id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
listlengths
0
5.42k
GHSA-pvw4-3rwc-f79f
Multiple unspecified vulnerabilities in Epiware before 4.7.5 have unknown impact and attack vectors, possibly related to cross-site scripting (XSS) and other unspecified issues.
[]
CVE-2024-11422
DWFX File Parsing Vulnerabilities in Autodesk Navisworks Desktop Software
A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, may force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
[]
CVE-2022-26059
Delta Electronics DIAEnergie SQL Injection in GetQueryData
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability that exists in GetQueryData. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.
[ "cpe:2.3:a:deltaww:diaenergie:*:*:*:*:*:*:*:*" ]
CVE-2024-33013
Buffer Over-read in WLAN Host
Transient DOS when driver accesses the ML IE memory and offset value is incremented beyond ML IE length.
[ "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:immersive_home_214_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:immersive_home_216_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:immersive_home_316_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:immersive_home_318_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:immersive_home_3210_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:immersive_home_326_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq5010_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq5028_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq5300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq5302_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq5312_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq5332_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq6000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq6010_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq6028_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8070a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8071a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8072a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8074a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8076_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8076a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8078_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8078a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8173_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8174_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq9008_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq9554_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq9574_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca4024_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6554a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8075_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8082_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8084_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8085_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8386_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9367_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9888_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9889_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcc2073_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcc2076_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcf8000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcf8001_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5022_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5024_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5052_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5122_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5124_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5152_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5154_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn5164_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6023_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6112_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6122_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6132_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6402_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6412_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6422_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn6432_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9022_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9072_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9160_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9274_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qxm8083_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:robotics_rb5_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx65m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_x72_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:srv1l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:vision_intelligence_400_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:vision_intelligence_400_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr2250p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr1230p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ssg2125p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ssg2115p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:srv1m:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:srv1l:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:srv1h:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_x72_5g_modem-rf_system:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1_platform:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8_gen_3_mobile_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx65m:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sc8380xp:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8775p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8770p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8650p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8620p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa7775p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa7255p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa4150p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:robotics_rb5_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qxm8083:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:video_collaboration_vc5_platform:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:video_collaboration_vc3_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs8250:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs7230:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs5430:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9274:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9160:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9100:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9072:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9070:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9022:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9000:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6432:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6422:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6412:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6402:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6132:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6122:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6112:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn6023:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5164:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5154:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5152:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5124:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5122:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5052:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5024:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn5022:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm5430:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcf8001:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcf8000:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcc2076:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcc2073:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9889:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9888:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9367:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8386:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8085:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8084:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8082:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8075:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6797aq:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6688aq:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6678aq:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6554a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca4024:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qamsrv1m:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qamsrv1h:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qam8620p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9628:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq9574:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq9554:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq9008:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8174:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8173:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8078a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8078:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8076a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8076:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8074a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8072a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8071a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8070a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq6028:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq6010:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq6000:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq5332:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq5312:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq5302:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq5300:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq5028:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq5010:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:immersive_home_326_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:immersive_home_3210_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:immersive_home_318_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:immersive_home_316_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:immersive_home_216_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:immersive_home_214_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:flight_rb5_5g_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:csr8811:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*" ]
CVE-2007-0480
Cisco IOS 9.x, 10.x, 11.x, and 12.x and IOS XR 2.0.x, 3.0.x, and 3.2.x allows remote attackers to cause a denial of service or execute arbitrary code via a crafted IP option in the IP header in a (1) ICMP, (2) PIMv2, (3) PGM, or (4) URD packet.
[ "cpe:2.3:h:cisco:ios_transmission_control_protocol:12:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0da:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0db:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0dc:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0s:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0sc:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0sl:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0sp:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0st:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0sx:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0sy:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0sz:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0t:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0w:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0wc:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0wt:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xa:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xb:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xc:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xd:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xe:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xf:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xg:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xh:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xi:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xj:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xk:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xl:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xm:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xq:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xr:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xs:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xv:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.0xw:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1aa:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ax:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ay:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1az:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1cx:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1da:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1db:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1dc:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1e:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ea:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1eb:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ec:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1eo:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1eu:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ev:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ew:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ex:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ey:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ez:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1t:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1x:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xa:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xb:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xc:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xd:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xe:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xf:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xg:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xh:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xi:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xj:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xl:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xp:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xq:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xr:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xs:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xt:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xu:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xv:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xw:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xx:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xy:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1xz:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ya:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yb:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yc:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yd:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1ye:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yf:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yh:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yi:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.1yj:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2b:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2bc:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2bw:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2by:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2bz:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2cx:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2cy:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2cz:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2da:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2dd:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2dx:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2eu:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ew:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ewa:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ex:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ey:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ez:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2fx:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2fy:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2fz:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ixa:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ixb:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ixc:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ja:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2jk:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2mb:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2mc:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2s:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sb:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sbc:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2se:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sea:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2seb:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sec:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sed:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2see:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sef:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2seg:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sg:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sga:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2so:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sra:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2srb:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2su:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sv:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sw:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sx:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sxa:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sxb:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sxd:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sxe:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sxf:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sy:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2sz:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2t:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2tpc:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xa:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xb:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xc:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xd:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xe:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xf:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xg:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xh:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xi:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xj:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xk:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xl:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xm:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xn:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xq:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xr:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xs:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xt:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xu:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xv:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2xw:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ya:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yb:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yc:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yd:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ye:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yf:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yg:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yh:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yj:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yk:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yl:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ym:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yn:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yo:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yp:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yq:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yr:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ys:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yt:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yu:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yv:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yw:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yx:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yy:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2yz:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2za:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zb:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zc:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zd:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2ze:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zf:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zg:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zh:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zj:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zl:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zn:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.2zp:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3b:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3bc:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3bw:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3ja:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3jea:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3jeb:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3jk:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3jx:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3t:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3tpc:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xa:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xb:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xc:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xd:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xe:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xf:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xg:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xh:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xi:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xj:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xk:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xq:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xr:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xs:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xu:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xw:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xx:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3xy:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3ya:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yd:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yf:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yg:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yh:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yi:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yj:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yk:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3ym:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yq:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3ys:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yt:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yu:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yx:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.3yz:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.4:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.4mr:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.4sw:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.4t:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.4xa:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.4xb:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ios_transmission_control_protocol:12.4xc:*:*:*:*:*:*:*" ]
CVE-2005-2777
Looking Glass 20040427 allows remote attackers to execute arbitrary commands via shell metacharacters in the DNS lookup query field.
[ "cpe:2.3:a:looking_glass:looking_glass:2004-04-27:*:*:*:*:*:*:*" ]
GHSA-c382-6838-fr3r
Delta Electronics DTN Soft version 2.0.1 and prior are vulnerable to an attacker achieving remote code execution through a deserialization of untrusted data vulnerability.
[]
CVE-2022-41032
NuGet Client Elevation of Privilege Vulnerability
NuGet Client Elevation of Privilege Vulnerability
[ "cpe:2.3:a:microsoft:.net:6.0.0:-:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_core:3.1:-:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:-:*:*", "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:macos:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*" ]
CVE-2025-30448
This issue was addressed with additional entitlement checks. This issue is fixed in macOS Sonoma 14.7.6, iPadOS 17.7.7, iOS 18.5 and iPadOS 18.5, visionOS 2.5, macOS Ventura 13.7.6, macOS Sequoia 15.4. An attacker may be able to turn on sharing of an iCloud folder without authentication.
[]
CVE-2019-12210
In Yubico pam-u2f 1.0.7, when configured with debug and a custom debug log file is set using debug_file, that file descriptor is not closed when a new process is spawned. This leads to the file descriptor being inherited into the child process; the child process can then read from and write to it. This can leak sensitive information and also, if written to, be used to fill the disk or plant misinformation.
[ "cpe:2.3:a:yubico:pam-u2f:1.0.7:*:*:*:*:*:*:*" ]
CVE-2019-1268
An elevation of privilege exists when Winlogon does not properly handle file path information, aka 'Winlogon Elevation of Privilege Vulnerability'.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
CVE-2005-2676
Cross-site scripting (XSS) vulnerability in displayimage.php in Coppermine Photo Gallery before 1.3.4 allows remote attackers to inject arbitrary web script or HTML via EXIF data.
[ "cpe:2.3:a:coppermine:coppermine_photo_gallery:1.0_rc3:*:*:*:*:*:*:*", "cpe:2.3:a:coppermine:coppermine_photo_gallery:1.1_.0:*:*:*:*:*:*:*", "cpe:2.3:a:coppermine:coppermine_photo_gallery:1.1_beta_2:*:*:*:*:*:*:*", "cpe:2.3:a:coppermine:coppermine_photo_gallery:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:coppermine:coppermine_photo_gallery:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:coppermine:coppermine_photo_gallery:1.2.2_b:*:*:*:*:*:*:*", "cpe:2.3:a:coppermine:coppermine_photo_gallery:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:coppermine:coppermine_photo_gallery:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:coppermine:coppermine_photo_gallery:1.3.3:*:*:*:*:*:*:*" ]
GHSA-5pm5-4gmv-q7c9
Improper boundary checks in petite.c in Clam AntiVirus (ClamAV) before 0.87.1 allows attackers to perform unknown attacks via unknown vectors.
[]
GHSA-pwcf-p9qx-3948
The QMP migrate command in QEMU version 4.0.0 and earlier is vulnerable to OS command injection, which allows the remote attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server.
[]
GHSA-657p-3992-5r6w
In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service targeting the build information request validation.
[]
CVE-2009-5086
Cross-site scripting (XSS) vulnerability in Appliance Configuration Manager (ACM) in Juniper IDP 4.1 before 4.1r3 and 4.2 before 4.2r1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:juniper:idp:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:juniper:idp:4.1r1:*:*:*:*:*:*:*", "cpe:2.3:a:juniper:idp:4.1r2:*:*:*:*:*:*:*", "cpe:2.3:a:juniper:idp:4.2:*:*:*:*:*:*:*" ]
CVE-2011-5291
The SaveData method in the Cygnicon.ViewControl.1 ActiveX control in CyViewer.ocx in Ashampoo 3D CAD Professional 3.x before 3.0.2 allows remote attackers to write to arbitrary files via a pathname in the first argument.
[ "cpe:2.3:a:ashampoo_gmbh_\\&_co.:ashampoo_3d_cad_professional_3:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ashampoo_gmbh_\\&_co.:ashampoo_3d_cad_professional_3:3.0.1:*:*:*:*:*:*:*" ]
GHSA-2wmg-hcwc-fx57
The Open Microscopy Environment OMERO.server version 5.4.0 to 5.4.6 contains an Improper Access Control vulnerability in User management that can result in administrative user with privilege restrictions logging in as a more powerful administrator. This attack appear to be exploitable via Use user administration privilege to set the password of a more powerful administrator. This vulnerability appears to have been fixed in 5.4.7.
[]
CVE-2000-0704
Buffer overflow in SGI Omron WorldView Wnn allows remote attackers to execute arbitrary commands via long JS_OPEN, JS_MKDIR, or JS_FILE_INFO commands.
[ "cpe:2.3:a:freewnn:freewnn:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:freewnn:freewnn:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:freewnn:freewnn:1.1.1_axxx:*:*:*:*:*:*:*", "cpe:2.3:a:omron:worldview:6.5:*:*:*:*:*:*:*", "cpe:2.3:a:wnn:wnn4:4.2.2tl:*:*:*:*:*:*:*", "cpe:2.3:a:wnn:wnn4:4.2.5tl:*:*:*:*:*:*:*", "cpe:2.3:a:wnn:wnn4:4.2.8:*:*:*:*:*:*:*" ]
GHSA-4x89-mjpg-vp94
An issue was discovered in the Linux kernel through 5.11.x. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation is not correctly accounted for when restricting subsequent operations.
[]
GHSA-frp9-x49w-7c4w
Symphony 2.6.9 has XSS in publish/notes/edit/##/saved/ via the bottom form field.
[]
GHSA-p892-cj2f-7wjx
Keep-alive vulnerability in the sticky broadcast mechanism. Successful exploitation of this vulnerability may cause malicious apps to run continuously in the background.
[]
CVE-2024-30367
Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability
Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23013.
[ "cpe:2.3:a:foxit:pdf_reader:-:*:*:*:*:*:*:*", "cpe:2.3:a:foxit:pdf_editor:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:foxit:pdf_editor:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:foxit:pdf_editor:13.0:*:*:*:*:*:*:*", "cpe:2.3:a:foxit:pdf_editor:2023.0:*:*:*:*:*:*:*" ]
CVE-2024-32830
WordPress buddyforms plugin <= 2.8.8- Arbitrary File Read and SSRF vulnerability
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ThemeKraft BuddyForms allows Server Side Request Forgery, Relative Path Traversal.This issue affects BuddyForms: from n/a through 2.8.8.
[]
CVE-2024-56497
An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiMail versions 7.2.0 through 7.2.4 and 7.0.0 through 7.0.6 and 6.4.0 through 6.4.7, FortiRecorder versions 7.0.0 and 6.4.0 through 6.4.4 allows attacker to execute unauthorized code or commands via the CLI.
[ "cpe:2.3:a:fortinet:fortimail:7.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:7.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:7.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:7.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:7.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:6.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:6.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:6.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:6.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:6.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:6.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:6.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:6.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortirecorder:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortirecorder:6.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortirecorder:6.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortirecorder:6.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortirecorder:6.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortirecorder:6.4.0:*:*:*:*:*:*:*" ]
CVE-2024-35266
Azure DevOps Server Spoofing Vulnerability
Azure DevOps Server Spoofing Vulnerability
[ "cpe:2.3:o:microsoft:azure_devops_server:2022.1.0:*:*:*:*:*:*:*" ]
CVE-2024-47371
WordPress WP MyLinks plugin<= 1.0.6 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Walter Pinem WP MyLinks allows Stored XSS.This issue affects WP MyLinks: from n/a through 1.0.6.
[]
GHSA-wrch-r746-jf7c
In the Linux kernel, the following vulnerability has been resolved:fs/ntfs3: Keep write operations atomicsyzbot reported a NULL pointer dereference in __generic_file_write_iter. [1]Before the write operation is completed, the user executes ioctl[2] to clear the compress flag of the file, which causes the is_compressed() judgment to return 0, further causing the program to enter the wrong process and call the wrong ops ntfs_aops_cmpr, which triggers the null pointer dereference of write_begin.Use inode lock to synchronize ioctl and write to avoid this case.[1] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000 Mem abort info: ESR = 0x0000000086000006 EC = 0x21: IABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x06: level 2 translation fault user pgtable: 4k pages, 48-bit VAs, pgdp=000000011896d000 [0000000000000000] pgd=0800000118b44403, p4d=0800000118b44403, pud=0800000117517403, pmd=0000000000000000 Internal error: Oops: 0000000086000006 [#1] PREEMPT SMP Modules linked in: CPU: 0 UID: 0 PID: 6427 Comm: syz-executor347 Not tainted 6.13.0-rc3-syzkaller-g573067a5a685 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : 0x0 lr : generic_perform_write+0x29c/0x868 mm/filemap.c:4055 sp : ffff80009d4978a0 x29: ffff80009d4979c0 x28: dfff800000000000 x27: ffff80009d497bc8 x26: 0000000000000000 x25: ffff80009d497960 x24: ffff80008ba71c68 x23: 0000000000000000 x22: ffff0000c655dac0 x21: 0000000000001000 x20: 000000000000000c x19: 1ffff00013a92f2c x18: ffff0000e183aa1c x17: 0004060000000014 x16: ffff800083275834 x15: 0000000000000001 x14: 0000000000000000 x13: 0000000000000001 x12: ffff0000c655dac0 x11: 0000000000ff0100 x10: 0000000000ff0100 x9 : 0000000000000000 x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000 x5 : ffff80009d497980 x4 : ffff80009d497960 x3 : 0000000000001000 x2 : 0000000000000000 x1 : ffff0000e183a928 x0 : ffff0000d60b0fc0 Call trace: 0x0 (P) __generic_file_write_iter+0xfc/0x204 mm/filemap.c:4156 ntfs_file_write_iter+0x54c/0x630 fs/ntfs3/file.c:1267 new_sync_write fs/read_write.c:586 [inline] vfs_write+0x920/0xcf4 fs/read_write.c:679 ksys_write+0x15c/0x26c fs/read_write.c:731 __do_sys_write fs/read_write.c:742 [inline] __se_sys_write fs/read_write.c:739 [inline] __arm64_sys_write+0x7c/0x90 fs/read_write.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:744 el0t_64_sync_handler+0x84/0x108 arch/arm64/kernel/entry-common.c:762[2] ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x20)
[]
CVE-2025-2304
Camaleon CMS Privilege Escalation
A Privilege Escalation through a Mass Assignment exists in Camaleon CMS When a user wishes to change his password, the 'updated_ajax' method of the UsersController is called. The vulnerability stems from the use of the dangerous permit! method, which allows all parameters to pass through without any filtering.
[]
CVE-2011-0961
Cross-site scripting (XSS) vulnerability in cwhp/device.center.do in the Help servlet in Cisco CiscoWorks Common Services 3.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the device parameter, aka Bug ID CSCto12704.
[ "cpe:2.3:a:cisco:ciscoworks_common_services:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ciscoworks_common_services:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ciscoworks_common_services:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ciscoworks_common_services:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ciscoworks_common_services:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ciscoworks_common_services:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ciscoworks_common_services:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ciscoworks_common_services:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ciscoworks_common_services:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ciscoworks_common_services:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ciscoworks_common_services:3.2:*:*:*:*:*:*:*" ]
CVE-2025-25371
NASA cFS (Core Flight System) Aquila is vulnerable to path traversal in the OSAL module, allowing the override of any arbitrary file on the system.
[]
CVE-2001-0710
NetBSD 1.5 and earlier and FreeBSD 4.3 and earlier allows a remote attacker to cause a denial of service by sending a large number of IP fragments to the machine, exhausting the mbuf pool.
[ "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*", "cpe:2.3:o:netbsd:netbsd:*:*:*:*:*:*:*:*" ]
CVE-2020-27030
In onCreate of HandleApiCalls.java, there is a possible permission bypass due to a confused deputy. This could lead to local escalation of privilege that allows an app to set or dismiss the alarm with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-150612638
[ "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
CVE-2023-51655
In JetBrains IntelliJ IDEA before 2023.3.2 code execution was possible in Untrusted Project mode via a malicious plugin repository specified in the project configuration
[ "cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*" ]
GHSA-j2j5-3796-w5mq
Bitrix Site Manager 4.0.x allows remote attackers to obtain sensitive information via direct request to (1) subscr_form.php or (2) dbquery_error.php, which reveals the path in an error message.
[]
CVE-2021-33975
Buffer Overflow vulnerability in Qihoo 360 Total Security v10.8.0.1060 and v10.8.0.1213 allows attacker to escalate privileges.
[ "cpe:2.3:a:browser.360:safe_browser:13.0.2170.0:*:*:*:*:*:*:*" ]
CVE-2021-31329
Cross Site Scripting (XSS) in Remote Clinic v2.0 via the "Chat" and "Personal Address" field on staff/register.php
[ "cpe:2.3:a:remoteclinic:remote_clinic:2.0:*:*:*:*:*:*:*" ]
CVE-2024-57900
ila: serialize calls to nf_register_net_hooks()
In the Linux kernel, the following vulnerability has been resolved: ila: serialize calls to nf_register_net_hooks() syzbot found a race in ila_add_mapping() [1] commit 031ae72825ce ("ila: call nf_unregister_net_hooks() sooner") attempted to fix a similar issue. Looking at the syzbot repro, we have concurrent ILA_CMD_ADD commands. Add a mutex to make sure at most one thread is calling nf_register_net_hooks(). [1] BUG: KASAN: slab-use-after-free in rht_key_hashfn include/linux/rhashtable.h:159 [inline] BUG: KASAN: slab-use-after-free in __rhashtable_lookup.constprop.0+0x426/0x550 include/linux/rhashtable.h:604 Read of size 4 at addr ffff888028f40008 by task dhcpcd/5501 CPU: 1 UID: 0 PID: 5501 Comm: dhcpcd Not tainted 6.13.0-rc4-syzkaller-00054-gd6ef8b40d075 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: <IRQ> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0xc3/0x620 mm/kasan/report.c:489 kasan_report+0xd9/0x110 mm/kasan/report.c:602 rht_key_hashfn include/linux/rhashtable.h:159 [inline] __rhashtable_lookup.constprop.0+0x426/0x550 include/linux/rhashtable.h:604 rhashtable_lookup include/linux/rhashtable.h:646 [inline] rhashtable_lookup_fast include/linux/rhashtable.h:672 [inline] ila_lookup_wildcards net/ipv6/ila/ila_xlat.c:127 [inline] ila_xlat_addr net/ipv6/ila/ila_xlat.c:652 [inline] ila_nf_input+0x1ee/0x620 net/ipv6/ila/ila_xlat.c:185 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_slow+0xbb/0x200 net/netfilter/core.c:626 nf_hook.constprop.0+0x42e/0x750 include/linux/netfilter.h:269 NF_HOOK include/linux/netfilter.h:312 [inline] ipv6_rcv+0xa4/0x680 net/ipv6/ip6_input.c:309 __netif_receive_skb_one_core+0x12e/0x1e0 net/core/dev.c:5672 __netif_receive_skb+0x1d/0x160 net/core/dev.c:5785 process_backlog+0x443/0x15f0 net/core/dev.c:6117 __napi_poll.constprop.0+0xb7/0x550 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0xa94/0x1010 net/core/dev.c:7074 handle_softirqs+0x213/0x8f0 kernel/softirq.c:561 __do_softirq kernel/softirq.c:595 [inline] invoke_softirq kernel/softirq.c:435 [inline] __irq_exit_rcu+0x109/0x170 kernel/softirq.c:662 irq_exit_rcu+0x9/0x30 kernel/softirq.c:678 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline] sysvec_apic_timer_interrupt+0xa4/0xc0 arch/x86/kernel/apic/apic.c:1049
[]
GHSA-9f6h-w476-68gc
Vulnerability of improper device information processing in the device management module Impact: Successful exploitation of this vulnerability may affect availability.
[]
GHSA-76r6-j2q8-m63q
The open_envvar function in xdg-open in xdg-utils before 1.1.3 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL, as demonstrated by %s in this environment variable.
[]
GHSA-f383-xpww-4f48
NVIDIA GPU Display Driver for Windows contains a vulnerability in the NVIDIA Control Panel application where it is susceptible to a Windows file system symbolic link attack where an unprivileged attacker can cause the applications to overwrite privileged files, resulting in potential denial of service or data loss.
[]
CVE-2019-17607
HongCMS 3.0.0 has XSS via the install/index.php servername parameter.
[ "cpe:2.3:a:hongcms_project:hongcms:3.0.0:*:*:*:*:*:*:*" ]
GHSA-wxrm-2h86-v95f
Malicious Package in pizza-pasta
Version 1.0.3 of `pizza-pasta` contains malicious code as a install scripts. The package created folders in the system's Desktop and downloaded an image from `imgur.com`. The package also printed the users SSH keys to the console.RecommendationRemove the package from your environment. There are no evidences of further compromise.
[]
CVE-2018-15846
An issue was discovered in fledrCMS through 2014-02-03. There is a CSRF vulnerability that can change the administrator's password via index.php?p=done&savedata=1.
[ "cpe:2.3:a:fledrcms_project:fledrcms:*:*:*:*:*:*:*:*" ]
CVE-2024-36915
nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies
In the Linux kernel, the following vulnerability has been resolved: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies syzbot reported unsafe calls to copy_from_sockptr() [1] Use copy_safe_from_sockptr() instead. [1] BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset include/linux/sockptr.h:49 [inline] BUG: KASAN: slab-out-of-bounds in copy_from_sockptr include/linux/sockptr.h:55 [inline] BUG: KASAN: slab-out-of-bounds in nfc_llcp_setsockopt+0x6c2/0x850 net/nfc/llcp_sock.c:255 Read of size 4 at addr ffff88801caa1ec3 by task syz-executor459/5078 CPU: 0 PID: 5078 Comm: syz-executor459 Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114 print_address_description mm/kasan/report.c:377 [inline] print_report+0x169/0x550 mm/kasan/report.c:488 kasan_report+0x143/0x180 mm/kasan/report.c:601 copy_from_sockptr_offset include/linux/sockptr.h:49 [inline] copy_from_sockptr include/linux/sockptr.h:55 [inline] nfc_llcp_setsockopt+0x6c2/0x850 net/nfc/llcp_sock.c:255 do_sock_setsockopt+0x3b1/0x720 net/socket.c:2311 __sys_setsockopt+0x1ae/0x250 net/socket.c:2334 __do_sys_setsockopt net/socket.c:2343 [inline] __se_sys_setsockopt net/socket.c:2340 [inline] __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340 do_syscall_64+0xfd/0x240 entry_SYSCALL_64_after_hwframe+0x6d/0x75 RIP: 0033:0x7f7fac07fd89 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 91 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fff660eb788 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f7fac07fd89 RDX: 0000000000000000 RSI: 0000000000000118 RDI: 0000000000000004 RBP: 0000000000000000 R08: 0000000000000002 R09: 0000000000000000 R10: 0000000020000a80 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[]
CVE-2025-32246
WordPress 1-Click Backup & Restore Database <= 1.0.3 - Broken Access Control Vulnerability
Missing Authorization vulnerability in Tim Nguyen 1-Click Backup &amp; Restore Database allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects 1-Click Backup &amp; Restore Database: from n/a through 1.0.3.
[]
GHSA-rj5h-39v8-hch3
The shellescape function in Vim 7.0 through 7.2, including 7.2a.10, allows user-assisted attackers to execute arbitrary code via the "!" (exclamation point) shell metacharacter in (1) the filename of a tar archive and possibly (2) the filename of the first file in a tar archive, which is not properly handled by the VIM TAR plugin (tar.vim) v.10 through v.22, as demonstrated by the shellescape, tarplugin.v2, tarplugin, and tarplugin.updated test cases. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2008-2712. NOTE: this issue has the same root cause as CVE-2008-3075. NOTE: due to the complexity of the associated disclosures and the incomplete information related to them, there may be inaccuracies in this CVE description and in external mappings to this identifier.
[]
GHSA-cxgw-r5jg-7xwq
Code injection in grav
Grav is vulnerable to Server Side Template Injection via Twig. According to a previous vulnerability report, Twig should not render dangerous functions by default, such as system.
[]
CVE-2016-10596
imageoptim is a Node.js wrapper for some images compression algorithms. imageoptim downloads zipped resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested tarball with an attacker controlled tarball if the attacker is on the network or positioned in between the user and the remote server.
[ "cpe:2.3:a:imageoptim_project:imageoptim:*:*:*:*:*:node.js:*:*" ]
CVE-2007-3937
Multiple SQL injection vulnerabilities in A-shop 0.70 and earlier allow remote attackers to execute arbitrary SQL commands via unspecified vectors.
[ "cpe:2.3:a:a-shop:a-shop:*:*:*:*:*:*:*:*" ]
GHSA-hhmx-45rr-9pcx
Unspecified vulnerability in the Oracle FLEXCUBE Universal Banking component in Oracle Financial Services Software 10.0.0 through 10.5.0 and 11.0.0 through 11.4.0 allows remote authenticated users to affect availability via unknown vectors related to Core.
[]
CVE-2011-1689
Multiple cross-site scripting (XSS) vulnerabilities in Best Practical Solutions RT 2.0.0 through 3.6.10, 3.8.0 through 3.8.9, and 4.0.0rc through 4.0.0rc7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:bestpractical:rt:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:2.0.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:2.0.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:2.0.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:2.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:2.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:2.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:2.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:2.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.6.9:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.6.10:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.6:rc1:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.7:rc1:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.8:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.8:rc2:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.8:rc3:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.8:rc4:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.9:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.9:rc1:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.9:rc2:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.9:rc3:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.0:rc6:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.0:rc7:*:*:*:*:*:*" ]
CVE-2012-2560
Directory traversal vulnerability in WellinTech KingView 6.53 allows remote attackers to read arbitrary files via a crafted HTTP request to port 8001.
[ "cpe:2.3:a:wellintech:kingview:*:*:*:*:*:*:*:*", "cpe:2.3:a:wellintech:kingview:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:wellintech:kingview:6.5.30.2010.18018:*:*:*:*:*:*:*", "cpe:2.3:a:wellintech:kingview:6.52:*:*:*:*:*:*:*", "cpe:2.3:a:wellintech:kingview:65.30.2010.18018:*:*:*:*:*:*:*", "cpe:2.3:a:wellintech:kingview:65.30.17249:*:*:*:*:*:*:*" ]
GHSA-63w4-j7hq-v5qf
An issue was discovered in Lustre versions 2.13.x, 2.14.x, and 2.15.x before 2.15.4, allows attackers to escalate privileges and obtain sensitive information via Incorrect Access Control.
[]
CVE-2023-25176
Pasteboard has an out-of-bounds read vulnerability
in OpenHarmony v3.2.4 and prior versions allow a local attacker cause information leak through out-of-bounds Read.
[ "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*" ]
GHSA-68gp-7m2f-pch3
Authentication Bypass Using an Alternate Path or Channel vulnerability in Envato Security Team Woffice allows Authentication Bypass.This issue affects Woffice: from n/a through 5.4.14.
[]
GHSA-hv84-49c9-rmm6
Cross-Site Request Forgery (CSRF) vulnerability in Groundhogg Inc. Groundhogg plugin <= 2.7.11 versions.
[]
CVE-2020-4369
IBM Verify Gateway (IVG) 1.0.0 and 1.0.1 stores highly sensitive information in cleartext that could be obtained by a user. IBM X-Force ID: 179004.
[ "cpe:2.3:a:ibm:verify_gateway:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:verify_gateway:1.0.1:*:*:*:*:*:*:*" ]
CVE-2016-1458
The web-based GUI in Cisco Firepower Management Center 4.x and 5.x before 5.3.0.3, 5.3.1.x before 5.3.1.2, and 5.4.x before 5.4.0.1 and Cisco Adaptive Security Appliance (ASA) Software on 5500-X devices with FirePOWER Services 4.x and 5.x before 5.3.0.3, 5.3.1.x before 5.3.1.2, and 5.4.x before 5.4.0.1 allows remote authenticated users to increase user-account privileges via crafted HTTP requests, aka Bug ID CSCur25483.
[ "cpe:2.3:a:cisco:secure_firewall_management_center:4.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0:*:*:*:*:*:*:*" ]
CVE-2022-45840
WordPress Auto Affiliate Links plugin <= 6.2.1.5 - Unauth. Broken Access Control vulnerability
Missing Authorization vulnerability in Lucian Apostol Auto Affiliate Links allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Auto Affiliate Links: from n/a through 6.2.1.5.
[]
GHSA-8f6g-63pm-5fmx
The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below uses poor session management, allowing for an unauthenticated attacker to access administrator functionality if any other user is already signed in.
[]
GHSA-g883-f564-phwg
Directory traversal vulnerability in website.php in Web 2 Business (W2B) phpDatingClub (aka Dating Club) 3.7 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the page parameter.
[]
GHSA-293p-8p8x-wx39
SmarterTools SmarterStats 6.2.4100 generates web pages containing external links in response to GET requests with query strings for frmGettingStarted.aspx, which makes it easier for remote attackers to obtain sensitive information by reading (1) web-server access logs or (2) web-server Referer logs, related to a "cross-domain Referer leakage" issue.
[]
CVE-2020-4413
IBM Security Secret Server 10.7 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 179988.
[ "cpe:2.3:a:ibm:security_secret_server:*:*:*:*:*:*:*:*" ]
CVE-2025-24082
Microsoft Excel Remote Code Execution Vulnerability
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
[]
GHSA-q3fc-6x2v-6ph8
kernel/sched/fair.c in the Linux kernel before 5.3.9, when cpu.cfs_quota_us is used (e.g., with Kubernetes), allows attackers to cause a denial of service against non-cpu-bound applications by generating a workload that triggers unwanted slice expiration, aka CID-de53fd7aedb1. (In other words, although this slice expiration would typically be seen with benign workloads, it is possible that an attacker could calculate how many stray requests are required to force an entire Kubernetes cluster into a low-performance state caused by slice expiration, and ensure that a DDoS attack sent that number of stray requests. An attack does not affect the stability of the kernel; it only causes mismanagement of application execution.)
[]
CVE-2022-25754
A vulnerability has been identified in SCALANCE X302-7 EEC (230V), SCALANCE X302-7 EEC (230V, coated), SCALANCE X302-7 EEC (24V), SCALANCE X302-7 EEC (24V, coated), SCALANCE X302-7 EEC (2x 230V), SCALANCE X302-7 EEC (2x 230V, coated), SCALANCE X302-7 EEC (2x 24V), SCALANCE X302-7 EEC (2x 24V, coated), SCALANCE X304-2FE, SCALANCE X306-1LD FE, SCALANCE X307-2 EEC (230V), SCALANCE X307-2 EEC (230V, coated), SCALANCE X307-2 EEC (24V), SCALANCE X307-2 EEC (24V, coated), SCALANCE X307-2 EEC (2x 230V), SCALANCE X307-2 EEC (2x 230V, coated), SCALANCE X307-2 EEC (2x 24V), SCALANCE X307-2 EEC (2x 24V, coated), SCALANCE X307-3, SCALANCE X307-3, SCALANCE X307-3LD, SCALANCE X307-3LD, SCALANCE X308-2, SCALANCE X308-2, SCALANCE X308-2LD, SCALANCE X308-2LD, SCALANCE X308-2LH, SCALANCE X308-2LH, SCALANCE X308-2LH+, SCALANCE X308-2LH+, SCALANCE X308-2M, SCALANCE X308-2M, SCALANCE X308-2M PoE, SCALANCE X308-2M PoE, SCALANCE X308-2M TS, SCALANCE X308-2M TS, SCALANCE X310, SCALANCE X310, SCALANCE X310FE, SCALANCE X310FE, SCALANCE X320-1 FE, SCALANCE X320-1-2LD FE, SCALANCE X408-2, SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M TS (24V), SCALANCE XR324-12M TS (24V), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M PoE (230V, ports on front), SCALANCE XR324-4M PoE (230V, ports on rear), SCALANCE XR324-4M PoE (24V, ports on front), SCALANCE XR324-4M PoE (24V, ports on rear), SCALANCE XR324-4M PoE TS (24V, ports on front), SIPLUS NET SCALANCE X308-2. The integrated web server of the affected device could allow remote attackers to perform actions with the permissions of a victim user, provided the victim user has an active session and is induced to trigger the malicious request.
[ "cpe:2.3:o:siemens:scalance_x302-7eec_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x302-7eec:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x304-2fe_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x304-2fe:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x306-1ldfe_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x306-1ldfe:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x307-2eec_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x307-2eec:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x307-3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x307-3:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x307-3ld_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x307-3ld:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x308-2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x308-2:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x308-2ld_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x308-2ld:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x308-2lh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x308-2lh:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x308-2lh\\+_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x308-2lh\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x308-2m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x308-2m:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x308-2m_poe_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x308-2m_poe:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x308-2m_ts_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x308-2m_ts:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x310:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x310fe_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x310fe:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x320-1fe_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x320-1fe:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x320-1-2ldfe_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x320-1-2ldfe:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x408-2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x408-2:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xr324-4m_eec_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xr324-4m_eec:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xr324-4m_poe_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xr324-4m_poe:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xr324-4m_poe_ts_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xr324-4m_poe_ts:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xr324-12m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xr324-12m:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xr324-12m_ts_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xr324-12m_ts:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:siplus_net_scalance_x308-2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:siplus_net_scalance_x308-2:-:*:*:*:*:*:*:*" ]
GHSA-3hjf-m6vc-vh7h
In the Linux kernel, the following vulnerability has been resolved:btrfs: don't BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc()We handle errors here properly, ENOMEM isn't fatal, return the error.
[]
GHSA-56c4-xfp5-vm9q
members.asp in Snitz Forums 2000 version 3.3.03 and earlier allows remote attackers to execute arbitrary code via a SQL injection attack on the parameters (1) M_NAME, (2) UserName, (3) FirstName, (4) LastName, or (5) INITIAL.
[]
GHSA-rg7m-x7gx-hg4q
OURPHP <= 7.2.0 is vulnerable to Cross Site Scripting (XSS) via ourphp_tz.php.
[]
GHSA-px37-jpqx-97q9
AWS SAM CLI Path Traversal allows file copy to build container
SummaryThe [AWS Serverless Application Model Command Line Interface (AWS SAM CLI)](https://docs.aws.amazon.com/serverless-application-model/latest/developerguide/using-sam-cli.html) is an open-source CLI tool that helps Lambda developers to build and develop Lambda applications locally on their computers using Docker.When running the AWS SAM CLI build process with Docker and symlinks are included in the build files, the container environment allows a user to access privileged files on the host by leveraging the elevated permissions granted to the tool. A user could leverage the elevated permissions to access restricted files via symlinks and copy them to a more permissive location on the container.Users should [upgrade to v1.133.0](https://docs.aws.amazon.com/serverless-application-model/latest/developerguide/manage-sam-cli-versions.html#manage-sam-cli-versions-upgrade) or newer and ensure any forked or derivative code is patched to incorporate the new fixes.ImpactThis issue is limited to the local workspace and does not affect AWS services, production environments or cross-account resources. The issue only affects local workspaces using AWS SAM CLI with container builds (--use-container), potentially allowing access to local files outside the build directory through the usage of symlinks.**Impacted versions:** <= AWS SAM CLI v1.132.0PatchesThe issue has been addressed in version 1.133.0. Users should upgrade and ensure any forked or derivative code is patched to incorporate the new fixes. To retain the previous behavior and allow symlinks to resolve on the host machine, please use the explicit '-[-mount-symlinks](https://docs.aws.amazon.com/serverless-application-model/latest/developerguide/sam-cli-command-reference-sam-build.html#ref-sam-cli-build-options-mount-symlinks)' parameter.WorkaroundsThere is no recommended work around. Customers are advised to upgrade to version v1.133.0 or the latest version.ReferencesCVE-2025-3047If you have any questions or comments about this advisory we ask that you contact AWS/Amazon Security via our [vulnerability reporting page](https://aws.amazon.com/security/vulnerability-reporting) or directly via email to [[email protected]](mailto:[email protected]). Please do not create a public GitHub issue.CreditWe would like to thank [Kevin Backhouse](https://github.com/kevinbackhouse) with the GitHub Security Lab for collaborating on this issue through the coordinated vulnerability disclosure process.
[]
CVE-2021-38326
Post Title Counter <= 1.1 Reflected Cross-Site Scripting
The Post Title Counter WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the notice parameter found in the ~/post-title-counter.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.1.
[ "cpe:2.3:a:wpleet:post_title_counter:*:*:*:*:*:wordpress:*:*" ]
GHSA-x93g-j874-2hqr
module.php in ezContents 2.0.3 allows remote attackers to bypass the directory traversal protection mechanism to include and execute arbitrary local files via "....//" (doubled dot dot slash) sequences in the link parameter, which is not properly filtered using the str_replace function.
[]
GHSA-vff5-hhxw-cqp5
Cross-Site Request Forgery (CSRF) in WPVibes WP Mail Log plugin <= 1.0.1 versions.
[]
GHSA-j8g9-739h-g466
SonicWall SMA1000 series firmware 12.4.0, 12.4.1-02965 and earlier versions accept a user-controlled input that specifies a link to an external site and uses that link in a redirect which leads to Open redirection vulnerability.
[]
CVE-2015-0052
Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0027, CVE-2015-0035, CVE-2015-0039, and CVE-2015-0068.
[ "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*" ]
GHSA-6fcq-8rv2-rc2j
A SQL Injection vulnerability exists in the updateServiceHost functionality in Centreon Web 24.04.x before 24.04.3, 23.10.x before 23.10.13, 23.04.x before 23.04.19, and 22.10.x before 22.10.23.
[]
CVE-2025-27701
In the function process_crypto_cmd, the values of ptrs[i] can be potentially equal to NULL which is valid value after calling slice_map_array(). Later this values will be derefenced without prior NULL check, which can lead to local Temporary DoS or OOB Read, leading to information disclosure.
[]
GHSA-jhvw-wg26-wj9c
The CVS 1.10.8 server does not properly restrict users from creating arbitrary Checkin.prog or Update.prog programs, which allows remote CVS committers to modify or create Trojan horse programs with the Checkin.prog or Update.prog names, then performing a CVS commit action.
[]
CVE-2023-20597
Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.
[ "cpe:2.3:o:amd:ryzen_3_3100_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3100_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3200g_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3200g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3200g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3200ge_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3200ge_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3200ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3200u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3200u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3250c_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3250c_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3250c:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3250u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3250u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3300_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3300_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3300:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3300g_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3300g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3300u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3300u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3300x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3300x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3350u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3350u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3450u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3450u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3450u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3500c_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3500c_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3500c:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3500u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3500u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3500u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3550h_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3550h_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3550h:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3580u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3580u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3580u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3700c_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3700c_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3700c:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3700u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3700u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3700u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3750h_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3750h_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3750h:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3780u_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3780u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3780u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3100_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3100_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3100:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3300x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3300x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3300x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3500_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3500_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3500:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3500x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3500x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3500x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3600_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3600_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3600:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3600x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3600x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3600x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3600xt_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3600xt_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3600xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3800x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3800x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3800x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3800xt_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3800xt_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3800xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3900_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3900_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3900:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3900x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3900x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3900x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3900xt_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3900xt_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3900xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3945wx_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3945wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3945wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3950x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3950x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3950x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3955wx_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3955wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3955wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3960x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3960x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3960x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3970x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3970x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3970x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3975wx_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3975wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3975wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3990x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3990x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3990x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3995wx_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3995wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3995wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5500_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5500u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5560u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5600_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5600g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5600h_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5600u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5600x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5600x3d_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5600x3d:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5625c_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5625u_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5700g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5300g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5300g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5300ge_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5300ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5500_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5500:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5600_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5600:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5600g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5600g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5600ge_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5600ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5600x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5600x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5700g_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5700g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5700ge_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5700ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5700x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5700x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5800_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5800:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5800x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5800x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5800x3d_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5800x3d:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5900_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5900:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5900x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5900x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5945wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5945wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5950x_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5950x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5955wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5955wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5965wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5965wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5975wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5975wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5995wx_firmware:comboam4v2pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5995wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:castlepeakpi-sp3r3_1.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:castlepeakpi-sp3r3_1.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:castlepeakpi-sp3r3_1.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_pro_3795wx_firmware:castlepeakwspi-swrx8_1.0.0.a:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_pro_3795wx_firmware:chagallwspi-swrx8_1.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_pro_3795wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:castlepeakwspi-swrx8_1.0.0.a:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:chagallwspi-swrx8_1.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:castlepeakwspi-swrx8_1.0.0.a:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:chagallwspi-swrx8_1.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:castlepeakwspi-swrx8_1.0.0.a:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:chagallwspi-swrx8_1.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:castlepeakwspi-swrx8_1.0.0.a:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:chagallwspi-swrx8_1.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_4300g_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_4300g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_4300ge_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_4300ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_4600g_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_4600g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_4600ge_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_4600ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_4700g_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_4700g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_4700ge_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_4700ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_4700s_firmware:renoirpi-fp6_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_4700s:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5500_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5500u_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5560u_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5600_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5600g_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5600h_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5600u_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5600x_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5600x3d_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5625c_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5625u_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5700g_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5300g_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5300ge_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5500_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5600_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5600g_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5600ge_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5600x_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5700g_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5700ge_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5700x_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5800_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5800x_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5800x3d_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5900_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5900x_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5945wx_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5950x_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5955wx_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5965wx_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5975wx_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5995wx_firmware:cezannepi-fp6_1.0.0.b:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_6600h_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_6600h:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_6600hs_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_6600hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_6600u_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_6600u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_6800h_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_6800h:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_6800hs_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_6800hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_6800u_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_6800u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_6900hs_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_6900hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_6900hx_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_6900hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_6980hs_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_6980hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_6980hx_firmware:rembrandtpi-fp7_1.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_6980hx:-:*:*:*:*:*:*:*" ]
GHSA-cjw9-x8qr-5wpf
In the Linux kernel, the following vulnerability has been resolved:block: fix adding folio to bio4GB folio is possible on some ARCHs, such as aarch64, 16GB hugepage is supported, then 'offset' of folio can't be held in 'unsigned int', cause warning in bio_add_folio_nofail() and IO failure.Fix it by adjusting 'page' & trimming 'offset' so that `->bi_offset` won't be overflow, and folio can be added to bio successfully.
[]
CVE-2015-0123
Cross-site scripting (XSS) vulnerability in IBM Rational Team Concert 2.x and 3.x before 3.0.1.6 iFix 5, 4.x before 4.0.7 iFix3, and 5.x before 5.0.2 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL, a different vulnerability than CVE-2015-0122.
[ "cpe:2.3:a:ibm:rational_team_concert:2.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:3.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:3.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:3.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:3.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:3.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:3.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:4.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:4.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:5.0.1:*:*:*:*:*:*:*" ]
GHSA-x59p-gvr8-w8pq
SmartDNS through 41 before 56d0332 allows an out-of-bounds write because of a stack-based buffer overflow in the _dns_encode_domain function in the dns.c file, via a crafted DNS request.
[]
CVE-2008-3013
gdiplus.dll in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a malformed GIF image file containing many extension markers for graphic control extensions and subsequent unknown labels, aka "GDI+ GIF Parsing Vulnerability."
[ "cpe:2.3:a:microsoft:digital_image_suite:2006:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:forefront_client_security:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2007:*:gold:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2007:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:powerpoint_viewer:2003:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:report_viewer:2005:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:report_viewer:2008:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2005:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server_reporting_services:2000:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visio:2002:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:works:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:gold:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*" ]
CVE-2021-32646
Escalation of permissions in roomer
Roomer is a discord bot cog (extension) which provides automatic voice channel generation as well as private voice and text channels. A vulnerability has been discovered allowing discord users to get the ``manage channel`` permissions in a private VC they have joined. This allowed them to make changes to or delete the voice channel they have taken over. The exploit does not allow access or control to any other channels in the server. Upgrade to version 1.0.1 for a patched version of the cog. As a workaround you may disable private VCs in your guild(server) or unload the roomer cog to render the exploit unusable.
[ "cpe:2.3:a:dav-cogs_project:dav-cogs:*:*:*:*:*:*:*:*" ]
CVE-2024-10522
Co-marquage service-public.fr <= 0.5.76 - Reflected Cross-Site Scripting via add_query_arg Parameter
The Co-marquage service-public.fr plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 0.5.76. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
CVE-2008-1932
Integer overflow in Realtek HD Audio Codec Drivers RTKVHDA.sys and RTKVHDA64.sys before 6.0.1.5605 on Windows Vista allows local users to execute arbitrary code via a crafted IOCTL request.
[ "cpe:2.3:o:microsoft:windows-nt:vista:*:x32:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*", "cpe:2.3:a:realtek:hd_audio_codec_drivers:*:*:*:*:*:*:*:*" ]
GHSA-vpxp-73pv-cfjp
Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.
[]
GHSA-7x7c-8qxj-65f3
An issue was discovered in Hola 1.79.859. An unprivileged user could modify or overwrite the executable with arbitrary code, which would be executed the next time the service is started. Depending on the user that the service runs as, this could result in privilege escalation. The issue exists because of the SERVICE_ALL_ACCESS access right for the hola_svc and hola_updater services.
[]
GHSA-j296-wq49-8c3x
Architectural Information System 1.0 and earlier versions have a Stack-based buffer overflow, allows remote attackers to execute arbitrary code.
[]
GHSA-q6q9-w26g-c8vj
WebKit in Apple iOS before 9.3 and Safari before 9.1 does not properly restrict redirects that specify a TCP port number, which allows remote attackers to bypass intended port restrictions via a crafted web site.
[]
GHSA-mhpv-hfp2-2648
Uncontrolled Resource Consumption vulnerability in Mitsubishi Electric MELSEC iQ-R series CPU modules (R00/01/02CPU all versions, R04/08/16/32/120(EN)CPU all versions, R08/16/32/120SFCPU all versions, R08/16/32/120PCPU all versions, R08/16/32/120PSFCPU all versions) allows a remote unauthenticated attacker to prevent legitimate clients from connecting to the MELSOFT transmission port (TCP/IP) by not closing a connection properly, which may lead to a denial of service (DoS) condition.
[]
GHSA-m2w6-vm64-rvfq
Rejected reason: Not used
[]
CVE-2021-22659
Rockwell Automation MicroLogix 1400 Version 21.6 and below may allow a remote unauthenticated attacker to send a specially crafted Modbus packet allowing the attacker to retrieve or modify random values in the register. If successfully exploited, this may lead to a buffer overflow resulting in a denial-of-service condition. The FAULT LED will flash RED and communications may be lost. Recovery from denial-of-service condition requires the fault to be cleared by the user.
[ "cpe:2.3:o:rockwellautomation:micrologix_1400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:rockwellautomation:micrologix_1400:-:*:*:*:*:*:*:*" ]
CVE-2022-28247
Adobe Acrobat Uninstaller Hard Link Leads To Remote Code Execution
Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an uncontrolled search path vulnerability that could lead to local privilege escalation. Exploitation of this issue requires user interaction in that a victim must run the uninstaller with Admin privileges.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*" ]
GHSA-cc62-496p-hrr7
Exposure of Sensitive Information to an Unauthorized Actor in JGroup
The DiagnosticsHandler in JGroup 3.0.x, 3.1.x, 3.2.x before 3.2.9, and 3.3.x before 3.3.3 allows remote attackers to obtain sensitive information (diagnostic information) and execute arbitrary code by reusing valid credentials.
[]
GHSA-p84j-ggc3-5x2h
A vulnerability was found in H3C GR-5400AX up to 100R008 and classified as critical. Affected by this issue is the function EditWlanMacList of the file /routing/goform/aspForm. The manipulation of the argument param leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
CVE-2018-20357
A NULL pointer dereference was discovered in sbr_process_channel of libfaad/sbr_dec.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash.
[ "cpe:2.3:a:audiocoding:freeware_advanced_audio_decoder_2:2.8.8:*:*:*:*:*:*:*" ]
GHSA-95h8-rh3v-c2mf
SafeDisc installs the driver service for the secdrv.sys driver with insecure permissions, which allows local users to gain privileges by changing the configuration to reference a malicious program.
[]
GHSA-9h4r-gpqc-r78x
Use-after-free vulnerability in the _gnutls_handshake_hash_buffers_clear function in lib/gnutls_handshake.c in libgnutls in GnuTLS 2.3.5 through 2.4.0 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via TLS transmission of data that is improperly used when the peer calls gnutls_handshake within a normal session, leading to attempted access to a deallocated libgcrypt handle.
[]