id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
listlengths
0
5.42k
CVE-2021-26028
[20210308] - Core - Path Traversal within joomla/archive zip class
An issue was discovered in Joomla! 3.0.0 through 3.9.24. Extracting an specifilcy crafted zip package could write files outside of the intended path.
[ "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*" ]
CVE-2022-25696
Memory corruption in display due to time-of-check time-of-use race condition during map or unmap in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
[ "cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qualcomm215_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qualcomm215:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8475:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd439_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd439:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd480_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd480:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd665_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd665:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd670:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd678_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd678:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd680_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd680:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd690_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd690_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd695_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd695:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd710_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd710:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd720g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd720g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd750g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd750g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd765_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd765g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd768g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd778g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd778g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd780g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd780g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx50m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx50m:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm4125:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8475_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8475p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8475p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn7850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn7850:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn7851_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn7851:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*" ]
CVE-2024-5870
Tweaker5 <= 1.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Button Shortcode
The Tweaker5 theme for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter within the theme's Button shortcode in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[ "cpe:2.3:a:arnoldgoodway:tweaker5:*:*:*:*:*:wordpress:*:*" ]
GHSA-5v93-w7mf-hc4q
A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 SP2). The affected application does not expire the user session on reboot without logout. This could allow an attacker to bypass Multi-Factor Authentication.
[]
GHSA-fpgv-fc8m-fmmm
In the Linux kernel, the following vulnerability has been resolved:icmp: prevent possible NULL dereferences from icmp_build_probe()First problem is a double call to __in_dev_get_rcu(), because the second one could return NULL.if (__in_dev_get_rcu(dev) && __in_dev_get_rcu(dev)->ifa_list)Second problem is a read from dev->ip6_ptr with no NULL check:if (!list_empty(&rcu_dereference(dev->ip6_ptr)->addr_list))Use the correct RCU API to fix these.v2: add missing include <net/addrconf.h>
[]
GHSA-xwx2-g2mj-g29r
Cross-site scripting (XSS) vulnerability in jax_linklists.php in Jack (tR) Jax LinkLists 1.00 allows remote attackers to inject arbitrary web script or HTML via the cat parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
CVE-2022-21510
Vulnerability in the Oracle Database - Enterprise Edition Sharding component of Oracle Database Server. For supported versions that are affected see note. Easily exploitable vulnerability allows low privileged attacker having Local Logon privilege with logon to the infrastructure where Oracle Database - Enterprise Edition Sharding executes to compromise Oracle Database - Enterprise Edition Sharding. While the vulnerability is in Oracle Database - Enterprise Edition Sharding, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Database - Enterprise Edition Sharding. Note: None of the supported versions are affected. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
[ "cpe:2.3:a:oracle:database:-:*:*:*:enterprise:*:*:*" ]
GHSA-97hh-rrpx-8434
An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS allows an unauthenticated attacker with local access to the device to create a backdoor with root privileges. The issue is caused by improper directory permissions on a certain system directory, allowing an attacker with access to this directory to create a backdoor with root privileges.This issue affects Juniper Networks Junos OS:All versions prior to 20.4R3-S5;21.1 versions prior to 21.1R3-S4;21.2 versions prior to 21.2R3-S4;21.3 versions prior to 21.3R3-S3;21.4 versions prior to 21.4R3-S1.
[]
GHSA-h4v8-pm3p-jrv2
Adobe Dimension versions 3.4.5 is affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
GHSA-jc6h-6j87-fx8m
An issue was discovered in GitLab Community and Enterprise Edition before 11.8.9, 11.9.x before 11.9.10, and 11.10.x before 11.10.2. It has a Race Condition which could allow users to approve a merge request multiple times and potentially reach the approval count required to merge.
[]
GHSA-4f29-4fj4-943j
Yamaha LTE VoIP Router(NVR700W firmware Rev.15.00.15 and earlier), Yamaha Gigabit VoIP Router(NVR510 firmware Rev.15.01.14 and earlier), Yamaha Gigabit VPN Router(RTX810 firmware Rev.11.01.33 and earlier, RTX830 firmware Rev.15.02.09 and earlier, RTX1200 firmware Rev.10.01.76 and earlier, RTX1210 firmware Rev.14.01.33 and earlier, RTX3500 firmware Rev.14.00.26 and earlier, and RTX5000 firmware Rev.14.00.26 and earlier), Yamaha Broadband VoIP Router(NVR500 firmware Rev.11.00.38 and earlier), and Yamaha Firewall(FWX120 firmware Rev.11.03.27 and earlier) allow remote attackers to cause a denial of service via unspecified vectors.
[]
CVE-2024-45071
IBM WebSphere Application Server cross-site scripting
IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to stored cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
[ "cpe:2.3:a:ibm:websphere_application_server:8.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:z\\/os:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*" ]
CVE-2025-25330
An issue in Boohee Technology Boohee Health iOS 13.0.13 allows attackers to access sensitive user information via supplying a crafted link.
[]
CVE-2000-0071
IIS 4.0 allows a remote attacker to obtain the real pathname of the document root by requesting non-existent files with .ida or .idq extensions.
[ "cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*" ]
GHSA-7w35-8v2m-9grg
Insecure inherited permissions in some Intel(R) HID Event Filter software installers before version 2.2.2.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
CVE-2021-23420
Deserialization of Untrusted Data
This affects the package codeception/codeception from 4.0.0 and before 4.1.22, before 3.1.3. The RunProcess class can be leveraged as a gadget to run arbitrary commands on a system that is deserializing user input without validation.
[ "cpe:2.3:a:codeception:codeception:*:*:*:*:*:*:*:*" ]
GHSA-463r-p989-2f9j
Serving WebSocket protocol upgrades over a HTTP/2 connection could result in a Null Pointer dereference, leading to a crash of the server process, degrading performance.
[]
GHSA-9v9h-cgj8-h64p
Null pointer dereference in PKCS12 parsing
Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attackImpact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly.A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue.OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass().We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significant.The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.
[]
CVE-2024-12933
code-projects Simple Admin Panel updateItemController.php cross site scripting
A vulnerability was found in code-projects Simple Admin Panel 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file updateItemController.php. The manipulation of the argument p_name/p_desc leads to cross site scripting. The attack may be launched remotely.
[]
CVE-2018-11451
A vulnerability has been identified in Firmware variant IEC 61850 for EN100 Ethernet module (All versions < V4.33), Firmware variant PROFINET IO for EN100 Ethernet module (All versions), Firmware variant Modbus TCP for EN100 Ethernet module (All versions), Firmware variant DNP3 TCP for EN100 Ethernet module (All versions), Firmware variant IEC104 for EN100 Ethernet module (All versions < V1.22), SIPROTEC 5 relays with CPU variants CP300 and CP100 and the respective Ethernet communication modules (All versions < V7.80), SIPROTEC 5 relays with CPU variants CP200 and the respective Ethernet communication modules (All versions < V7.58). Specially crafted packets to port 102/tcp could cause a denial-of-service condition in the affected products. A manual restart is required to recover the EN100 module functionality of the affected devices. Successful exploitation requires an attacker with network access to send multiple packets to the affected products or modules. As a precondition the IEC 61850-MMS communication needs to be activated on the affected products or modules. No user interaction or privileges are required to exploit the vulnerability. The vulnerability could allow causing a Denial-of-Service condition of the network functionality of the device, compromising the availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known.
[ "cpe:2.3:o:siemens:dnp3_tcp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:iec_61850_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:iec104_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:modbus_tcp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:profinet_io_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:en100:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:cp100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:cp200_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:cp300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6md85:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6md86:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7ke85:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7sa82:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7sa86:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7sa87:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7sd82:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7sd86:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7sd87:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7sj82:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7sj85:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7sj86:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7sk82:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7sk85:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7sl82:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7sl86:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7sl87:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7ss85:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7um85:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7ut82:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7ut85:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7ut86:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7ut87:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7vk87:-:*:*:*:*:*:*:*" ]
CVE-2008-1318
Unspecified vulnerability in MediaWiki 1.11 before 1.11.2 allows remote attackers to obtain sensitive "cross-site" information via the callback parameter in an API call for JavaScript Object Notation (JSON) formatted results.
[ "cpe:2.3:a:mediawiki:mediawiki:1.11:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.11.1:*:*:*:*:*:*:*" ]
CVE-2002-0922
CGIScript.net csNews.cgi allows remote attackers to obtain database files via a direct URL-encoded request to (1) default%2edb or (2) default%2edb.style, or remote authenticated users to perform administrative actions via (3) a database parameter set to default%2edb.
[ "cpe:2.3:a:cgiscript.net:csnews:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cgiscript.net:csnews:1.0_professional:*:*:*:*:*:*:*" ]
GHSA-vpw8-43wm-rxw5
Double free in endian_trait
An issue was discovered in the endian_trait crate through 2021-01-04 for Rust. A double drop can occur when a user-provided Endian impl panics.
[]
GHSA-76q3-ghmm-vj23
In the Linux kernel, the following vulnerability has been resolved:ACPI: CPPC: Make rmw_lock a raw_spin_lockThe following BUG was triggered:============================= [ BUG: Invalid wait context ] 6.12.0-rc2-XXX #406 Not taintedkworker/1:1/62 is trying to lock: ffffff8801593030 (&cpc_ptr->rmw_lock){+.+.}-{3:3}, at: cpc_write+0xcc/0x370 other info that might help us debug this: context-{5:5} 2 locks held by kworker/1:1/62: #0: ffffff897ef5ec98 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2c/0x50 #1: ffffff880154e238 (&sg_policy->update_lock){....}-{2:2}, at: sugov_update_shared+0x3c/0x280 stack backtrace: CPU: 1 UID: 0 PID: 62 Comm: kworker/1:1 Not tainted 6.12.0-rc2-g9654bd3e8806 #406 Workqueue: 0x0 (events) Call trace: dump_backtrace+0xa4/0x130 show_stack+0x20/0x38 dump_stack_lvl+0x90/0xd0 dump_stack+0x18/0x28 __lock_acquire+0x480/0x1ad8 lock_acquire+0x114/0x310 _raw_spin_lock+0x50/0x70 cpc_write+0xcc/0x370 cppc_set_perf+0xa0/0x3a8 cppc_cpufreq_fast_switch+0x40/0xc0 cpufreq_driver_fast_switch+0x4c/0x218 sugov_update_shared+0x234/0x280 update_load_avg+0x6ec/0x7b8 dequeue_entities+0x108/0x830 dequeue_task_fair+0x58/0x408 __schedule+0x4f0/0x1070 schedule+0x54/0x130 worker_thread+0xc0/0x2e8 kthread+0x130/0x148 ret_from_fork+0x10/0x20sugov_update_shared() locks a raw_spinlock while cpc_write() locks a spinlock.To have a correct wait-type order, update rmw_lock to a raw spinlock and ensure that interrupts will be disabled on the CPU holding it.[ rjw: Changelog edits ]
[]
CVE-2017-8703
The Microsoft Windows Subsystem for Linux on Microsoft Windows 10 1703 allows a denial of service vulnerability when it improperly handles objects in memory, aka "Windows Subsystem for Linux Denial of Service Vulnerability".
[ "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*" ]
GHSA-2jpv-47cx-7mgq
A buffer overflow vulnerability exists in the GetValue functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted configuration value can lead to a buffer overflow. An attacker can modify a configuration value to trigger this vulnerability.This vulnerability represents all occurances of the buffer overflow vulnerability within the libcommonprod.so binary.
[]
CVE-2023-22756
Unauthenticated Buffer Overflow Vulnerabilities in ArubaOS Processes
There are buffer overflow vulnerabilities in multiple underlying operating system processes that could lead to unauthenticated remote code execution by sending specially crafted packets via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.
[ "cpe:2.3:a:arubanetworks:sd-wan:*:*:*:*:*:*:*:*", "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*" ]
CVE-2023-20220
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system. To exploit these vulnerabilities, the attacker must have valid device credentials, but does not need Administrator privileges. These vulnerabilities are due to insufficient validation of user-supplied input for certain configuration options. An attacker could exploit these vulnerabilities by using crafted input within the device configuration GUI. A successful exploit could allow the attacker to execute arbitrary commands on the device, including on the underlying operating system, which could also affect the availability of the device.
[ "cpe:2.3:h:cisco:firepower_management_center:-:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*" ]
GHSA-4j59-hfw6-6w7h
Downloads Resources over HTTP in cmake
Affected versions of `cmake` insecurely download an executable over an unencrypted HTTP connection.In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `cmake`.RecommendationNo patch is currently available for this vulnerability.The best mitigation is currently to avoid using this package, using a different package if available, or installing the cmake binaries via a system package manager, such as `apt-get`.Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[]
CVE-2013-5016
Symantec Critical System Protection (SCSP) before 5.2.9, when installed on an unpatched Windows Server 2003 R2 platform, allows remote attackers to bypass policy settings via unspecified vectors.
[ "cpe:2.3:a:broadcom:symantec_critical_system_protection:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:*:r2:*:*:*:*:*:*" ]
CVE-2017-13681
Symantec Endpoint Protection prior to SEP 12.1 RU6 MP9 could be susceptible to a privilege escalation vulnerability, which is a type of issue that allows a user to gain elevated access to resources that are normally protected at lower access levels. In the circumstances of this issue, the capability of exploit is limited by the need to perform multiple file and directory writes to the local filesystem and as such, is not feasible in a standard drive-by type attack.
[ "cpe:2.3:a:symantec:endpoint_protection:*:m9:*:*:*:*:*:*" ]
GHSA-582f-p4pg-xc74
Regular Expression Denial of Service in csv-parse
Versions of `csv-parse` prior to 4.4.6 are vulnerable to Regular Expression Denial of Service. The `__isInt()` function contains a malformed regular expression that processes large specially-crafted input very slowly, leading to a Denial of Service. This is triggered when using the `cast` option.RecommendationUpgrade to version 4.4.6 or later.
[]
GHSA-4m2m-4c4q-xx7m
RG-NBR-E Enterprise Gateway RG-NBR2100G-E was discovered to contain an arbitrary file read vulnerability via the url parameter in check.php.
[]
CVE-2018-6032
Insufficient policy enforcement in Blink in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially leak user cross-origin data via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
GHSA-4rhq-vpg8-62j3
In Whitechapel, there is a possible out of bounds read due to memory corruption. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
GHSA-fgjm-pghw-gf5m
In telephony service, there is a possible missing permission check. This could lead to remote information disclosure no additional execution privileges needed
[]
CVE-2021-0938
In memzero_explicit of compiler-clang.h, there is a possible bypass of defense in depth due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-171418586References: Upstream kernel
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
GHSA-96xr-96m2-7jh5
Directory traversal vulnerability in phpinc/news.php in actSite 1.56 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the do parameter.
[]
CVE-2024-30645
Tenda AC15V1.0 V15.03.20_multi has a command injection vulnerability via the deviceName parameter.
[ "cpe:2.3:o:tenda:ac15v1.0_firmware:15.03.20_multi:*:*:*:*:*:*:*" ]
GHSA-pf33-g3xv-r9v8
Multiple cross-site scripting (XSS) vulnerabilities in DKScript.com Dragon's Kingdom Script 1.0 allow remote attackers to inject arbitrary web script or HTML via a javascript URI in the SRC attribute of an IMG element in the (1) Subject and (2) Message fields in a do=write (aka Send Mail Message) action in gamemail.php; the (3) Gender, (4) Country/Location, (5) MSN Messenger, (6) AOL Instant Messenger, (7) Yahoo Instant Messenger, and (8) ICQ fields in a do=onlinechar (aka Edit your Profile) action in index.php, as accessed by dk.php; a javascript URI in the SRC attribute of an IMG element in the (9) Title and (10) Message fields in a do=new (aka Create Thread) action in general.php; and a javascript URI in the SRC attribute of an IMG element in unspecified fields in (11) other Forum posts and (12) Forum replies.
[]
CVE-2010-2455
Opera does not properly manage the address bar between the request to open a URL and the retrieval of the new document's content, which might allow remote attackers to conduct spoofing attacks via a crafted HTML document, a related issue to CVE-2010-1206.
[ "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.53:b:*:*:*:*:*:*" ]
GHSA-qph7-xc8r-fqmj
Digigram's PYKO-OUT audio-over-IP (AoIP) web-server does not require a password by default, allowing any attacker with the target IP address to connect and compromise the device, potentially pivoting to connected network or hardware devices.
[]
CVE-2016-4898
The datamover module in the Linux version of NovaBACKUP DataCenter before 09.06.03.0353 is vulnerable to remote command execution via unspecified attack vectors.
[ "cpe:2.3:a:novastor:novabackup_datacenter:-:*:*:*:*:*:*:*" ]
CVE-2024-32005
Local File Inclusion in NiceGUI leaflet component
NiceGUI is an easy-to-use, Python-based UI framework. A local file inclusion is present in the NiceUI leaflet component when requesting resource files under the `/_nicegui/{__version__}/resources/{key}/{path:path}` route. As a result any file on the backend filesystem which the web server has access to can be read by an attacker with access to the NiceUI leaflet website. This vulnerability has been addressed in version 1.4.21. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ "cpe:2.3:a:zauberzeug:nicegui:*:*:*:*:*:*:*:*" ]
CVE-2014-7336
The Taking Your Company Public (aka biz.app4mobile.app_016e43d03ee54d1facd6c9532a00e724.app) application 1.28.44.441 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:princetoncorporatesolutions:taking_your_company_public:1.28.44.441:*:*:*:*:android:*:*" ]
CVE-2004-0336
LAN SUITE Web Mail 602Pro allows remote attackers to gain sensitive information via the mail login form, which contains the path to the mail directory.
[ "cpe:2.3:a:software602:602pro_lan_suite:2002:*:*:*:*:*:*:*", "cpe:2.3:a:software602:602pro_lan_suite:2003:*:*:*:*:*:*:*" ]
CVE-2023-37467
Discourse CSP nonce reuse vulnerability for anonymous users
Discourse is an open source discussion platform. Prior to version 3.1.0.beta7 of the `beta` and `tests-passed` branches, a CSP (Content Security Policy) nonce reuse vulnerability was discovered could allow cross-site scripting (XSS) attacks to bypass CSP protection for anonymous (i.e. unauthenticated) users. There are no known XSS vectors at the moment, but should one be discovered, this vulnerability would allow the XSS attack to bypass CSP and execute successfully. This vulnerability isn't applicable to logged-in users. Version 3.1.0.beta7 contains a patch. The stable branch doesn't have this vulnerability. A workaround to prevent the vulnerability is to disable Google Tag Manager, i.e., unset the `gtm container id` setting.
[ "cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta6b:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta12:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta12:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta13:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta13b:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta14:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta12:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta12:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta13:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta12:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta13:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta14:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta15:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta16:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta17:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.1.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.1.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.1.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.1.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.1.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.1.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.5.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.5.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.5.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.5.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.5.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.5.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.5.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.6.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.6.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.6.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.6.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.6.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.6.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta12:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta13:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta14:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:3.0.0:beta15:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:3.0.0:beta16:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:3.1.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:3.1.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:3.1.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:3.1.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:3.1.0:beta6:*:*:beta:*:*:*" ]
GHSA-wj86-wmr8-wpx4
Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6.7 allows a local attacker to execute arbitrary code via a crafted script to the Backend - Dashboard parameter in the Languages Menu component.
[]
GHSA-6j47-h927-wmwr
** DISPUTED ** The ipv6_getsockopt_sticky function in the kernel in Red Hat Enterprise Linux (RHEL) Beta 5.1.0 allows local users to obtain sensitive information (kernel memory contents) via a negative value of the len parameter. NOTE: this issue has been disputed in a bug comment, stating that "len is ignored when copying header info to the user's buffer."
[]
CVE-2021-38131
Cross-Site Scripting (XSS) Vulnerability
Possible Cross-Site Scripting (XSS) Vulnerability in eDirectory has been discovered in OpenText™ eDirectory 9.2.5.0000.
[ "cpe:2.3:a:microfocus:edirectory:*:*:*:*:*:*:*:*" ]
GHSA-47gg-6526-hq9v
The DB service in IBM System Networking Switch Center (SNSC) before 7.3.1.5 and Lenovo Switch Center before 8.1.2.0 allows remote attackers to obtain sensitive administrator-account information via a request on port 40999, as demonstrated by an improperly encrypted password.
[]
CVE-2019-6196
A symbolic link vulnerability in some Lenovo installation packages, prior to version 1.2.9.3, could allow privileged file operations during file extraction and installation.
[ "cpe:2.3:a:lenovo:installation_package:*:*:*:*:*:*:*:*" ]
GHSA-jcff-w8hg-gx77
EGavilanMedia User Registration and Login System With Admin Panel 1.0 is affected by SQL injection in the User Login Page.
[]
GHSA-6fr4-8mj5-5xc5
kmmodreg in HP-UX 11.11, 11.04 and 11.00 allows local users to create arbitrary world-writeable files via a symlink attack on the (1) /tmp/.kmmodreg_lock and (2) /tmp/kmpath.tmp temporary files.
[]
CVE-2022-0136
A vulnerability was discovered in GitLab versions 10.5 to 14.5.4, 14.6 to 14.6.4, and 14.7 to 14.7.1. GitLab was vulnerable to a blind SSRF attack through the Project Import feature.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*" ]
GHSA-f7rw-4wx7-r7g2
Microsoft Office 2007 SP2 and SP3 and 2010 SP1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Computer Graphics Metafile (CGM) file, aka "CGM File Format Memory Corruption Vulnerability."
[]
CVE-2011-1984
WINS in Microsoft Windows Server 2003 SP2 and Server 2008 SP2, R2, and R2 SP1 allows local users to gain privileges by sending crafted packets over the loopback interface, aka "WINS Local Elevation of Privilege Vulnerability."
[ "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*" ]
GHSA-c8jh-vcjh-fx2w
usememos/memos vulnerable to stored cross-site scripting (XSS)
usememos/memos is an open-source, self-hosted memo hub with knowledge management and socialization. Memos prior to 0.9.0 has a feature to upload file and display it, and by uploading a crafted SVG file, an attacker could perform a stored cross-site scripting attack with the image direct link. This was patched in version 0.9.0.
[]
CVE-2024-44132
This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Sequoia 15. An app may be able to break out of its sandbox.
[ "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
CVE-2018-14781
Medtronic MiniMed MMT-500/MMT-503 Remote Controllers Authentication Bypass by Capture-replay
Medtronic MiniMed MMT devices when paired with a remote controller and having the “easy bolus” and “remote bolus” options enabled (non-default), are vulnerable to a capture-replay attack. An attacker can capture the wireless transmissions between the remote controller and the pump and replay them to cause an insulin (bolus) delivery.
[ "cpe:2.3:o:medtronicdiabetes:508_minimed_insulin_pump_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:medtronicdiabetes:508_minimed_insulin_pump:-:*:*:*:*:*:*:*", "cpe:2.3:o:medtronicdiabetes:522_paradigm_real-time_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:medtronicdiabetes:522_paradigm_real-time:-:*:*:*:*:*:*:*", "cpe:2.3:o:medtronicdiabetes:722_paradigm_real-time_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:medtronicdiabetes:722_paradigm_real-time:-:*:*:*:*:*:*:*", "cpe:2.3:o:medtronicdiabetes:523_paradigm_revel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:medtronicdiabetes:523_paradigm_revel:-:*:*:*:*:*:*:*", "cpe:2.3:o:medtronicdiabetes:723_paradigm_revel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:medtronicdiabetes:723_paradigm_revel:-:*:*:*:*:*:*:*", "cpe:2.3:o:medtronicdiabetes:523k_paradigm_revel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:medtronicdiabetes:523k_paradigm_revel:-:*:*:*:*:*:*:*", "cpe:2.3:o:medtronicdiabetes:723k_paradigm_revel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:medtronicdiabetes:723k_paradigm_revel:-:*:*:*:*:*:*:*", "cpe:2.3:o:medtronicdiabetes:551_minimed_530g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:medtronicdiabetes:551_minimed_530g:-:*:*:*:*:*:*:*", "cpe:2.3:o:medtronicdiabetes:751_minimed_530g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:medtronicdiabetes:751_minimed_530g:-:*:*:*:*:*:*:*" ]
CVE-2019-15587
In the Loofah gem for Ruby through v2.3.0 unsanitized JavaScript may occur in sanitized output when a crafted SVG element is republished.
[ "cpe:2.3:a:loofah_project:loofah:*:*:*:*:*:ruby:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
GHSA-cgqm-vxrq-vp47
The VikRentCar Car Rental Management System plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the do_updatecar and createcar functions in all versions up to, and including, 1.4.3. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server, which may make remote code execution possible.
[]
GHSA-x4qg-m523-2cjh
sshd program in the Rapidstream 2.1 Beta VPN appliance has a hard-coded "rsadmin" account with a null password, which allows remote attackers to execute arbitrary commands via ssh.
[]
GHSA-p2xq-64qm-cf6f
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HasThemes HT Mega allows Stored XSS.This issue affects HT Mega: from n/a through 2.4.3.
[]
GHSA-444g-7h8r-45m8
Internet Communication Manager (aka ICMAN.exe or ICM) in SAP NetWeaver Application Server 6.x and 7.x, possibly only on Windows, allows remote attackers to cause a denial of service (process crash) via a URI of a certain length that contains a sap-isc-key parameter, related to configuration of a web cache.
[]
CVE-2008-1624
Directory traversal vulnerability in v2demo/page.php in Jshop Server 1.x through 2.x allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the xPage parameter.
[ "cpe:2.3:a:whorl_ltd:jshop_server:1:*:*:*:*:*:*:*", "cpe:2.3:a:whorl_ltd:jshop_server:2:*:*:*:*:*:*:*" ]
GHSA-qqr6-vm23-m488
Galaxy cross-site scripting (XSS)
The Galaxy Project Galaxy version v14.10 contains a CWE-79: Improper Neutralization of Input During Web Page Generation vulnerability in Many templates used in the Galaxy server did not properly sanitize user's input, which would allow for cross-site scripting (XSS) attacks. In this form of attack, a malicious person can create a URL which, when opened by a Galaxy user or administrator, would allow the malicious user to execute arbitrary Javascript. that can result in Arbitrary JavaScript code execution. This attack appear to be exploitable via The victim must interact with component on page witch contains injected JavaScript code.. This vulnerability appears to have been fixed in v14.10.1, v15.01.
[]
CVE-2020-3496
Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability
A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause the switch management CLI to stop responding, resulting in a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected.
[ "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg200-50fp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg200-26fp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg200-10fp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg200-08_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg200-08p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf200-24fp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250x-24_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250x-24:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250x-24p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250x-24p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250x-48_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250x-48:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250x-48p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250x-48p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250-08_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250-08:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250-08hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250-08hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250-10p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250-10p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250-18_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250-18:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250-26_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250-26:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250-26hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250-26hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250-26p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250-26p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250-50_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250-50:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250-50hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250-50hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250-50p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250-50p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf250-24_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf250-24p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf250-48_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf250-48hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350xg-2f10_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350xg-24f_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350xg-24t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350xg-48t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350x-24_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350x-24p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350x-24mp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350x-48_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350x-48p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350x-48mp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*" ]
CVE-2013-1920
Xen 4.2.x, 4.1.x, and earlier, when the hypervisor is running "under memory pressure" and the Xen Security Module (XSM) is enabled, uses the wrong ordering of operations when extending the per-domain event channel tracking table, which causes a use-after-free and allows local guest kernels to inject arbitrary events and gain privileges via unspecified vectors.
[ "cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*" ]
CVE-2019-18818
strapi before 3.0.0-beta.17.5 mishandles password resets within packages/strapi-admin/controllers/Auth.js and packages/strapi-plugin-users-permissions/controllers/Auth.js.
[ "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha10.1:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha10.2:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha10.3:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha11:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha11.1:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha11.2:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha11.3:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha12:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.1:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.1.3:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.2:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.3:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.4:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.5:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.6:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.7:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.7.1:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha13:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha13.0.1:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha13.1:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha14:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha14.1:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha14.1.1:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha14.2:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha14.3:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha14.4.0:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha14.5:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha15:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha16:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha17:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha18:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha19:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha20:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha21:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha22:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha23:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha23.1:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha24:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha24.1:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha25:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha25.1:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha25.2:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha26:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha26.1:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha26.2:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha4:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha4.8:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha5.3:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha5.5:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha6.3:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha6.4:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha6.7:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha7.2:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha7.3:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha8:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha8.3:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha9:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha9.1:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:alpha9.2:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:beta0:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:beta10:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:beta11:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:beta12:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:beta13:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:beta14:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:beta15:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:beta16:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:beta16.1:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:beta16.2:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:beta16.3:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:beta16.4:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:beta16.5:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:beta16.6:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:beta16.7:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:beta16.8:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:beta17:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:beta17.1:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:beta17.2:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:beta17.3:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:beta17.4:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:beta7:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:beta8:*:*:*:*:*:*", "cpe:2.3:a:strapi:strapi:3.0.0:beta9:*:*:*:*:*:*" ]
GHSA-p98r-qmj8-g8hj
Tenda AC18 v15.03.05.19 is vulnerable to Buffer Overflow in the formSetPPTPServer function via the endIp parameter.
[]
CVE-2021-31843
Improper access control vulnerability in McAfee ENS for Windows
Improper privileges management vulnerability in McAfee Endpoint Security (ENS) Windows prior to 10.7.0 September 2021 Update allows local users to access files which they would otherwise not have access to via manipulating junction links to redirect McAfee folder operations to an unintended location.
[ "cpe:2.3:a:mcafee:endpoint_security:*:*:*:*:*:windows:*:*", "cpe:2.3:a:mcafee:endpoint_security:10.7.0:-:*:*:*:windows:*:*", "cpe:2.3:a:mcafee:endpoint_security:10.7.0:april_2020:*:*:*:windows:*:*", "cpe:2.3:a:mcafee:endpoint_security:10.7.0:april_2021:*:*:*:windows:*:*", "cpe:2.3:a:mcafee:endpoint_security:10.7.0:february_2020:*:*:*:windows:*:*", "cpe:2.3:a:mcafee:endpoint_security:10.7.0:february_2021:*:*:*:windows:*:*", "cpe:2.3:a:mcafee:endpoint_security:10.7.0:july_2020:*:*:*:windows:*:*", "cpe:2.3:a:mcafee:endpoint_security:10.7.0:june_2021:*:*:*:windows:*:*", "cpe:2.3:a:mcafee:endpoint_security:10.7.0:november_2020:*:*:*:windows:*:*", "cpe:2.3:a:mcafee:endpoint_security:10.7.0:september_2020:*:*:*:windows:*:*" ]
CVE-2017-0417
An elevation of privilege vulnerability in Audioserver could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32705438.
[ "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*" ]
GHSA-3g3r-759p-gmmj
TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a post-authentication buffer overflow via parameter week, sTime, and eTime in the setParentalRules function.
[]
CVE-2019-14089
u'Keymaster attestation key and device IDs provisioning which is a one time process is incorrectly allowed to be re-provisioned after a user data erase or a factory reset' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in Kamorta, Nicobar, QCS404, QCS610, Rennell, SA515M, SA6155P, SC7180, SC8180X, SDX55, SM6150, SM7150, SM8150, SM8250, SXR2130
[ "cpe:2.3:o:qualcomm:kamorta_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:kamorta:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:nicobar_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:nicobar:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs404_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs404:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa515m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa515m:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sc7180_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sc7180:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sc8180x:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*" ]
CVE-2022-1991
Fast Food Ordering System Master List Master.php cross site scripting
A vulnerability classified as problematic has been found in Fast Food Ordering System 1.0. Affected is the file Master.php of the Master List. The manipulation of the argument Description with the input foo "><img src="" onerror="alert(document.cookie)"> leads to cross site scripting. It is possible to launch the attack remotely but it requires authentication. Exploit details have been disclosed to the public.
[ "cpe:2.3:a:fast_food_ordering_system_project:fast_food_ordering_system:1.0:*:*:*:*:*:*:*" ]
GHSA-p9wc-6qg4-wxc8
IBM Security Information Queue (ISIQ) 1.0.0, 1.0.1, 1.0.2, 1.0.3, and 1.0.4 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 176206.
[]
GHSA-3p47-qj26-6gg7
In the Linux kernel, the following vulnerability has been resolved:mlxbf-bootctl: use sysfs_emit_at() in secure_boot_fuse_state_show()A warning is seen when running the latest kernel on a BlueField SOC: [251.512704] ------------[ cut here ]------------ [251.512711] invalid sysfs_emit: buf:0000000003aa32ae [251.512720] WARNING: CPU: 1 PID: 705264 at fs/sysfs/file.c:767 sysfs_emit+0xac/0xc8The warning is triggered because the mlxbf-bootctl driver invokes "sysfs_emit()" with a buffer pointer that is not aligned to the start of the page. The driver should instead use "sysfs_emit_at()" to support non-zero offsets into the destination buffer.
[]
CVE-2017-7542
The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
GHSA-jq68-96jh-4wjh
The drm_ioctl function in drivers/gpu/drm/drm_drv.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.27.53, 2.6.32.x before 2.6.32.21, 2.6.34.x before 2.6.34.6, and 2.6.35.x before 2.6.35.4 allows local users to obtain potentially sensitive information from kernel memory by requesting a large memory-allocation amount.
[]
CVE-2023-37280
Pimcore admin UI vulnerable to Cross-site Scripting in two factor authentication setup page
Pimcore Admin Classic Bundle provides a Backend UI for Pimcore based on the ExtJS framework. An admin who has not setup two factor authentication before is vulnerable for this attack, without need for any form of privilege, causing the application to execute arbitrary scripts/HTML content. This vulnerability has been patched in version 1.0.3.
[ "cpe:2.3:a:pimcore:admin_classic_bundle:*:*:*:*:*:pimcore:*:*" ]
GHSA-f624-74px-f7hv
A vulnerability was found in TOTOLINK EX1800T up to 9.1.0cu.2112_B20220316. It has been classified as critical. Affected is the function setPasswordCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument admpass leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
CVE-2014-3651
JBoss KeyCloak before 1.0.3.Final allows remote attackers to cause a denial of service (resource consumption) via a large value in the size parameter to auth/qrcode, related to QR code generation.
[ "cpe:2.3:a:keycloak:keycloak:*:*:*:*:*:*:*:*" ]
GHSA-wmh3-2439-2hpr
Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_string_offset at src/njs_string.c.
[]
CVE-2023-53097
powerpc/iommu: fix memory leak with using debugfs_lookup()
In the Linux kernel, the following vulnerability has been resolved: powerpc/iommu: fix memory leak with using debugfs_lookup() When calling debugfs_lookup() the result must have dput() called on it, otherwise the memory will leak over time. To make things simpler, just call debugfs_lookup_and_remove() instead which handles all of the logic at once.
[]
CVE-2015-0591
Cisco Unified Communications Domain Manager (UCDM) 10 allows remote attackers to cause a denial of service (daemon hang and GUI outage) via a flood of malformed TCP packets, aka Bug ID CSCur44177.
[ "cpe:2.3:a:cisco:unified_communications_domain_manager:10.0:*:*:*:*:*:*:*" ]
GHSA-57gp-qx9r-6m7m
A vulnerability in the boot logic of Cisco IOS XE Software could allow an authenticated, local attacker with level 15 privileges or an unauthenticated attacker with physical access to execute arbitrary code on the underlying Linux operating system of an affected device. This vulnerability is due to incorrect validations of specific function arguments that are passed to the boot script. An attacker could exploit this vulnerability by tampering with a specific file, which an affected device would process during the initial boot process. On systems that are protected by the Unified Extensible Firmware Interface (UEFI) secure boot feature, a successful exploit could allow the attacker to execute unsigned code at boot time and bypass the image verification check in the secure boot process of the affected device.
[]
CVE-2024-55959
Northern.tech Mender Client 4.x before 4.0.5 has Insecure Permissions.
[]
GHSA-3f9v-x6pf-3296
The tr_rx function in ibmtr.c for Linux kernel 2.6.19 assigns the wrong flag to the ip_summed field, which allows remote attackers to cause a denial of service (memory corruption) via crafted packets that cause the kernel to interpret another field as an offset.
[]
CVE-2001-1212
Cross-site scripting vulnerability in catgy.cgi for Aktivate 1.03 allows remote attackers to execute arbitrary Javascript via the desc parameter.
[ "cpe:2.3:a:aktivate:aktivate:1.03:*:*:*:*:*:*:*" ]
GHSA-v735-hrpq-c278
A reflected Cross-site Scripting (XSS) vulnerability affecting 3DSwymer from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session.
[]
GHSA-m5gv-wj6x-54cq
The (1) fwdrv.sys and (2) khips.sys drivers in Sunbelt Kerio Personal Firewall 4.3.268 and earlier do not validate arguments passed through to SSDT functions, including NtCreateFile, NtDeleteFile, NtLoadDriver, NtMapViewOfSection, NtOpenFile, and NtSetInformationFile, which allows local users to cause a denial of service (crash) and possibly other impacts via unspecified vectors.
[]
CVE-2020-0970
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0968.
[ "cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
GHSA-mjqv-xhgm-gx8c
IO FinNet tss-lib vulnerable to timing attack from non-constant time scalar arithmetic
io.finnet tss-lib before 2.0.0 can leak the lambda value of a private key via a timing side-channel attack because it relies on Go big.Int, which is not constant time for Cmp, modular exponentiation, or modular inverse. An example leak is in crypto/paillier/paillier.go. (bnb-chain/tss-lib and thorchain/tss are also affected.)
[]
CVE-2023-29296
[Cloud] Customer suspects IDOR vulnerability
Adobe Commerce versions 2.4.6 (and earlier), 2.4.5-p2 (and earlier) and 2.4.4-p3 (and earlier) are affected by an Incorrect Authorization vulnerability that could result in a security feature bypass. A low-privileged attacker could leverage this vulnerability to modify a minor functionality of another user's data. Exploitation of this issue does not require user interaction.
[ "cpe:2.3:a:adobe:commerce:2.3.7:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:p3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:p4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.0:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.0:ext-1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.0:ext-2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.1:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.1:ext-1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.1:ext-2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.2:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.2:ext-1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.2:ext-2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.3:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.3:ext-1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.3:ext-2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*" ]
GHSA-m93w-4fxv-r35v
PocketBase performs password auth and OAuth2 unverified email linking
**In order to be exploited you must have both OAuth2 and Password auth methods enabled.**A possible attack scenario could be:a malicious actor register with the targeted user's email (it is unverified)at some later point in time the targeted user stumble on your app and decides to sign-up with OAuth2 (_this step could be also initiated by the attacker by sending an invite email to the targeted user_)on successful OAuth2 auth we search for an existing PocketBase user matching with the OAuth2 user's email and associate thembecause we haven't changed the password of the existing PocketBase user during the linking, the malicious actor has access to the targeted user account and will be able to login with the initially created email/passwordTo prevent this for happening we now reset the password for this specific case if the previously created user wasn't verified (an exception to this is if the linking is explicit/manual, aka. when you send `Authorization:TOKEN` with the OAuth2 auth call).Additionally to warn existing users we now send an email alert in case the user has logged in with password but has at least one OAuth2 account linked. It looks something like:_Hello, Just to let you know that someone has logged in to your Acme account using a password while you already have OAuth2 GitLab auth linked. If you have recently signed in with a password, you may disregard this email. **If you don't recognize the above action, you should immediately change your Acme account password.** Thanks, Acme team_The flow will be further improved with the [ongoing refactoring](https://github.com/pocketbase/pocketbase/discussions/4355) and we will start sending emails for "unrecognized device" logins (OTP and MFA is already implemented and will be available with the next v0.23.0 release in the near future).
[]
CVE-2017-9994
libavcodec/webp.c in FFmpeg before 2.8.12, 3.0.x before 3.0.8, 3.1.x before 3.1.8, 3.2.x before 3.2.5, and 3.3.x before 3.3.1 does not ensure that pix_fmt is set, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file, related to the vp8_decode_mb_row_no_filter and pred8x8_128_dc_8_c functions.
[ "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
CVE-2024-10571
Chartify – WordPress Chart Plugin <= 2.9.5 - Unauthenticated Local File Inclusion via source
The Chartify – WordPress Chart Plugin plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.9.5 via the 'source' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
[ "cpe:2.3:a:ays-pro:chartify:*:*:*:*:*:*:*:*", "cpe:2.3:a:ays-pro:chartify:*:*:*:*:free:wordpress:*:*" ]
GHSA-35w5-h9v9-m2qp
Unrestricted Upload of File with Dangerous Type vulnerability in Vasilis Kerasiotis Affiliator allows Upload a Web Shell to a Web Server.This issue affects Affiliator: from n/a through 2.1.3.
[]
CVE-2015-3380
Multiple cross-site request forgery (CSRF) vulnerabilities in the Feature Set module for Drupal allow remote attackers to hijack the authentication of administrators for requests that (1) enable or (2) disable a module via unspecified vectors.
[ "cpe:2.3:a:funnymonkey:feature_set:*:*:*:*:*:drupal:*:*" ]