id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
4.89k
|
---|---|---|---|
CVE-2025-39580 | WordPress Dashi <= 3.1.8 - Broken Access Control Vulnerability | Missing Authorization vulnerability in jidaikobo Dashi allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Dashi: from n/a through 3.1.8. | []
|
GHSA-8fp3-p88j-j9m6 | Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. | []
|
|
CVE-2024-29794 | WordPress Conversios.io plugin <= 6.9.1 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Conversios Conversios.Io allows Reflected XSS.This issue affects Conversios.Io: from n/a through 6.9.1.
| []
|
GHSA-j4fm-3rjg-fhgc | A cross-site scripting (XSS) vulnerability in Assembly Software Trialworks v11.4 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the asset src parameter. | []
|
|
CVE-2024-20845 | Out-of-bounds write vulnerability while releasing memory in libsavsac.so prior to SMR Apr-2024 Release 1 allows local attacker to execute arbitrary code. | [
"cpe:2.3:o:samsung:android:12.0:smr-apr-2024-r1:*:*:*:*:*:*"
]
|
|
GHSA-cj49-6c5w-x9hr | Buffer overflow in fpcount.exe in IIS 4.0 with FrontPage Server Extensions allows remote attackers to execute arbitrary commands. | []
|
|
GHSA-rfw5-xwqf-r29q | In the Linux kernel, the following vulnerability has been resolved:udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port().syzkaller triggered the warning [0] in udp_v4_early_demux().In udp_v[46]_early_demux() and sk_lookup(), we do not touch the refcount
of the looked-up sk and use sock_pfree() as skb->destructor, so we check
SOCK_RCU_FREE to ensure that the sk is safe to access during the RCU grace
period.Currently, SOCK_RCU_FREE is flagged for a bound socket after being put
into the hash table. Moreover, the SOCK_RCU_FREE check is done too early
in udp_v[46]_early_demux() and sk_lookup(), so there could be a small race
window:CPU1 CPU2udp_v4_early_demux() udp_lib_get_port()
| |- hlist_add_head_rcu()
|- sk = __udp4_lib_demux_lookup() |
|- DEBUG_NET_WARN_ON_ONCE(sk_is_refcounted(sk));
`- sock_set_flag(sk, SOCK_RCU_FREE)We had the same bug in TCP and fixed it in commit 871019b22d1b ("net:
set SOCK_RCU_FREE before inserting socket into hashtable").Let's apply the same fix for UDP.[0]:
WARNING: CPU: 0 PID: 11198 at net/ipv4/udp.c:2599 udp_v4_early_demux+0x481/0xb70 net/ipv4/udp.c:2599
Modules linked in:
CPU: 0 PID: 11198 Comm: syz-executor.1 Not tainted 6.9.0-g93bda33046e7 #13
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
RIP: 0010:udp_v4_early_demux+0x481/0xb70 net/ipv4/udp.c:2599
Code: c5 7a 15 fe bb 01 00 00 00 44 89 e9 31 ff d3 e3 81 e3 bf ef ff ff 89 de e8 2c 74 15 fe 85 db 0f 85 02 06 00 00 e8 9f 7a 15 fe <0f> 0b e8 98 7a 15 fe 49 8d 7e 60 e8 4f 39 2f fe 49 c7 46 60 20 52
RSP: 0018:ffffc9000ce3fa58 EFLAGS: 00010293
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff8318c92c
RDX: ffff888036ccde00 RSI: ffffffff8318c2f1 RDI: 0000000000000001
RBP: ffff88805a2dd6e0 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0001ffffffffffff R12: ffff88805a2dd680
R13: 0000000000000007 R14: ffff88800923f900 R15: ffff88805456004e
FS: 00007fc449127640(0000) GS:ffff88807dc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fc449126e38 CR3: 000000003de4b002 CR4: 0000000000770ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
PKRU: 55555554
Call Trace:
<TASK>
ip_rcv_finish_core.constprop.0+0xbdd/0xd20 net/ipv4/ip_input.c:349
ip_rcv_finish+0xda/0x150 net/ipv4/ip_input.c:447
NF_HOOK include/linux/netfilter.h:314 [inline]
NF_HOOK include/linux/netfilter.h:308 [inline]
ip_rcv+0x16c/0x180 net/ipv4/ip_input.c:569
__netif_receive_skb_one_core+0xb3/0xe0 net/core/dev.c:5624
__netif_receive_skb+0x21/0xd0 net/core/dev.c:5738
netif_receive_skb_internal net/core/dev.c:5824 [inline]
netif_receive_skb+0x271/0x300 net/core/dev.c:5884
tun_rx_batched drivers/net/tun.c:1549 [inline]
tun_get_user+0x24db/0x2c50 drivers/net/tun.c:2002
tun_chr_write_iter+0x107/0x1a0 drivers/net/tun.c:2048
new_sync_write fs/read_write.c:497 [inline]
vfs_write+0x76f/0x8d0 fs/read_write.c:590
ksys_write+0xbf/0x190 fs/read_write.c:643
__do_sys_write fs/read_write.c:655 [inline]
__se_sys_write fs/read_write.c:652 [inline]
__x64_sys_write+0x41/0x50 fs/read_write.c:652
x64_sys_call+0xe66/0x1990 arch/x86/include/generated/asm/syscalls_64.h:2
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0x4b/0x110 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x4b/0x53
RIP: 0033:0x7fc44a68bc1f
Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 e9 cf f5 ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 3c d0 f5 ff 48
RSP: 002b:00007fc449126c90 EFLAGS: 00000293 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00000000004bc050 RCX: 00007fc44a68bc1f
R
---truncated--- | []
|
|
GHSA-wxj5-qvfq-67hr | In Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean), a crafted IOCTL with code 0x22E1C0 might lead to kernel data leaks. Because the leak occurs at the driver level, an attacker can use this vulnerability to leak some critical information about the machine such as nt!ExpPoolQuotaCookie. | []
|
|
CVE-2006-3541 | SQL injection vulnerability in Meine Links (aka My Links) in Kyberna ky2help allows remote authenticated users to execute arbitrary SQL commands via unspecified "textboxes." | [
"cpe:2.3:a:kyberna:ky2help:*:*:*:*:*:*:*:*"
]
|
|
CVE-2017-12508 | A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. | [
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*"
]
|
|
GHSA-33c5-xpjg-3vv5 | Information disclosure in Asuswrt-Merlin firmware for ASUS devices older than 384.4 and ASUS firmware before 3.0.0.4.382.50470 for devices allows remote attackers to acquire information on internal network devices' hostnames and MAC addresses by reading the custom_id variable on the blocking.asp page. | []
|
|
CVE-2007-3386 | Cross-site scripting (XSS) vulnerability in the Host Manager Servlet for Apache Tomcat 6.0.0 to 6.0.13 and 5.5.0 to 5.5.24 allows remote attackers to inject arbitrary HTML and web script via crafted requests, as demonstrated using the aliases parameter to an html/add action. | [
"cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*"
]
|
|
GHSA-4gph-hxgg-mh6j | WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2. | []
|
|
GHSA-c7fc-cm7p-92r2 | Openstack ironic-inspector has SQL injection vulnerability in node_cache | A vulnerability was found in openstack-ironic-inspector all versions excluding 5.0.2, 6.0.3, 7.2.4, 8.0.3 and 8.2.1. A SQL-injection vulnerability was found in openstack-ironic-inspector's node_cache.find_node(). This function makes a SQL query using unfiltered data from a server reporting inspection results (by a POST to the /v1/continue endpoint). Because the API is unauthenticated, the flaw could be exploited by an attacker with access to the network on which ironic-inspector is listening. Because of how ironic-inspector uses the query results, it is unlikely that data could be obtained. However, the attacker could pass malicious data and create a denial of service. | []
|
CVE-2015-8336 | Huawei FusionCompute with software before V100R005C10SPC700 allows remote authenticated users to obtain sensitive "role and permission" information via unspecified vectors. | [
"cpe:2.3:h:huawei:fusioncompute:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:fusioncompute_firmware:*:*:*:*:*:*:*:*"
]
|
|
GHSA-6gfm-3jj5-pmhh | Unrestricted Upload of File with Dangerous Type vulnerability in WebToffee Order Export & Order Import for WooCommerce.This issue affects Order Export & Order Import for WooCommerce: from n/a through 2.4.3. | []
|
|
GHSA-xx9m-2fc7-mhx8 | A relative path traversal in Fortinet FortiRecorder [CWE-23] version 7.2.0 through 7.2.1 and before 7.0.4 allows a privileged attacker to read files from the underlying filesystem via crafted HTTP or HTTPs requests. | []
|
|
GHSA-5cw3-4xq7-74f8 | IBM WebSphere Portal 7.0, 8.0, 8.5, and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 136005. | []
|
|
CVE-2021-36545 | Cross Site Scripting (XSS) vulnerability in tpcms 3.2 allows remote attackers to run arbitrary code via the cfg_copyright or cfg_tel field in Site Configuration page. | [
"cpe:2.3:a:tpcms_project:tpcms:3.2:*:*:*:*:*:*:*"
]
|
|
GHSA-5rx7-hpq2-m494 | Possible buffer overflow in the hypervisor. Inappropriate usage of a static array could lead to a buffer overrun. Product: Android. Versions: Kernel 3.18. Android ID: A-31625904. References: QC-CR#1027769. | []
|
|
CVE-2017-12664 | ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePALMImage in coders/palm.c. | [
"cpe:2.3:a:imagemagick:imagemagick:7.0.6-2:*:*:*:*:*:*:*"
]
|
|
GHSA-7m66-wpcj-8694 | Website Auction Marketplace 2.0.5 has SQL Injection via the search.php cat_id parameter. | []
|
|
CVE-2023-0412 | TIPC dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file | [
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
]
|
|
GHSA-v5vf-vv9f-927q | A vulnerability, which was classified as critical, has been found in pointhi searx_stats. This issue affects some unknown processing of the file cgi/cron.php. The manipulation leads to sql injection. The name of the patch is 281bd679a4474ddb222d16c1c380f252839cc18f. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218351. | []
|
|
GHSA-mr2c-ph77-2532 | An issue was discovered in Cerebrate through 1.4. Endpoints could be open even when not enabled. | []
|
|
GHSA-wfrm-3362-9f2r | On BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, FPS, GTM, Link Controller, PEM) versions 15.1.0-15.1.0.5, 14.1.0-14.1.2.3, and 13.1.0-13.1.3.3, when handling MQTT traffic through a BIG-IP virtual server associated with an MQTT profile and an iRule performing manipulations on that traffic, TMM may produce a core file. | []
|
|
GHSA-g839-937g-3fhv | fontconfig before 2.12.1 does not validate offsets, which allows local users to trigger arbitrary free calls and consequently conduct double free attacks and execute arbitrary code via a crafted cache file. | []
|
|
CVE-2019-16955 | SolarWinds Web Help Desk 12.7.0 allows XSS via an uploaded SVG document in a request. | [
"cpe:2.3:a:solarwinds:webhelpdesk:12.7.0:*:*:*:*:*:*:*"
]
|
|
CVE-2004-2048 | radmin in eSeSIX Thintune thin clients running firmware 2.4.38 and earlier starts a process port 25072 that can be accessed with a default "jstwo" password, which allows remote attackers to gain access. | [
"cpe:2.3:h:esesix:thintune_extreme:2.4.38:*:*:*:*:*:*:*",
"cpe:2.3:h:esesix:thintune_l:2.4.38:*:*:*:*:*:*:*",
"cpe:2.3:h:esesix:thintune_m:2.4.38:*:*:*:*:*:*:*",
"cpe:2.3:h:esesix:thintune_mobile:2.4.38:*:*:*:*:*:*:*",
"cpe:2.3:h:esesix:thintune_s:2.4.38:*:*:*:*:*:*:*",
"cpe:2.3:h:esesix:thintune_xm:2.4.38:*:*:*:*:*:*:*",
"cpe:2.3:h:esesix:thintune_xs:2.4.38:*:*:*:*:*:*:*"
]
|
|
CVE-2020-27982 | IceWarp 11.4.5.0 allows XSS via the language parameter. | [
"cpe:2.3:a:icewarp:mail_server:11.4.5:*:*:*:*:*:*:*"
]
|
|
CVE-2019-1000021 | slixmpp version before commit 7cd73b594e8122dddf847953fcfc85ab4d316416 contains an incorrect Access Control vulnerability in XEP-0223 plugin (Persistent Storage of Private Data via PubSub) options profile, used for the configuration of default access model that can result in all of the contacts of the victim can see private data having been published to a PEP node. This attack appears to be exploitable if the user of this library publishes any private data on PEP, the node isn't configured to be private. This vulnerability appears to have been fixed in commit 7cd73b594e8122dddf847953fcfc85ab4d316416 which is included in slixmpp 1.4.2. | [
"cpe:2.3:a:slixmpp_project:slixmpp:*:*:*:*:*:*:*:*"
]
|
|
GHSA-83jv-6hqx-ghm3 | Untis WebUntis before 2020.9.6 allows CSRF for certain combinations of rights and modules. | []
|
|
GHSA-4pq9-mvg5-5g53 | Adobe Illustrator versions 24.0.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution . | []
|
|
CVE-2020-0905 | An remote code execution vulnerability exists in Microsoft Dynamics Business Central, aka 'Dynamics Business Central Remote Code Execution Vulnerability'. | [
"cpe:2.3:a:microsoft:dynamics_365_business_central:-:-:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:dynamics_365_business_central:2019:release_wave_2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:dynamics_365_business_central:2019:spring_update:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:dynamics_nav:2013:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:dynamics_nav:2015:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:dynamics_nav:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:dynamics_nav:2017:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:dynamics_nav:2018:*:*:*:*:*:*:*"
]
|
|
CVE-2016-2203 | The management console on Symantec Messaging Gateway (SMG) Appliance devices before 10.6.1 allows local users to discover an encrypted AD password by leveraging certain read privileges. | [
"cpe:2.3:a:symantec:messaging_gateway:10.6.0:patch3:*:*:*:*:*:*",
"cpe:2.3:a:symantec:messaging_gateway:10.6.0:patch5:*:*:*:*:*:*",
"cpe:2.3:a:symantec:messaging_gateway:10.6.0:patch7:*:*:*:*:*:*"
]
|
|
GHSA-xv9g-3r88-mqc5 | The Runners Log plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'runnerslog' shortcode in all versions up to, and including, 3.9.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
|
|
GHSA-qv8h-5j9g-63mm | Heap-based buffer overflow vulnerabilities in Advantech WebAccess HMI Designer 2.1.7.32 and prior caused by processing specially crafted .pm3 files may allow remote code execution. | []
|
|
CVE-2020-13622 | JerryScript 2.2.0 allows attackers to cause a denial of service (assertion failure) because a property key query for a Proxy object returns unintended data. | [
"cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*"
]
|
|
GHSA-pjgc-6mr2-9jx3 | Cross-Site Request Forgery (CSRF) vulnerability in Hassan Ali Snap Pixel plugin <= 1.5.7 versions. | []
|
|
GHSA-chpp-8vhw-x9v3 | The Modelisme.com forum/portail (aka com.tapatalk.modelismecomforum) application 3.6.9 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | []
|
|
GHSA-h5xg-p4ch-38qf | The default configuration of the Wi-Fi component on the Huawei D100 does not use encryption, which makes it easier for remote attackers to obtain sensitive information by sniffing the network. | []
|
|
GHSA-8h28-5hcj-h4qw | munin-cgi-graph in Munin 2.0 rc4 allows remote attackers to cause a denial of service (disk or memory consumption) via many image requests with large values in the (1) size_x or (2) size_y parameters. | []
|
|
CVE-2018-21230 | Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects D1500 before 1.0.0.27, D500 before 1.0.0.27, D6100 before 1.0.0.57, D6220 before 1.0.0.40, D6400 before 1.0.0.74, D7000 before 1.0.1.60, D7800 before 1.0.1.34, D8500 before 1.0.3.39, DGN2200v4 before 1.0.0.94, DGN2200Bv4 before 1.0.0.94, EX2700 before 1.0.1.42, EX3700 before 1.0.0.64, EX3800 before 1.0.0.64, EX6000 before 1.0.0.24, EX6100 before 1.0.2.18, EX6120 before 1.0.0.32, EX6130 before 1.0.0.22, EX6150 before 1.0.0.34_1.0.70, EX6200 before 1.0.3.82_1.1.117, EX6400 before 1.0.1.78, EX7000 before 1.0.0.56, EX7300 before 1.0.1., JNR1010v2 before 1.1.0.42, JR6150 before 1.0.1.10, JWNR2010v5 before 1.1.0.42, PR2000 before 1.0.0.22, R6050 before 1.0.1.10, R6100 before 1.0.1.16, R6220 before 1.1.0.50, R6250 before 1.0.4.14, R6300v2 before 1.0.4.12, R6400v2 before 1.0.2.34, R6700 before 1.0.1.26, R6900 before 1.0.1.26, R6900P before 1.2.0.22, R7000 before 1.0.9.6, R7000P before 1.2.0.22, R7100LG before 1.0.0.40, R7300DST before 1.0.0.54, R7500 before 1.0.0.110, R7500v2 before 1.0.3.26, R7800 before 1.0.2.44, R7900 before 1.0.1.26, R8000 before 1.0.3.48, R8300 before 1.0.2.104, R8500 before 1.0.2.104, R9000 before 1.0.3.10, WN2000RPTv3 before 1.0.1.26, WN2500RPv2 before 1.0.1.46, WN3000RPv3 before 1.0.2.66, WN3100RPv2 before 1.0.0.56, WNDR3400v3 before 1.0.1.14, WNDR3700v4 before 1.0.2.96, WNDR3700v5 before 1.1.0.54, WNDR4300 before 1.0.2.98, WNDR4300v2 before 1.0.0.48, WNDR4500v3 before 1.0.0.48, WNR1000v4 before 1.1.0.42, WNR2000v5 before 1.0.0.64, WNR2020 before 1.1.0.42, and WNR2050 before 1.1.0.42. | [
"cpe:2.3:o:netgear:d1500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d1500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d6100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d6220_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6220:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d6400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d8500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d8500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:dgn2200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:dgn2200:v4:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:dgn2200b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:dgn2200b:v4:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex2700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex2700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex3700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex3700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex3800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex3800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex6000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex6000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex6100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex6100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex6120_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex6120:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex6130_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex6130:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex6150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex6150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex6200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex6200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex6400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex6400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex7300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex7300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:jnr1010_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:jnr1010:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:jr6150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:jr6150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:jwnr2010_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:jwnr2010:v5:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:pr2000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:pr2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6050_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6050:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6220_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6220:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6300:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6400:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7300dst_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7300dst:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7500:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wn2000rpt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wn2000rpt:v3:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wn2500rp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wn2500rp:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wn3000rp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wn3000rp:v3:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wn3100rp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wn3100rp:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr3400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr3400:v3:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr3700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr3700:v4:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr3700:v5:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr4300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr4300:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr4500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr4500:v3:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr1000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr1000:v4:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr2000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr2000:v5:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr2020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr2020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr2050_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr2050:-:*:*:*:*:*:*:*"
]
|
|
GHSA-6x8g-f68r-6fqp | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | []
|
|
CVE-2014-4439 | Mail in Apple OS X before 10.10 does not properly recognize the removal of a recipient address from a message, which makes it easier for remote attackers to obtain sensitive information in opportunistic circumstances by reading a message intended exclusively for other recipients. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
]
|
|
CVE-2014-9871 | Multiple buffer overflows in drivers/media/platform/msm/camera_v2/isp/msm_isp_util.c in the Qualcomm components in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices allow attackers to gain privileges via a crafted application, aka Android internal bug 28749803 and Qualcomm internal bug CR514717. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
]
|
|
CVE-2019-12662 | Cisco NX-OS and IOS XE Software Virtual Service Image Signature Bypass Vulnerability | A vulnerability in Cisco NX-OS Software and Cisco IOS XE Software could allow an authenticated, local attacker with valid administrator or privilege level 15 credentials to load a virtual service image and bypass signature verification on an affected device. The vulnerability is due to improper signature verification during the installation of an Open Virtual Appliance (OVA) image. An authenticated, local attacker could exploit this vulnerability and load a malicious, unsigned OVA image on an affected device. A successful exploit could allow an attacker to perform code execution on a crafted software OVA image. | [
"cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.1\\(0.2\\)s0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.1\\(1\\)s5:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.1\\(0\\)bd\\(0.20\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9000v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3016_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3048_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3064_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3064-t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_31108pc-v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_31108tc-v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_31128pq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3132c-z_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3132q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3132q-v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3132q-xl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3164q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3172_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3172pq-xl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3172tq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3172tq-32t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3172tq-xl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3232c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3264c-e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3264q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3408-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_34180yc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_34200yc-sm_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_34200yc-sm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3432d-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3464c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3524_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3524-x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3524-xl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3548_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3548-x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_3548-xl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_5548p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_5548up_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_5596t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_5596up_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_56128p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_5624q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_5648q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_5672up_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_5696q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_6001_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_6001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_6004_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_6004:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_7000_10-slot_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_7000_18-slot_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_7000_4-slot_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000_4-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_7000_9-slot_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_7700_10-slot_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7700_10-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_7700_18-slot_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7700_18-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_7700_2-slot_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7700_2-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_7700_6-slot_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7700_6-slot:-:*:*:*:*:*:*:*"
]
|
GHSA-4m4w-p55h-jwjh | Improper initialization in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via physical access. | []
|
|
CVE-2009-3368 | Cross-site scripting (XSS) vulnerability in the Hotel Booking Reservation System (aka HBS or com_hbssearch) component for Joomla! allows remote attackers to inject arbitrary web script or HTML via the adult parameter in a showhoteldetails action to index.php. | [
"cpe:2.3:a:joomlahbs:com_hbssearch:*:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
]
|
|
GHSA-vf3m-524r-w2p9 | xhyve commit dfbe09b was discovered to contain a stack buffer overflow via the component pci_vtrnd_notify(). | []
|
|
CVE-2005-4787 | Turnkey Web Tools SunShop Shopping Cart allows remote attackers to obtain sensitive information via a phpinfo action to (1) index.php, (2) admin/index.php, and (3) admin/adminindex.php, which executes the PHP phpinfo function. NOTE: The vendor has disputed this issue, saying that "Having this in the code makes it easier for us to troubleshoot when issues arise on individual carts. For someone to have a script to do this type of search would require that they know where your shop is actually located. I dont think it really can be construde [sic] as a security issue. | [
"cpe:2.3:a:turnkey_solutions:sunshop_shopping_cart:3.0:*:*:*:*:*:*:*"
]
|
|
CVE-2006-1617 | Multiple cross-site scripting (XSS) vulnerabilities in Advanced Poll 2.02 allow remote attackers to inject arbitrary web script or HTML via the (1) id parameter to comments.php or (2) poll_id parameter to page.php. NOTE: it is possible that this issue is resultant from CVE-2006-1616. | [
"cpe:2.3:a:advanced_poll:advanced_poll:2.0.2:*:*:*:*:*:*:*"
]
|
|
GHSA-q46j-pj2f-x9cc | Adobe Substance 3D Stager versions 2.1.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | []
|
|
CVE-2017-0346 | All versions of the NVIDIA Windows GPU Display Driver contain a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape where the size of an input buffer is not validated, leading to denial of service or potential escalation of privileges. | [
"cpe:2.3:a:nvidia:gpu_driver:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
|
|
GHSA-4v52-cjf4-53w4 | WFTPD and WFTPD Pro 2.41 RC12 allows remote attackers to obtain the full pathname of the server via a "%C" command, which generates an error message that includes the pathname. | []
|
|
CVE-2019-5383 | A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09. | [
"cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:-:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p03:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p07:*:*:*:*:*:*"
]
|
|
CVE-2019-0277 | SAP HANA extended application services, version 1, advanced does not sufficiently validate an XML document accepted from an authenticated developer with privileges to the SAP space (XML External Entity vulnerability). | [
"cpe:2.3:a:sap:hana_extended_application_services:1.0:*:*:*:*:*:*:*"
]
|
|
CVE-2022-20690 | Multiple vulnerabilities in the Cisco Discovery Protocol functionality of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, adjacent attacker to cause Cisco Discovery Protocol memory corruption on an affected device.
These vulnerabilities are due to missing length validation checks when processing Cisco Discovery Protocol messages. An attacker could exploit these vulnerabilities by sending a malicious Cisco Discovery Protocol packet to an affected device. A successful exploit could allow the attacker to cause an out-of-bounds read of the valid Cisco Discovery Protocol packet data, which could allow the attacker to cause corruption in the internal Cisco Discovery Protocol database of the affected device. | [
"cpe:2.3:o:cisco:ata_190_firmware:-:*:*:*:on-premises:*:*:*",
"cpe:2.3:h:cisco:ata_190:-:*:*:*:on-premises:*:*:*",
"cpe:2.3:o:cisco:ata_191_firmware:*:*:*:*:multiplatform:*:*:*",
"cpe:2.3:h:cisco:ata_191:-:*:*:*:multiplatform:*:*:*",
"cpe:2.3:o:cisco:ata_191_firmware:*:*:*:*:on-premises:*:*:*",
"cpe:2.3:o:cisco:ata_191_firmware:12.0.1:-:*:*:on-premises:*:*:*",
"cpe:2.3:o:cisco:ata_191_firmware:12.0.1:sr1:*:*:on-premises:*:*:*",
"cpe:2.3:o:cisco:ata_191_firmware:12.0.1:sr2:*:*:on-premises:*:*:*",
"cpe:2.3:o:cisco:ata_191_firmware:12.0.1:sr3:*:*:on-premises:*:*:*",
"cpe:2.3:o:cisco:ata_191_firmware:12.0.1:sr4:*:*:on-premises:*:*:*",
"cpe:2.3:h:cisco:ata_191:-:*:*:*:on-premises:*:*:*",
"cpe:2.3:o:cisco:ata_192_firmware:*:*:*:*:multiplatform:*:*:*",
"cpe:2.3:h:cisco:ata_192:-:*:*:*:multiplatform:*:*:*"
]
|
|
GHSA-jp26-9ghg-xw8h | A remote code execution vulnerability in the Android media framework (libmpeg2). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-38207066. | []
|
|
CVE-2020-27748 | A flaw was found in the xdg-email component of xdg-utils-1.1.0-rc1 and newer. When handling mailto: URIs, xdg-email allows attachments to be discreetly added via the URI when being passed to Thunderbird. An attacker could potentially send a victim a URI that automatically attaches a sensitive file to a new email. If a victim user does not notice that an attachment was added and sends the email, this could result in sensitive information disclosure. It has been confirmed that the code behind this issue is in xdg-email and not in Thunderbird. | [
"cpe:2.3:a:freedesktop:xdg-utils:*:*:*:*:*:*:*:*"
]
|
|
CVE-2015-4763 | Unspecified vulnerability in the Oracle Agile PLM component in Oracle Supply Chain Products Suite 9.3.4 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Security. | [
"cpe:2.3:a:oracle:supply_chain_products_suite:9.3.4:*:*:*:*:*:*:*"
]
|
|
CVE-2020-5399 | CredHub does not properly enable TLS for MySQL database connections | Cloud Foundry CredHub, versions prior to 2.5.10, connects to a MySQL database without TLS even when configured to use TLS. A malicious user with access to the network between CredHub and its MySQL database may eavesdrop on database connections and thereby gain unauthorized access to CredHub and other components. | [
"cpe:2.3:a:cloudfoundry:credhub:*:*:*:*:*:*:*:*",
"cpe:2.3:a:pivotal_software:cloud_foundry_cf-deployment:*:*:*:*:*:*:*:*"
]
|
GHSA-gwmj-2rhq-qpjx | A disk space or quota exhaustion issue exists in article2pdf_getfile.php in the article2pdf Wordpress plugin 0.24, 0.25, 0.26, 0.27. Visiting PDF generation link but not following the redirect will leave behind a PDF file on disk which will never be deleted by the plug-in. | []
|
|
CVE-2005-0526 | Multiple cross-site scripting (XSS) vulnerabilities in PBLang 4.65 allow remote attackers to inject arbitrary web script or HTML via (1) the search string to search.php, (2) the subject of a PM, which is processed by pm.php, or (3) the body of a PM, which is processed by pmpshow.php. | [
"cpe:2.3:a:pblang:pblang:4.65:*:*:*:*:*:*:*"
]
|
|
GHSA-jqfx-r8vc-qw5m | Dell EMC NetWorker, versions 18.x, 19.1.x, 19.2.x 19.3.x, 19.4, and 19.4.0.1 contain an Improper Certificate Validation vulnerability in the client (NetWorker Management Console) components which uses SSL encrypted connection in order to communicate with the application server. An unauthenticated attacker in the same network collision domain as the NetWorker Management Console client could potentially exploit this vulnerability to perform man-in-the-middle attacks to intercept and tamper the traffic between the client and the application server. | []
|
|
CVE-2022-33722 | Implicit Intent hijacking vulnerability in Smart View prior to SMR Aug-2022 Release 1 allows attacker to access connected device MAC address. | [
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*"
]
|
|
GHSA-x4mq-76g8-78f6 | Mozilla Firefox before 46.0 on Android does not properly restrict JavaScript access to orientation and motion data, which allows remote attackers to obtain sensitive information about a device's physical environment, and possibly discover PIN values, via a crafted web site, a similar issue to CVE-2016-1780. | []
|
|
CVE-2019-18885 | fs/btrfs/volumes.c in the Linux kernel before 5.1 allows a btrfs_verify_dev_extents NULL pointer dereference via a crafted btrfs image because fs_devices->devices is mishandled within find_device, aka CID-09ba3bc9dd15. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
]
|
|
GHSA-6r7h-frh6-9hpp | Illustrator versions 29.0.0, 28.7.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | []
|
|
GHSA-gcqh-fgcv-64wf | Adobe Substance 3D Stager version 2.0.1 (and earlier) is affected by an Access of Uninitialized Pointer vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | []
|
|
CVE-2024-45759 | Dell PowerProtect Data Domain, versions prior to 8.1.0.0, 7.13.1.10, 7.10.1.40, and 7.7.5.50, contains an escalation of privilege vulnerability. A local low privileged attacker could potentially exploit this vulnerability, leading to unauthorized execution of certain commands to overwrite system config of the application. Exploitation may lead to denial of service of system. | [
"cpe:2.3:o:dell:data_domain_operating_system:*:*:*:*:*:*:*:*"
]
|
|
GHSA-xcc8-3vrq-wjg2 | A use-after-free vulnerability in WebCore::RenderLayer::addChild in WebKitGTK before 2.36.8 allows attackers to execute code remotely. | []
|
|
GHSA-r5mh-25wx-vvhc | Cross-site scripting (XSS) vulnerability in functions.php in microBlog 2.0 RC-10 allows remote attackers to inject arbitrary web script and HTML via a javascript: URI in a [url] BBcode tag. | []
|
|
CVE-2024-3644 | Newsletter Popup <= 1.2 - Admin+ Stored XSS | The Newsletter Popup WordPress plugin through 1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | []
|
GHSA-mm67-fp4m-8qg8 | The NT Virtual DOS Machine (NTVDM) subsystem in the kernel in Microsoft Windows XP SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 on 32-bit platforms does not properly validate kernel-memory addresses, which allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application, aka "Windows Kernel Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3196 and CVE-2013-3197. | []
|
|
GHSA-45qq-m2cx-4ggc | A vulnerability was found in Beijing Baichuo Smart S85F Management Platform up to 20230807. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /log/decodmail.php. The manipulation of the argument file leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-237517 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | []
|
|
GHSA-x5w7-v6pc-m6c4 | QT Media Foundation in Apple QuickTime before 7.7.7, as used in OS X before 10.10.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted file, a different vulnerability than CVE-2015-3661, CVE-2015-3662, CVE-2015-3663, CVE-2015-3666, and CVE-2015-3667. | []
|
|
CVE-2021-22643 | Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion KeyShot Network Rendering versions prior to 10.1, and Luxion KeyVR versions prior to 10.1 are vulnerable to an out-of-bounds read while processing project files, which may allow an attacker to execute arbitrary code. | [
"cpe:2.3:a:luxion:keyshot:*:*:*:*:*:*:*:*",
"cpe:2.3:a:luxion:keyshot_network_rendering:*:*:*:*:*:*:*:*",
"cpe:2.3:a:luxion:keyshot_viewer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:luxion:keyvr:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:solid_edge_se2020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:solid_edge_se2020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:solid_edge_se2021_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:solid_edge_se2021:-:*:*:*:*:*:*:*"
]
|
|
CVE-2022-27865 | A maliciously crafted TGA or PCX file may be used to write beyond the allocated buffer through DesignReview.exe application while parsing TGA and PCX files. This vulnerability may be exploited to execute arbitrary code. | [
"cpe:2.3:a:autodesk:design_review:2011:-:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:design_review:2012:-:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:design_review:2013:-:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:design_review:2017:-:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:design_review:2018:hotfix:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:design_review:2018:hotfix2:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:design_review:2018:hotfix3:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:design_review:2018:hotfix4:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:design_review:2018:hotfix5:*:*:*:*:*:*"
]
|
|
GHSA-gc44-mvvx-cvhm | Multiple integer overflow vulnerabilities exist in the LXT2 facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `rows` array. | []
|
|
GHSA-fx9h-h562-86qx | An attacker who has already compromised the local system could use TinyWall Controller to gain additional privileges by attaching a debugger to the running process and modifying the code in memory. Vulnerability fixed in version 2.1.13. | []
|
|
GHSA-7c4j-3c7c-wh66 | The png_handle_iCCP function in libpng 1.2.5 and earlier allows remote attackers to cause a denial of service (application crash) via a certain PNG image that triggers a null dereference. | []
|
|
CVE-2006-1206 | Matt Johnston Dropbear SSH server 0.47 and earlier, as used in embedded Linux devices and on general-purpose operating systems, allows remote attackers to cause a denial of service (connection slot exhaustion) via a large number of connection attempts that exceeds the MAX_UNAUTH_CLIENTS defined value of 30. | [
"cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:*:*:*:*:*:*:*:*"
]
|
|
GHSA-r3cp-px3w-cp2q | SQL injection vulnerability in index.php in the pnFlashGames 1.5 through 2.5 module for PostNuke, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the id parameter in a display action. | []
|
|
CVE-2007-6564 | Cross-site scripting (XSS) vulnerability in admin.php in Limbo CMS 1.0.4.2 allows remote attackers to inject arbitrary web script or HTML via the com_option parameter. | [
"cpe:2.3:a:limbo_cms:limbo_cms:1.0.4.2:*:*:*:*:*:*:*"
]
|
|
GHSA-2mqg-9v38-rpr6 | Cross-Site Request Forgery (CSRF) vulnerability in Andy Moyle Church Admin.This issue affects Church Admin: from n/a through 4.1.32. | []
|
|
GHSA-q7c6-26j2-f5r8 | AnyDesk before 6.2.6 and 6.3.x before 6.3.3 allows a local user to obtain administrator privileges by using the Open Chat Log feature to launch a privileged Notepad process that can launch other applications. | []
|
|
GHSA-mf6m-m52m-43jc | Password recovery vulnerability in SICK SIM1004 Partnumber 1098148 with firmware version < 2.0.0 allows an unprivileged remote attacker to gain access to the userlevel defined as RecoverableUserLevel by invocating the password recovery mechanism method. This leads to a increase in their privileges on the system and thereby affecting the confidentiality integrity and availability of the system. An attacker can expect repeatable success by exploiting the vulnerability. The recommended solution is to update the firmware to a version >= 2.0.0 as soon as possible. | []
|
|
GHSA-9jfm-23rc-mq2c | A vulnerability has been identified in Solid Edge SE2022 (All versions < V2210Update12), Solid Edge SE2023 (All versions < V2023Update2). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. | []
|
|
CVE-2014-2319 | The Encrypt Files feature in ConeXware PowerArchiver before 14.02.05 uses legacy ZIP encryption even if the AES 256-bit selection is chosen, which makes it easier for context-dependent attackers to obtain sensitive information via a known-plaintext attack. | [
"cpe:2.3:a:powerarchiver:powerarchiver:*:*:*:*:*:*:*:*",
"cpe:2.3:a:powerarchiver:powerarchiver:14.00:*:*:*:*:*:*:*",
"cpe:2.3:a:powerarchiver:powerarchiver:14.01:*:*:*:*:*:*:*",
"cpe:2.3:a:powerarchiver:powerarchiver:14.02:*:*:*:*:*:*:*"
]
|
|
CVE-2018-15995 | Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an integer overflow vulnerability. Successful exploitation could lead to information disclosure. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*"
]
|
|
CVE-2007-2282 | Cisco Network Services (CNS) NetFlow Collection Engine (NFC) before 6.0 has an nfcuser account with the default password nfcuser, which allows remote attackers to modify the product configuration and, when installed on Linux, obtain login access to the host operating system. | [
"cpe:2.3:a:cisco:netflow_collection_engine:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:netflow_collection_engine:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:netflow_collection_engine:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:netflow_collection_engine:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:netflow_collection_engine:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:netflow_collection_engine:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:netflow_collection_engine:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:netflow_collection_engine:5.0.3:*:*:*:*:*:*:*"
]
|
|
GHSA-m58q-jqh2-65vg | A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/taxcodelist.php, in the description parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials. | []
|
|
CVE-2013-5857 | Unspecified vulnerability in the Oracle Health Sciences InForm component in Oracle Industry Applications 4.5 SP3, 4.5 SP3a-k, 4.6 SP0, 4.6 SP0a-c, 4.6 SP1, 4.6 SP1a-c, 4.6 SP2, 4.6 SP2a-c, 5.0 SP0, 5.0 SP0a, 5.0 SP1, and 5.0 SP1a-b allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Web. | [
"cpe:2.3:a:oracle:industry_applications:4.5:sp3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.5:sp3a:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.5:sp3b:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.5:sp3c:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.5:sp3d:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.5:sp3e:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.5:sp3f:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.5:sp3g:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.5:sp3h:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.5:sp3i:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.5:sp3j:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.5:sp3k:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.6:sp0:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.6:sp0a:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.6:sp0b:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.6:sp0c:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.6:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.6:sp1a:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.6:sp1b:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.6:sp1c:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.6:sp2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.6:sp2a:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.6:sp2b:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.6:sp2c:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:5.0:sp0:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:5.0:sp0a:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:5.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:5.0:sp1a:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:5.0:sp1b:*:*:*:*:*:*"
]
|
|
GHSA-c8rv-h2fj-xxxc | Array index error in arch/mips/kernel/scall64-o32.S in the Linux kernel before 2.6.28-rc8 on 64-bit MIPS platforms allows local users to cause a denial of service (system crash) via an o32 syscall with a small syscall number, which leads to an attempted read operation outside the bounds of the syscall table. | []
|
|
CVE-2015-5634 | The Newphoria MEGAPHONE MUSIC application before 1.1 for Android and before 1.1 for iOS allows attackers to bypass a URL whitelist protection mechanism and obtain API access via unspecified vectors. | [
"cpe:2.3:a:newphoria_corporation:megaphone_music:*:*:*:*:*:android:*:*",
"cpe:2.3:a:newphoria_corporation:megaphone_music:*:*:*:*:*:ios:*:*"
]
|
|
CVE-2013-1712 | Multiple untrusted search path vulnerabilities in updater.exe in Mozilla Updater in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, and Thunderbird ESR 17.x before 17.0.8 on Windows 7, Windows Server 2008 R2, Windows 8, and Windows Server 2012 allow local users to gain privileges via a Trojan horse DLL in (1) the update directory or (2) the current working directory. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:19.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:19.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:20.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:21.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:17.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:17.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:17.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:17.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:17.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:17.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:17.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:-:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:-:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
]
|
|
GHSA-3q4v-7rf3-mxgq | Path Traversal vulnerability in NotFound GPX Viewer allows Path Traversal. This issue affects GPX Viewer: from n/a through 2.2.11. | []
|
|
GHSA-hw4r-hj94-jwp8 | While parsing Netlink attributes in QCA_WLAN_VENDOR_ATTR_EXTSCAN_BSSID_HOTLIST_PARAMS_LOST_AP_SAMPLE_SIZE in qcacld 2.0 before 2017-05-16, a buffer overread could occur. | []
|
|
GHSA-9j8m-fmg4-mg36 | Weak permissions on the configuration file in the PAM module in Grommunio Gromox 0.5 through 1.x before 1.28 allow a local unprivileged user in the gromox group to have the PAM stack execute arbitrary code upon loading the Gromox PAM module. | []
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.