Directory traversal vulnerability in website.php in Web 2 Business (W2B) phpDatingClub (aka Dating Club) 3.7 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the page parameter.
|
[] |
|
GHSA-293p-8p8x-wx39
|
SmarterTools SmarterStats 6.2.4100 generates web pages containing external links in response to GET requests with query strings for frmGettingStarted.aspx, which makes it easier for remote attackers to obtain sensitive information by reading (1) web-server access logs or (2) web-server Referer logs, related to a "cross-domain Referer leakage" issue.
|
[] |
|
CVE-2020-4413
|
IBM Security Secret Server 10.7 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 179988.
|
[
"cpe:2.3:a:ibm:security_secret_server:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-24082
|
Microsoft Excel Remote Code Execution Vulnerability
|
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
|
[] |
GHSA-q3fc-6x2v-6ph8
|
kernel/sched/fair.c in the Linux kernel before 5.3.9, when cpu.cfs_quota_us is used (e.g., with Kubernetes), allows attackers to cause a denial of service against non-cpu-bound applications by generating a workload that triggers unwanted slice expiration, aka CID-de53fd7aedb1. (In other words, although this slice expiration would typically be seen with benign workloads, it is possible that an attacker could calculate how many stray requests are required to force an entire Kubernetes cluster into a low-performance state caused by slice expiration, and ensure that a DDoS attack sent that number of stray requests. An attack does not affect the stability of the kernel; it only causes mismanagement of application execution.)
|
[] |
|
CVE-2022-25754
|
A vulnerability has been identified in SCALANCE X302-7 EEC (230V), SCALANCE X302-7 EEC (230V, coated), SCALANCE X302-7 EEC (24V), SCALANCE X302-7 EEC (24V, coated), SCALANCE X302-7 EEC (2x 230V), SCALANCE X302-7 EEC (2x 230V, coated), SCALANCE X302-7 EEC (2x 24V), SCALANCE X302-7 EEC (2x 24V, coated), SCALANCE X304-2FE, SCALANCE X306-1LD FE, SCALANCE X307-2 EEC (230V), SCALANCE X307-2 EEC (230V, coated), SCALANCE X307-2 EEC (24V), SCALANCE X307-2 EEC (24V, coated), SCALANCE X307-2 EEC (2x 230V), SCALANCE X307-2 EEC (2x 230V, coated), SCALANCE X307-2 EEC (2x 24V), SCALANCE X307-2 EEC (2x 24V, coated), SCALANCE X307-3, SCALANCE X307-3, SCALANCE X307-3LD, SCALANCE X307-3LD, SCALANCE X308-2, SCALANCE X308-2, SCALANCE X308-2LD, SCALANCE X308-2LD, SCALANCE X308-2LH, SCALANCE X308-2LH, SCALANCE X308-2LH+, SCALANCE X308-2LH+, SCALANCE X308-2M, SCALANCE X308-2M, SCALANCE X308-2M PoE, SCALANCE X308-2M PoE, SCALANCE X308-2M TS, SCALANCE X308-2M TS, SCALANCE X310, SCALANCE X310, SCALANCE X310FE, SCALANCE X310FE, SCALANCE X320-1 FE, SCALANCE X320-1-2LD FE, SCALANCE X408-2, SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M TS (24V), SCALANCE XR324-12M TS (24V), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M PoE (230V, ports on front), SCALANCE XR324-4M PoE (230V, ports on rear), SCALANCE XR324-4M PoE (24V, ports on front), SCALANCE XR324-4M PoE (24V, ports on rear), SCALANCE XR324-4M PoE TS (24V, ports on front), SIPLUS NET SCALANCE X308-2. The integrated web server of the affected device could allow remote attackers to perform actions with the permissions of a victim user, provided the victim user has an active session and is induced to trigger the malicious request.
|
[
"cpe:2.3:o:siemens:scalance_x302-7eec_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x302-7eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x304-2fe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x304-2fe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x306-1ldfe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x306-1ldfe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x307-2eec_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x307-2eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x307-3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x307-3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x307-3ld_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x307-3ld:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x308-2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x308-2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x308-2ld_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x308-2ld:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x308-2lh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x308-2lh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x308-2lh\\+_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x308-2lh\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x308-2m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x308-2m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x308-2m_poe_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x308-2m_poe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x308-2m_ts_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x308-2m_ts:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x310_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x310fe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x310fe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x320-1fe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x320-1fe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x320-1-2ldfe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x320-1-2ldfe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x408-2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x408-2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xr324-4m_eec_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xr324-4m_eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xr324-4m_poe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xr324-4m_poe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xr324-4m_poe_ts_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xr324-4m_poe_ts:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xr324-12m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xr324-12m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xr324-12m_ts_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xr324-12m_ts:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_net_scalance_x308-2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_net_scalance_x308-2:-:*:*:*:*:*:*:*"
] |
|
GHSA-3hjf-m6vc-vh7h
|
In the Linux kernel, the following vulnerability has been resolved:btrfs: don't BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc()We handle errors here properly, ENOMEM isn't fatal, return the error.
|
[] |
|
GHSA-56c4-xfp5-vm9q
|
members.asp in Snitz Forums 2000 version 3.3.03 and earlier allows remote attackers to execute arbitrary code via a SQL injection attack on the parameters (1) M_NAME, (2) UserName, (3) FirstName, (4) LastName, or (5) INITIAL.
|
[] |
|
GHSA-rg7m-x7gx-hg4q
|
OURPHP <= 7.2.0 is vulnerable to Cross Site Scripting (XSS) via ourphp_tz.php.
|
[] |
|
GHSA-px37-jpqx-97q9
|
AWS SAM CLI Path Traversal allows file copy to build container
|
SummaryThe [AWS Serverless Application Model Command Line Interface (AWS SAM CLI)](https://docs.aws.amazon.com/serverless-application-model/latest/developerguide/using-sam-cli.html) is an open-source CLI tool that helps Lambda developers to build and develop Lambda applications locally on their computers using Docker.When running the AWS SAM CLI build process with Docker and symlinks are included in the build files, the container environment allows a user to access privileged files on the host by leveraging the elevated permissions granted to the tool. A user could leverage the elevated permissions to access restricted files via symlinks and copy them to a more permissive location on the container.Users should [upgrade to v1.133.0](https://docs.aws.amazon.com/serverless-application-model/latest/developerguide/manage-sam-cli-versions.html#manage-sam-cli-versions-upgrade) or newer and ensure any forked or derivative code is patched to incorporate the new fixes.ImpactThis issue is limited to the local workspace and does not affect AWS services, production environments or cross-account resources. The issue only affects local workspaces using AWS SAM CLI with container builds (--use-container), potentially allowing access to local files outside the build directory through the usage of symlinks.**Impacted versions:** <= AWS SAM CLI v1.132.0PatchesThe issue has been addressed in version 1.133.0. Users should upgrade and ensure any forked or derivative code is patched to incorporate the new fixes. To retain the previous behavior and allow symlinks to resolve on the host machine, please use the explicit '-[-mount-symlinks](https://docs.aws.amazon.com/serverless-application-model/latest/developerguide/sam-cli-command-reference-sam-build.html#ref-sam-cli-build-options-mount-symlinks)' parameter.WorkaroundsThere is no recommended work around. Customers are advised to upgrade to version v1.133.0 or the latest version.ReferencesCVE-2025-3047If you have any questions or comments about this advisory we ask that you contact AWS/Amazon Security via our [vulnerability reporting page](https://aws.amazon.com/security/vulnerability-reporting) or directly via email to [[email protected]](mailto:[email protected]). Please do not create a public GitHub issue.CreditWe would like to thank [Kevin Backhouse](https://github.com/kevinbackhouse) with the GitHub Security Lab for collaborating on this issue through the coordinated vulnerability disclosure process.
|
[] |
CVE-2021-38326
|
Post Title Counter <= 1.1 Reflected Cross-Site Scripting
|
The Post Title Counter WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the notice parameter found in the ~/post-title-counter.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.1.
|
[
"cpe:2.3:a:wpleet:post_title_counter:*:*:*:*:*:wordpress:*:*"
] |
GHSA-x93g-j874-2hqr
|
module.php in ezContents 2.0.3 allows remote attackers to bypass the directory traversal protection mechanism to include and execute arbitrary local files via "....//" (doubled dot dot slash) sequences in the link parameter, which is not properly filtered using the str_replace function.
|
[] |
|
GHSA-vff5-hhxw-cqp5
|
Cross-Site Request Forgery (CSRF) in WPVibes WP Mail Log plugin <= 1.0.1 versions.
|
[] |
|
GHSA-j8g9-739h-g466
|
SonicWall SMA1000 series firmware 12.4.0, 12.4.1-02965 and earlier versions accept a user-controlled input that specifies a link to an external site and uses that link in a redirect which leads to Open redirection vulnerability.
|
[] |
|
CVE-2015-0052
|
Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0027, CVE-2015-0035, CVE-2015-0039, and CVE-2015-0068.
|
[
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] |
|
GHSA-6fcq-8rv2-rc2j
|
A SQL Injection vulnerability exists in the updateServiceHost functionality in Centreon Web 24.04.x before 24.04.3, 23.10.x before 23.10.13, 23.04.x before 23.04.19, and 22.10.x before 22.10.23.
|
[] |
|
CVE-2025-27701
|
In the function process_crypto_cmd, the values of ptrs[i] can be potentially equal to NULL which is valid value after calling slice_map_array(). Later this values will be derefenced without prior NULL check, which can lead to local Temporary DoS or OOB Read, leading to information disclosure.
|
[] |
|
GHSA-jhvw-wg26-wj9c
|
The CVS 1.10.8 server does not properly restrict users from creating arbitrary Checkin.prog or Update.prog programs, which allows remote CVS committers to modify or create Trojan horse programs with the Checkin.prog or Update.prog names, then performing a CVS commit action.
|
[] |
|
CVE-2023-20597
|
Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.
|
[
"cpe:2.3:o:amd:ryzen_3_3100_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3100_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3200g_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3200g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3200g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3200ge_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3200ge_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3200ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3200u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3200u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3250c_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3250c_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3250c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3250u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3250u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3300_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3300_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3300g_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3300g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3300u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3300u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3300x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3300x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3350u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3350u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3450u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3450u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3450u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3500c_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3500c_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3500c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3500u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3500u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3500u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3550h_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3550h_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3550h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3580u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3580u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3580u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3700c_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3700c_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3700c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3700u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3700u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3700u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3750h_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3750h_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3750h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3780u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3780u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3780u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3100_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3100_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3300x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3300x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3300x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3500_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3500_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3500x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3500x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3500x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3600x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600xt_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600xt_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3600xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3800x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3800x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3800x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3800xt_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3800xt_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3800xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3900x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900xt_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900xt_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3900xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3945wx_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3945wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3945wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3950x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3950x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3950x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3955wx_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3955wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3955wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3960x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3960x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3960x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3970x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3970x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3970x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3975wx_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3975wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3975wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3990x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3990x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3990x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3995wx_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3995wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3995wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5500_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5500u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5560u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600ge_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600h_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600hs_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600x3d_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600x3d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5625c_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5625u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5700g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5700ge_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5300g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5300g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5300ge_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5300ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5500_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5600_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5600g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5600g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5600ge_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5600ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5600x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5600x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5700g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5700g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5700ge_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5700ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5700x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5700x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5800_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5800x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5800x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5800x3d_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5800x3d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5900_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5900x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5900x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5945wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5945wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5950x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5950x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5955wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5955wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5965wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5965wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5975wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5975wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5995wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5995wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:castlepeakpi-sp3r3_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:castlepeakpi-sp3r3_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:castlepeakpi-sp3r3_1.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3795wx_firmware:castlepeakwspi-swrx8_1.0.0.a:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3795wx_firmware:chagallwspi-swrx8_1.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3795wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:castlepeakwspi-swrx8_1.0.0.a:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:chagallwspi-swrx8_1.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:castlepeakwspi-swrx8_1.0.0.a:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:chagallwspi-swrx8_1.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:castlepeakwspi-swrx8_1.0.0.a:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:chagallwspi-swrx8_1.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:castlepeakwspi-swrx8_1.0.0.a:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:chagallwspi-swrx8_1.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_4300g_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_4300g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_4300ge_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_4300ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_4600g_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_4600g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_4600ge_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_4600ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_4700g_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_4700g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_4700ge_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_4700ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_4700s_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_4700s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5500_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5500u_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5560u_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600g_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600ge_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600h_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600hs_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600u_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600x_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600x3d_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5625c_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5625u_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5700g_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5700ge_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5300g_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5300ge_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5500_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5600_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5600g_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5600ge_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5600x_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5700g_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5700ge_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5700x_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5800_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5800x_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5800x3d_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5900_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5900x_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5945wx_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5950x_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5955wx_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5965wx_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5975wx_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5995wx_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_6600h_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_6600h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_6600hs_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_6600hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_6600u_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_6600u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_6800h_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_6800h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_6800hs_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_6800hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_6800u_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_6800u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_6900hs_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_6900hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_6900hx_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_6900hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_6980hs_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_6980hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_6980hx_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_6980hx:-:*:*:*:*:*:*:*"
] |
|
GHSA-cjw9-x8qr-5wpf
|
In the Linux kernel, the following vulnerability has been resolved:block: fix adding folio to bio4GB folio is possible on some ARCHs, such as aarch64, 16GB hugepage
is supported, then 'offset' of folio can't be held in 'unsigned int',
cause warning in bio_add_folio_nofail() and IO failure.Fix it by adjusting 'page' & trimming 'offset' so that `->bi_offset` won't
be overflow, and folio can be added to bio successfully.
|
[] |
|
CVE-2015-0123
|
Cross-site scripting (XSS) vulnerability in IBM Rational Team Concert 2.x and 3.x before 3.0.1.6 iFix 5, 4.x before 4.0.7 iFix3, and 5.x before 5.0.2 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL, a different vulnerability than CVE-2015-0122.
|
[
"cpe:2.3:a:ibm:rational_team_concert:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:3.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:3.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:3.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:3.0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:3.0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:3.0.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:5.0.1:*:*:*:*:*:*:*"
] |
|
GHSA-x59p-gvr8-w8pq
|
SmartDNS through 41 before 56d0332 allows an out-of-bounds write because of a stack-based buffer overflow in the _dns_encode_domain function in the dns.c file, via a crafted DNS request.
|
[] |
|
CVE-2008-3013
|
gdiplus.dll in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a malformed GIF image file containing many extension markers for graphic control extensions and subsequent unknown labels, aka "GDI+ GIF Parsing Vulnerability."
|
[
"cpe:2.3:a:microsoft:digital_image_suite:2006:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:forefront_client_security:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2007:*:gold:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2007:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:powerpoint_viewer:2003:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:report_viewer:2005:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:report_viewer:2008:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:2005:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server_reporting_services:2000:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visio:2002:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:works:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:gold:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*"
] |
|
CVE-2021-32646
|
Escalation of permissions in roomer
|
Roomer is a discord bot cog (extension) which provides automatic voice channel generation as well as private voice and text channels. A vulnerability has been discovered allowing discord users to get the ``manage channel`` permissions in a private VC they have joined. This allowed them to make changes to or delete the voice channel they have taken over. The exploit does not allow access or control to any other channels in the server. Upgrade to version 1.0.1 for a patched version of the cog. As a workaround you may disable private VCs in your guild(server) or unload the roomer cog to render the exploit unusable.
|
[
"cpe:2.3:a:dav-cogs_project:dav-cogs:*:*:*:*:*:*:*:*"
] |
CVE-2024-10522
|
Co-marquage service-public.fr <= 0.5.76 - Reflected Cross-Site Scripting via add_query_arg Parameter
|
The Co-marquage service-public.fr plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 0.5.76. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[] |
CVE-2008-1932
|
Integer overflow in Realtek HD Audio Codec Drivers RTKVHDA.sys and RTKVHDA64.sys before 6.0.1.5605 on Windows Vista allows local users to execute arbitrary code via a crafted IOCTL request.
|
[
"cpe:2.3:o:microsoft:windows-nt:vista:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*",
"cpe:2.3:a:realtek:hd_audio_codec_drivers:*:*:*:*:*:*:*:*"
] |
|
GHSA-vpxp-73pv-cfjp
|
Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.
|
[] |
|
GHSA-7x7c-8qxj-65f3
|
An issue was discovered in Hola 1.79.859. An unprivileged user could modify or overwrite the executable with arbitrary code, which would be executed the next time the service is started. Depending on the user that the service runs as, this could result in privilege escalation. The issue exists because of the SERVICE_ALL_ACCESS access right for the hola_svc and hola_updater services.
|
[] |
|
GHSA-j296-wq49-8c3x
|
Architectural Information System 1.0 and earlier versions have a Stack-based buffer overflow, allows remote attackers to execute arbitrary code.
|
[] |
|
GHSA-q6q9-w26g-c8vj
|
WebKit in Apple iOS before 9.3 and Safari before 9.1 does not properly restrict redirects that specify a TCP port number, which allows remote attackers to bypass intended port restrictions via a crafted web site.
|
[] |
|
GHSA-mhpv-hfp2-2648
|
Uncontrolled Resource Consumption vulnerability in Mitsubishi Electric MELSEC iQ-R series CPU modules (R00/01/02CPU all versions, R04/08/16/32/120(EN)CPU all versions, R08/16/32/120SFCPU all versions, R08/16/32/120PCPU all versions, R08/16/32/120PSFCPU all versions) allows a remote unauthenticated attacker to prevent legitimate clients from connecting to the MELSOFT transmission port (TCP/IP) by not closing a connection properly, which may lead to a denial of service (DoS) condition.
|
[] |
|
GHSA-m2w6-vm64-rvfq
|
Rejected reason: Not used
|
[] |
|
CVE-2021-22659
|
Rockwell Automation MicroLogix 1400 Version 21.6 and below may allow a remote unauthenticated attacker to send a specially crafted Modbus packet allowing the attacker to retrieve or modify random values in the register. If successfully exploited, this may lead to a buffer overflow resulting in a denial-of-service condition. The FAULT LED will flash RED and communications may be lost. Recovery from denial-of-service condition requires the fault to be cleared by the user.
|
[
"cpe:2.3:o:rockwellautomation:micrologix_1400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:micrologix_1400:-:*:*:*:*:*:*:*"
] |
|
CVE-2022-28247
|
Adobe Acrobat Uninstaller Hard Link Leads To Remote Code Execution
|
Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an uncontrolled search path vulnerability that could lead to local privilege escalation. Exploitation of this issue requires user interaction in that a victim must run the uninstaller with Admin privileges.
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*"
] |
GHSA-cc62-496p-hrr7
|
Exposure of Sensitive Information to an Unauthorized Actor in JGroup
|
The DiagnosticsHandler in JGroup 3.0.x, 3.1.x, 3.2.x before 3.2.9, and 3.3.x before 3.3.3 allows remote attackers to obtain sensitive information (diagnostic information) and execute arbitrary code by reusing valid credentials.
|
[] |
GHSA-p84j-ggc3-5x2h
|
A vulnerability was found in H3C GR-5400AX up to 100R008 and classified as critical. Affected by this issue is the function EditWlanMacList of the file /routing/goform/aspForm. The manipulation of the argument param leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] |
|
CVE-2018-20357
|
A NULL pointer dereference was discovered in sbr_process_channel of libfaad/sbr_dec.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash.
|
[
"cpe:2.3:a:audiocoding:freeware_advanced_audio_decoder_2:2.8.8:*:*:*:*:*:*:*"
] |
|
GHSA-95h8-rh3v-c2mf
|
SafeDisc installs the driver service for the secdrv.sys driver with insecure permissions, which allows local users to gain privileges by changing the configuration to reference a malicious program.
|
[] |
|
GHSA-9h4r-gpqc-r78x
|
Use-after-free vulnerability in the _gnutls_handshake_hash_buffers_clear function in lib/gnutls_handshake.c in libgnutls in GnuTLS 2.3.5 through 2.4.0 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via TLS transmission of data that is improperly used when the peer calls gnutls_handshake within a normal session, leading to attempted access to a deallocated libgcrypt handle.
|
[] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.