id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-6cmv-j38v-h7wc
|
Microsoft Internet Explorer 6 and 7 does not properly handle objects in memory that (1) were not properly initialized or (2) are deleted, which allows remote attackers to execute arbitrary code via vectors involving a call to the getElementsByTagName method for the STYLE tag name, selection of the single element in the returned list, and a change to the outerHTML property of this element, related to Cascading Style Sheets (CSS) and mshtml.dll, aka "HTML Object Memory Corruption Vulnerability." NOTE: some of these details are obtained from third party information. NOTE: this issue was originally assigned CVE-2009-4054, but Microsoft assigned a duplicate identifier of CVE-2009-3672. CVE consumers should use this identifier instead of CVE-2009-4054.
|
[] | null | null | null | null | null |
|
CVE-2023-23824
|
WordPress WP TopBar Plugin <= 5.36 is vulnerable to SQL Injection
|
Auth. SQL Injection (SQLi) vulnerability in WP-TopBar <= 5.36 versions.
|
[
"cpe:2.3:a:wp_topbar_project:wp_topbar:*:*:*:*:*:wordpress:*:*"
] | null | 6.7 | null | null | null |
RHSA-2025:3448
|
Red Hat Security Advisory: Logging for Red Hat OpenShift - 5.8.19
|
rack: rubygem-rack: Local File Inclusion in Rack::Static
|
[
"cpe:/a:redhat:logging:5.8::el9"
] | null | 7.5 | null | null | null |
GHSA-gc28-55g9-f45f
|
ProcessMaker before v3.5.4 was discovered to contain insecure permissions in the user profile page. This vulnerability allows attackers to escalate normal users to Administrators.
|
[] | null | 8.8 | null | null | null |
|
GHSA-7g3c-hrc6-5v4j
|
Centreon XSS Vulnerability
|
Centreon 3.4.x (fixed in Centreon 18.10.0) has XSS via the resource name or macro expression of a poller macro.
|
[] | null | null | 6.1 | null | null |
CVE-2025-46956
|
Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[] | null | 5.4 | null | null | null |
GHSA-hhr2-4cvp-f289
|
The WPC Shop as a Customer for WooCommerce plugin for WordPress is vulnerable to account takeover and privilege escalation in all versions up to, and including, 1.2.8. This is due to the 'generate_key' function not producing a sufficiently random value. This makes it possible for authenticated attackers, with Subscriber-level access and above, to log in as site administrators, granted they have triggered the ajax_login() function which generates a unique key that can be used to log in.
|
[] | null | 8.1 | null | null | null |
|
RHSA-2020:2757
|
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
|
hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling
|
[
"cpe:/o:redhat:rhel_e4s:8.0::baseos"
] | null | 6.5 | 6.5 | null | null |
GHSA-5jh9-6vv3-xc89
|
There was an argument injection vulnerability in Sourcetree for Windows from version 0.5.1.0 before version 3.0.0 via Git subrepositories in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system.
|
[] | null | null | 8.8 | null | null |
|
CVE-2022-48701
|
ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface()
|
In the Linux kernel, the following vulnerability has been resolved:
ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface()
There may be a bad USB audio device with a USB ID of (0x04fa, 0x4201) and
the number of it's interfaces less than 4, an out-of-bounds read bug occurs
when parsing the interface descriptor for this device.
Fix this by checking the number of interfaces.
|
[] | null | 7.1 | null | null | null |
CVE-2019-5851
|
Use after free in WebAudio in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
CVE-2025-2716
|
China Mobile P22g-CIac Samba Path path traversal
|
A vulnerability classified as problematic was found in China Mobile P22g-CIac 1.0.00.488. This vulnerability affects unknown code of the component Samba Path Handler. The manipulation leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.1 | 2.7 | 2.7 | 3.3 | null |
CVE-2014-0659
|
The Cisco WAP4410N access point with firmware through 2.0.6.1, WRVS4400N router with firmware 1.x through 1.1.13 and 2.x through 2.0.2.1, and RVS4000 router with firmware through 2.0.3.2 allow remote attackers to read credential and configuration data, and execute arbitrary commands, via requests to the test interface on TCP port 32764, aka Bug IDs CSCum37566, CSCum43693, CSCum43700, and CSCum43685.
|
[
"cpe:2.3:o:cisco:rvs4000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rvs4000_firmware:1.3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rvs4000_firmware:1.3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rvs4000_firmware:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rvs4000_firmware:2.0.2.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rvs4000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wrvs4400n_firmware:1.1.03:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wrvs4400n_firmware:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wrvs4400n_firmware:2.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wrvs4400n_firmware:2.0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:wrvs4400n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wap4410n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wap4410n_firmware:2.0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wap4410n_firmware:2.0.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wap4410n_firmware:2.0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:wap4410n:-:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-9j9f-hvfj-j9j6
|
The kernel in Apple iOS before 8.3, Apple OS X before 10.10.3, and Apple TV before 7.2 allows attackers to cause a denial of service (out-of-bounds memory access) or obtain sensitive memory-content information via a crafted app.
|
[] | null | null | null | null | null |
|
GHSA-65c7-ppqp-3qvf
|
Directory traversal vulnerability in Metertek pagelog.cgi allows remote attackers to read arbitrary files via a .. (dot dot) attack on the "name" or "display" parameter.
|
[] | null | null | null | null | null |
|
CVE-2005-1532
|
Firefox before 1.0.4 and Mozilla Suite before 1.7.8 do not properly limit privileges of Javascript eval and Script objects in the calling context, which allows remote attackers to conduct unauthorized activities via "non-DOM property overrides," a variant of CVE-2005-1160.
|
[
"cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.4:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.5:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.5:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.6:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.6:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7.7:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2000-0149
|
Zeus web server allows remote attackers to view the source code for CGI programs via a null character (%00) at the end of a URL.
|
[
"cpe:2.3:a:zeus_technologies:zeus_web_server:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zeus_technologies:zeus_web_server:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zeus_technologies:zeus_web_server:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zeus_technologies:zeus_web_server:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zeus_technologies:zeus_web_server:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:zeus_technologies:zeus_web_server:3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:zeus_technologies:zeus_web_server:3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:zeus_technologies:zeus_web_server:3.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:zeus_technologies:zeus_web_server:3.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:zeus_technologies:zeus_web_server:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zeus_technologies:zeus_web_server:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zeus_technologies:zeus_web_server:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zeus_technologies:zeus_web_server:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zeus_technologies:zeus_web_server:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zeus_technologies:zeus_web_server:3.3.5:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-46h3-h47p-jqf7
|
Windows Event Tracing Information Disclosure Vulnerability
|
[] | null | 5.5 | null | null | null |
|
ICSA-22-032-01
|
Ricon Mobile Industrial Cellular Router
|
The affected product is vulnerable to an authenticated OS command injection, which may allow an attacker to inject and execute arbitrary shell commands as the Admin (root) user.CVE-2022-0365 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H).
|
[] | null | null | 9.1 | null | null |
CVE-2024-37475
|
WordPress Newspack Newsletters plugin <= 2.13.2 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in Automattic Newspack Newsletters allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Newspack Newsletters: from n/a through 2.13.2.
|
[
"cpe:2.3:a:automattic:newspack_newsletters:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
CVE-2012-3964
|
Use-after-free vulnerability in the gfxTextRun::GetUserData function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
|
[
"cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:10.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:10.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:10.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:10.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.24:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.25:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:12.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.5:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:10.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.4:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.4:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.4:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.5:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.5:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.6:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.6:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.6:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.6:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.8:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.8:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.8:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.8:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.8:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.8:beta6:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.9:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.9:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.9:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2024-3110
|
Stored XSS leading to admin account takeover in mintplex-labs/anything-llm
|
A stored Cross-Site Scripting (XSS) vulnerability exists in the mintplex-labs/anything-llm application, affecting versions up to and including the latest before 1.0.0. The vulnerability arises from the application's failure to properly sanitize and validate user-supplied URLs before embedding them into the application UI as external links with custom icons. Specifically, the application does not prevent the inclusion of 'javascript:' protocol payloads in URLs, which can be exploited by a user with manager role to execute arbitrary JavaScript code in the context of another user's session. This flaw can be leveraged to steal the admin's authorization token by crafting malicious URLs that, when clicked by the admin, send the token to an attacker-controlled server. The attacker can then use this token to perform unauthorized actions, escalate privileges to admin, or directly take over the admin account. The vulnerability is triggered when the malicious link is opened in a new tab using either the CTRL + left mouse button click or the mouse scroll wheel click, or in some non-updated versions of modern browsers, by directly clicking on the link.
|
[
"cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:*"
] | null | null | 7.3 | null | null |
GHSA-5vcc-mv82-47r3
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Constantin Boiangiu Vimeotheque allows SQL Injection. This issue affects Vimeotheque: from n/a through 2.3.4.2.
|
[] | null | 8.5 | null | null | null |
|
GHSA-7h74-jf2j-324m
|
Fuji Electric Smart Editor is vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code.
|
[] | 8.4 | 7.8 | null | null | null |
|
CVE-2025-31497
|
TEIGarage XML External Entity (XXE) Injection in Document Conversion Service
|
TEIGarage is a webservice and RESTful service to transform, convert and validate various formats, focussing on the TEI format. The Document Conversion Service contains a critical XML External Entity (XXE) Injection vulnerability in its document conversion functionality. The service processes XML files during the conversion process but fails to disable external entity processing, allowing an attacker to read arbitrary files from the server's filesystem. This vulnerability could allow attackers to read sensitive files from the server's filesystem, potentially exposing configuration files, credentials, or other confidential information. Additionally, depending on the server configuration, this could potentially be used to perform server-side request forgery (SSRF) attacks by making the server connect to internal services. This issue is patched in version 1.2.4. A workaround for this vulnerability includes disabling external entity processing in the XML parser by setting the appropriate security features (e.g., XMLConstants.FEATURE_SECURE_PROCESSING).
|
[] | null | 7.5 | null | null | null |
CVE-2022-42525
|
In fillSetupDataCallInfo_V1_6 of ril_service_1_6.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-243509750References: N/A
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | null | null |
|
CVE-2019-9803
|
The Upgrade-Insecure-Requests (UIR) specification states that if UIR is enabled through Content Security Policy (CSP), navigation to a same-origin URL must be upgraded to HTTPS. Firefox will incorrectly navigate to an HTTP URL rather than perform the security upgrade requested by the CSP in some circumstances, allowing for potential man-in-the-middle attacks on the linked resources. This vulnerability affects Firefox < 66.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] | null | null | 7.4 | 5.8 | null |
|
CVE-2024-3821
|
wpDataTables - Tables & Table Charts (Premium) <= 6.3.2 - Missing Authorization to DataTable Access & Modification
|
The wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several functions in the wdt_ajax_actions.php file in all versions up to, and including, 6.3.2. This makes it possible for unauthenticated attackers to manipulate data tables. Please note this only affects the premium version of the plugin.
|
[] | null | 7.3 | null | null | null |
CVE-2012-3647
|
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
|
[
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.0.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.0.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.1.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.2.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.5:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.5.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.6:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.6.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.8.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.9.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.2:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.3:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.4:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.4:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.5:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.2:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.1.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.1.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.2.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.2:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.2:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.3:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.5:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.5.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.2.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.4.0.80:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.4.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.5.1.42:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.6.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
cisco-sa-wda-pt-msh-6LWOcZ5
|
Cisco Webex Meetings Desktop App and Webex Productivity Tools for Windows Shared Memory Information Disclosure Vulnerability
|
A vulnerability in Cisco Webex Meetings Desktop App and Webex Productivity Tools for Windows could allow an authenticated, local attacker to gain access to sensitive information on an affected system.
This vulnerability is due to the unsafe usage of shared memory by the affected software. An attacker with permissions to view system memory could exploit this vulnerability by running an application on the local system that is designed to read shared memory. A successful exploit could allow the attacker to retrieve sensitive information from the shared memory, including usernames, meeting information, or authentication tokens.
Note: To exploit this vulnerability, an attacker must have valid credentials on a Microsoft Windows end-user system and must log in after another user has already authenticated with Webex on the same end-user system.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wda-pt-msh-6LWOcZ5 ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wda-pt-msh-6LWOcZ5"]
|
[] | null | 5.5 | null | null | null |
CVE-2024-30271
|
Adobe Illustrator 2023 CC 27.7 Memory Corruption Out-Of-Bounds-Write Vulnerability III.
|
Illustrator versions 28.3, 27.9.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
CVE-2016-8685
|
The findnext function in decompose.c in potrace 1.13 allows remote attackers to cause a denial of service (invalid memory access and crash) via a crafted BMP image.
|
[
"cpe:2.3:a:potrace_project:potrace:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
GHSA-v7w5-c9j9-2f2r
|
In binder_transaction of binder.c in the Android kernel, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
|
[] | null | null | null | null | null |
|
GHSA-p53f-pm5m-wpj7
|
In WebKitGTK before 2.32.4, there is incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create, leading to a segmentation violation and application crash, a different vulnerability than CVE-2021-30889.
|
[] | null | null | null | null | null |
|
CVE-2009-4555
|
Multiple cross-site request forgery (CSRF) vulnerabilities in AgoraCart 5.2.005 and 5.2.006 and AgoraCart GOLD 5.5.005 allow remote attackers to hijack the authentication of administrators for requests that (1) modify a .htaccess file via an unspecified request to protected/manager.cgi or (2) change the password of an administrative account.
|
[
"cpe:2.3:a:k-factor:agoracart:-:gold:*:*:*:*:*:*",
"cpe:2.3:a:k-factor:agoracart:5.2.005:*:*:*:*:*:*:*",
"cpe:2.3:a:k-factor:agoracart:5.2.006:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2019-16127
|
Atmel Advanced Software Framework (ASF) 4 has an Integer Overflow.
|
[
"cpe:2.3:a:microchip:advanced_software_framework_4:-:*:*:*:*:*:*:*"
] | null | 9.1 | null | 6.4 | null |
|
CVE-2013-4856
|
D-Link DIR-865L has Information Disclosure.
|
[
"cpe:2.3:o:dlink:dir-865l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-865l:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 2.9 | null |
|
CVE-2023-33794
|
A stored cross-site scripting (XSS) vulnerability in the Create Tenants (/tenancy/tenants/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
|
[
"cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
|
CVE-2011-1112
|
Google Chrome before 9.0.597.107 does not properly perform SVG rendering, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via unknown vectors.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
RHSA-2021:4058
|
Red Hat Security Advisory: samba security update
|
samba: Negative idmap cache entries can cause incorrect group entries in the Samba file server process token
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.8 | null | null | null |
CVE-2024-1975
|
SIG(0) can be used to exhaust CPU resources
|
If a server hosts a zone containing a "KEY" Resource Record, or a resolver DNSSEC-validates a "KEY" Resource Record from a DNSSEC-signed domain in cache, a client can exhaust resolver CPU resources by sending a stream of SIG(0) signed requests.
This issue affects BIND 9 versions 9.0.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.49-S1, and 9.18.11-S1 through 9.18.27-S1.
|
[
"cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.16.8:s1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.18.0:*:*:*:-:*:*:*",
"cpe:2.3:a:isc:bind:9.18.11:s1:*:*:supported_preview:*:*:*",
"cpe:2.3:a:isc:bind:9.19.0:*:*:*:-:*:*:*",
"cpe:2.3:a:isc:bind:9.9.3:s1:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
GHSA-r8jc-74qc-rv5x
|
IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory access, which may further lead to system exceptions.
|
[] | null | null | 7.5 | null | null |
|
CVE-2021-43974
|
An issue was discovered in SysAid ITIL 20.4.74 b10. The /enduserreg endpoint is used to register end users anonymously, but does not respect the server-side setting that determines if anonymous users are allowed to register new accounts. Configuring the server-side setting to disable anonymous user registration only hides the client-side registration form. An attacker can still post registration data to create new accounts without prior authentication.
|
[
"cpe:2.3:a:sysaid:itil:20.4.74:b10:*:*:*:*:*:*"
] | null | 5.3 | null | 5 | null |
|
CVE-2020-35506
|
A use-after-free vulnerability was found in the am53c974 SCSI host bus adapter emulation of QEMU in versions before 6.0.0 during the handling of the 'Information Transfer' command (CMD_TI). This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service or potential code execution with the privileges of the QEMU process.
|
[
"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"
] | null | 6.7 | null | 4.6 | null |
|
GHSA-vv46-jc2q-qcxw
|
A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary code as root. The vulnerability is due to incorrect input validation in the NX-API feature. An attacker could exploit this vulnerability by sending a crafted HTTP or HTTPS request to an internal service on an affected device that has the NX-API feature enabled. A successful exploit could allow the attacker to cause a buffer overflow and execute arbitrary code as root. Note: The NX-API feature is disabled by default. MDS 9000 Series Multilayer Switches are affected in versions prior to 8.1(1). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I4(8) and 7.0(3)I7(1). Nexus 3500 Platform Switches are affected in versions prior to 6.0(2)A8(8). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected in versions prior to 7.3(2)N1(1). Nexus 7000 and 7700 Series Switches are affected in versions prior to 7.3(3)D1(1). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected in versions prior to 7.0(3)I4(8) and 7.0(3)I7(1). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5).
|
[] | null | 7.8 | null | null | null |
|
GHSA-qfqf-rmhj-ffx6
|
A vulnerability classified as problematic has been found in GNOME libgsf up to 1.14.53. Affected is the function sorting_key_copy. The manipulation of the argument Name leads to out-of-bounds read. It is possible to launch the attack on the local host. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 4.8 | 3.3 | null | null | null |
|
CVE-2016-6883
|
MatrixSSL before 3.8.3 configured with RSA Cipher Suites allows remote attackers to obtain sensitive information via a Bleichenbacher variant attack.
|
[
"cpe:2.3:a:matrixssl:matrixssl:*:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 | null |
|
GHSA-fpf9-mhxr-6xhv
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in POSIMYTH Innovations The Plus Addons for Elementor Page Builder Lite allows Stored XSS.This issue affects The Plus Addons for Elementor Page Builder Lite: from n/a through 6.2.7.
|
[] | null | 6.5 | null | null | null |
|
RHSA-2012:1201
|
Red Hat Security Advisory: tetex security update
|
t1lib: Heap based buffer overflow in DVI file AFM font parser xpdf: uninitialized Gfx::parser pointer dereference xpdf: array indexing error in FoFiType1::parse() t1lib: Heap-based buffer overflow DVI file AFM font parser t1lib: Invalid pointer dereference via crafted Type 1 font t1lib: invalid read crash via crafted Type 1 font t1lib: Use-after-free via crafted Type 1 font t1lib: Off-by-one via crafted Type 1 font
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
CVE-2009-0360
|
Russ Allbery pam-krb5 before 3.13, when linked against MIT Kerberos, does not properly initialize the Kerberos libraries for setuid use, which allows local users to gain privileges by pointing an environment variable to a modified Kerberos configuration file, and then launching a PAM-based setuid application.
|
[
"cpe:2.3:a:eyrie:pam-krb5:*:*:*:*:*:*:*:*",
"cpe:2.3:a:eyrie:pam-krb5:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:eyrie:pam-krb5:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:eyrie:pam-krb5:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:eyrie:pam-krb5:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:eyrie:pam-krb5:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:eyrie:pam-krb5:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:eyrie:pam-krb5:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:eyrie:pam-krb5:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:eyrie:pam-krb5:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:eyrie:pam-krb5:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:eyrie:pam-krb5:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:eyrie:pam-krb5:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:eyrie:pam-krb5:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:eyrie:pam-krb5:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:eyrie:pam-krb5:3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:eyrie:pam-krb5:3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:eyrie:pam-krb5:3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:eyrie:pam-krb5:3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:eyrie:pam-krb5:3.11:*:*:*:*:*:*:*"
] | null | null | null | 6.2 | null |
|
CVE-2018-11955
|
Lack of check on length of reason-code fetched from payload may lead driver access the memory not allocated to the frame and results in out of bound read in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 600, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 665, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDM439, SDM660, SDX20, SDX24
|
[
"cpe:2.3:o:qualcomm:mdm9150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm_215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qualcomm_215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_427:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_435:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_665_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_665:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_712_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_712:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_730_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_730:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-q9p5-m5wf-9j2j
|
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-interface variable in the phddns.lua file.
|
[] | null | null | 7.2 | null | null |
|
CVE-2024-36478
|
null_blk: fix null-ptr-dereference while configuring 'power' and 'submit_queues'
|
In the Linux kernel, the following vulnerability has been resolved:
null_blk: fix null-ptr-dereference while configuring 'power' and 'submit_queues'
Writing 'power' and 'submit_queues' concurrently will trigger kernel
panic:
Test script:
modprobe null_blk nr_devices=0
mkdir -p /sys/kernel/config/nullb/nullb0
while true; do echo 1 > submit_queues; echo 4 > submit_queues; done &
while true; do echo 1 > power; echo 0 > power; done
Test result:
BUG: kernel NULL pointer dereference, address: 0000000000000148
Oops: 0000 [#1] PREEMPT SMP
RIP: 0010:__lock_acquire+0x41d/0x28f0
Call Trace:
<TASK>
lock_acquire+0x121/0x450
down_write+0x5f/0x1d0
simple_recursive_removal+0x12f/0x5c0
blk_mq_debugfs_unregister_hctxs+0x7c/0x100
blk_mq_update_nr_hw_queues+0x4a3/0x720
nullb_update_nr_hw_queues+0x71/0xf0 [null_blk]
nullb_device_submit_queues_store+0x79/0xf0 [null_blk]
configfs_write_iter+0x119/0x1e0
vfs_write+0x326/0x730
ksys_write+0x74/0x150
This is because del_gendisk() can concurrent with
blk_mq_update_nr_hw_queues():
nullb_device_power_store nullb_apply_submit_queues
null_del_dev
del_gendisk
nullb_update_nr_hw_queues
if (!dev->nullb)
// still set while gendisk is deleted
return 0
blk_mq_update_nr_hw_queues
dev->nullb = NULL
Fix this problem by resuing the global mutex to protect
nullb_device_power_store() and nullb_update_nr_hw_queues() from configfs.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-cg7v-jcg7-3j87
|
SmartNode SN200 (aka SN200) 3.21.2-23021 allows unauthenticated OS Command Injection.
|
[] | null | 9.8 | null | null | null |
|
GHSA-xh9r-fpvc-x582
|
Cross-site scripting (XSS) vulnerability in the Web GUI in IBM Tivoli Netcool/OMNIbus 7.3.0 before 7.3.0.6, 7.3.1 before 7.3.1.7, and 7.4.0 before 7.4.0.3 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
|
[] | null | null | null | null | null |
|
CVE-2010-4204
|
WebKit, as used in Google Chrome before 7.0.517.44, webkitgtk before 1.2.6, and other products, accesses a frame object after this object has been destroyed, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-54hq-7j4c-rqmf
|
Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-1772, CVE-2014-1780, CVE-2014-1794, CVE-2014-1797, CVE-2014-1802, CVE-2014-2756, CVE-2014-2763, CVE-2014-2769, and CVE-2014-2771.
|
[] | null | null | null | null | null |
|
GHSA-hp8x-m85w-frg2
|
The wp-invoice plugin before 4.1.1 for WordPress has incorrect access control over wpi_interkassa payer metadata updates.
|
[] | null | null | null | null | null |
|
CVE-2012-3421
|
The pduread function in pdu.c in libpcp in Performance Co-Pilot (PCP) before 3.6.5 does not properly time out connections, which allows remote attackers to cause a denial of service (pmcd hang) by sending individual bytes of a PDU separately, related to an "event-driven programming flaw."
|
[
"cpe:2.3:a:sgi:performance_co-pilot:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:performance_co-pilot:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:performance_co-pilot:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:performance_co-pilot:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:performance_co-pilot:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:performance_co-pilot:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:performance_co-pilot:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:performance_co-pilot:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:performance_co-pilot:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:performance_co-pilot:2.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:performance_co-pilot:2.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:performance_co-pilot:2.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:performance_co-pilot:2.2:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-mx7r-3r4v-77rq
|
An issue was discovered in Vocera Report Server and Voice Server 5.x through 5.8. There is Path Traversal in the Task Exec filename. The Vocera Report Console contains various jobs that are executed on the server at specified intervals, e.g., backup, etc. An authenticated user has the ability to modify these entries and set the executable path and parameters.
|
[] | null | 6.5 | null | null | null |
|
CVE-2014-2216
|
The FortiManager protocol service in Fortinet FortiOS before 4.3.16 and 5.0.0 before 5.0.8 on FortiGate devices allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted request.
|
[
"cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:4.3.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:4.3.12:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:4.3.13:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:4.3.14:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.0.7:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
ICSA-18-100-01
|
ATI Systems Emergency Mass Notification Systems
|
Missing encryption of sensitive data vulnerability caused by specially crafted malicious radio transmissions may allow an attacker to remotely trigger false alarms.CVE-2018-8864 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
|
[] | null | null | 5.3 | null | null |
GHSA-h237-vcw4-4cvv
|
The NSEPA.NsepaCtrl.1 ActiveX control in nsepa.ocx in Citrix Access Gateway Enterprise Edition 8.1 before 8.1-67.7, 9.0 before 9.0-70.5, and 9.1 before 9.1-96.4 attempts to validate signed DLLs by checking the certificate subject, not the signature, which allows man-in-the-middle attackers to execute arbitrary code via HTTP header data referencing a DLL that was signed with a crafted certificate.
|
[] | null | null | null | null | null |
|
GHSA-vvx6-gxw4-9j4r
|
There is an Assertion in '(flags >> CBC_STACK_ADJUST_SHIFT) >= CBC_STACK_ADJUST_BASE || (CBC_STACK_ADJUST_BASE - (flags >> CBC_STACK_ADJUST_SHIFT)) <= context_p->stack_depth' in parser_emit_cbc_backward_branch in JerryScript 2.2.0.
|
[] | null | null | null | null | null |
|
GHSA-4374-j4qr-5p28
|
components/Modals/HelpTexts/GenericAll/GenericAll.jsx in Bloodhound <= 4.0.1 allows remote attackers to execute arbitrary system commands when the victim imports a malicious data file containing JavaScript in the objectId parameter.
|
[] | null | null | null | null | null |
|
CVE-2024-45037
|
AWS CDK RestApi not generating authorizationScope correctly in resultant CFN template
|
The AWS Cloud Development Kit (CDK) is an open-source framework for defining cloud infrastructure using code. Customers use it to create their own applications which are converted to AWS CloudFormation templates during deployment to a customer’s AWS account. CDK contains pre-built components called "constructs" that are higher-level abstractions providing defaults and best practices. This approach enables developers to use familiar programming languages to define complex cloud infrastructure more efficiently than writing raw CloudFormation templates. We identified an issue in AWS Cloud Development Kit (CDK) which, under certain conditions, can result in granting authenticated Amazon Cognito users broader than intended access. Specifically, if a CDK application uses the "RestApi" construct with "CognitoUserPoolAuthorizer" as the authorizer and uses authorization scopes to limit access. This issue does not affect the availability of the specific API resources. Authenticated Cognito users may gain unintended access to protected API resources or methods, leading to potential data disclosure, and modification issues. Impacted versions: >=2.142.0;<=2.148.0. A patch is included in CDK versions >=2.148.1. Users are advised to upgrade their AWS CDK version to 2.148.1 or newer and re-deploy their application(s) to address this issue.
|
[] | null | 6.4 | null | null | null |
GHSA-mg53-xr8m-86hw
|
Open Redirect in Liferay Portal
|
The redirect module in Liferay Portal before 7.3.3 does not limit the number of URLs resulting in a 404 error that is recorded, which allows remote attackers to perform a denial of service attack by making repeated requests for pages that do not exist.
|
[] | null | 7.5 | null | null | null |
GHSA-w4v5-54p8-m4j5
|
Missing permission checks in Jenkins GitHub Pull Request Builder Plugin
|
A missing permission check in Jenkins GitHub Pull Request Builder Plugin 1.42.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
|
[] | null | 6.5 | null | null | null |
GHSA-v269-rrr6-cx6r
|
Ylianst MeshCentral 1.1.16 suffers from Use of a Broken or Risky Cryptographic Algorithm.
|
Ylianst MeshCentral 1.1.16 suffers from Use of a Broken or Risky Cryptographic Algorithm.
|
[] | null | 7.5 | null | null | null |
GHSA-ggx2-8h9j-28jx
|
Joomla! 1.6.x before 1.6.2 does not prevent page rendering inside a frame in a third-party HTML document, which makes it easier for remote attackers to conduct clickjacking attacks via a crafted web site.
|
[] | null | null | null | null | null |
|
CVE-2009-3064
|
Directory traversal vulnerability in debugger/debug_php.php in Ve-EDIT 0.1.4 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the _GET[filename] parameter.
|
[
"cpe:2.3:a:rein_velt:vedit:01.4:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-m2gc-3m4v-6h82
|
Vulnerability in the Oracle Transportation Management product of Oracle Supply Chain (component: Business Process Automation). Supported versions that are affected are 6.4.3 and 6.5.1. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Transportation Management. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Transportation Management. CVSS 3.1 Base Score 2.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).
|
[] | null | 2.7 | null | null | null |
|
CVE-2020-25459
|
An issue was discovered in function sync_tree in hetero_decision_tree_guest.py in WeBank FATE (Federated AI Technology Enabler) 0.1 through 1.4.2 allows attackers to read sensitive information during the training process of machine learning joint modeling.
|
[
"cpe:2.3:a:webank:federated_ai_technology_enabler:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2023-51636
|
Avira Prime Link Following Local Privilege Escalation Vulnerability
|
Avira Prime Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Avira Prime. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the Avira Spotlight Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21600.
|
[
"cpe:2.3:a:avira:prime:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
RHSA-2009:0352
|
Red Hat Security Advisory: gstreamer-plugins-base security update
|
gstreamer-plugins-base: integer overflow in gst_vorbis_tag_add_coverart()
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
GHSA-2p3h-m9wr-j5v9
|
A potential vulnerability exists in AMD Platform Security Processor (PSP) that may allow an attacker to zero any privileged register on the System Management Network which may lead to bypassing SPI ROM protections.
|
[] | null | 7.8 | null | null | null |
|
GHSA-5rxw-p33p-95hr
|
Eval injection vulnerability in CPAINT 1.3-SP allows remote attackers to execute arbitrary ASP code via the cpaint_argument[] parameter to (1) calculator.asp or (2) cpaintfile.asp, which is directly fed into an eval statement.
|
[] | null | null | null | null | null |
|
CVE-2019-11359
|
Cross-site scripting (XSS) vulnerability in display.php in I, Librarian 4.10 allows remote attackers to inject arbitrary web script or HTML via the project parameter.
|
[
"cpe:2.3:a:i-librarian:i\\,_librarian:4.10:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-qjg7-q66x-8cc5
|
The Musulmanin.com (aka com.wSalyafiyailimurdjiya) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
GHSA-f48g-wqmg-9r45
|
A Denial of Service (DoS) condition has been discovered in GitLab CE/EE affecting all versions starting with 15.9 before 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2. It is possible for an attacker to cause catastrophic backtracking while parsing results from Elasticsearch.
|
[] | null | 4.3 | null | null | null |
|
GHSA-j6fm-hjr6-8qh9
|
The runtime linker in QNX Neutrino RTOS 6.5.0 before Service Pack 1 does not properly clear the LD_DEBUG_OUTPUT and LD_DEBUG environment variables when a program is spawned from a setuid program, which allows local users to overwrite files via a symlink attack.
|
[] | null | null | null | null | null |
|
CVE-2020-4496
|
The IBM Spectrum Protect Plus 10.1.0.0 through 10.1.8.x server connection to an IBM Spectrum Protect Plus workload agent is subject to a man-in-the-middle attack due to improper certificate validation. IBM X-Force ID: 182046.
|
[
"cpe:2.3:a:ibm:spectrum_protect_plus:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | null | 6.8 | null | null |
|
GHSA-925x-95jq-3vgq
|
A vulnerability in Cisco Webex Meetings and Cisco Webex Meetings Server could allow an unauthenticated, remote attacker to maintain bidirectional audio despite being expelled from an active Webex session. The vulnerability is due to a synchronization issue between meeting and media services on a vulnerable Webex site. An attacker could exploit this vulnerability by sending crafted requests to a vulnerable Cisco Webex Meetings or Cisco Webex Meetings Server site. A successful exploit could allow the attacker to maintain the audio connection of a Webex session despite being expelled.
|
[] | null | null | null | null | null |
|
CVE-2017-0266
|
A remote code execution vulnerability exists in Microsoft Edge in the way affected Microsoft scripting engines render when handling objects in memory, aka "Microsoft Edge Remote Code Execution Vulnerability."
|
[
"cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.6 | null |
|
GHSA-x38j-p93g-v49r
|
The twicca application 0.7.0 through 0.9.30 for Android does not properly restrict the use of network privileges, which allows remote attackers to read media files on an SD card via a crafted application.
|
[] | null | null | null | null | null |
|
GHSA-3fqc-qp8w-rr4h
|
A vulnerability in Zoom On-Premise Meeting Connector Controller version 4.8.102.20220310 and On-Premise Meeting Connector MMR version 4.8.102.20220310 exposes process memory fragments to connected clients, which could be observed by a passive attacker.
|
[] | null | 7.5 | null | null | null |
|
GHSA-vrmh-7wgx-mjw7
|
OCSInventory allow stored email template with special characters that lead to a Stored cross-site Scripting.
|
[] | null | 4.9 | null | null | null |
|
GHSA-rg2q-2q6c-9x92
|
An issue was discovered in Shirne CMS 1.2.0. There is a Path Traversal vulnerability which could cause arbitrary file read via /static/ueditor/php/controller.php
|
[] | null | 6.5 | null | null | null |
|
CVE-2023-27520
|
Cross-site request forgery (CSRF) vulnerability in SEIKO EPSON printers/network interface Web Config allows a remote unauthenticated attacker to hijack the authentication and perform unintended operations by having a logged-in user view a malicious page. [Note] Web Config is the software that allows users to check the status and change the settings of SEIKO EPSON printers/network interface via a web browser. According to SEIKO EPSON CORPORATION, it is also called as Remote Manager in some products. Web Config is pre-installed in some printers/network interface provided by SEIKO EPSON CORPORATION. For the details of the affected product names/model numbers, refer to the information provided by the vendor.
|
[
"cpe:2.3:o:epson:lp-9200ps2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-9200ps2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-9200ps3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-9200ps3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-8200c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-8200c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-9600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-9600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-9600s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-9600s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-9300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-9300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-8500c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-8500c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-8700ps3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-8700ps3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-9800c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-9800c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-s5500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-s5500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-9200b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-9200b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-9200c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-9200c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-s4500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-s4500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-s6500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-s6500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-s7000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-s7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-s5000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-s5000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-s4000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-s4000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-s6000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-s6000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-s5300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-s5300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-s5300r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-s5300r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-s300n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-s300n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-s310n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-s310n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-s3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-s3000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-s3000r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-s3000r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-s3000z_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-s3000z:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-s3000ps_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-s3000ps:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-s7500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-s7500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-s7500ps_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-s7500ps:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-s3500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-s3500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-s4200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-s4200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-s9000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-s9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-s7100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-s7100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:lp-s8100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:lp-s8100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:prifnw1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:prifnw1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:prifnw1s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:prifnw1s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:prifnw2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:prifnw2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:prifnw2ac_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:prifnw2ac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:prifnw2s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:prifnw2s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:prifnw2sac_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:prifnw2sac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:prifnw3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:prifnw3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:prifnw3s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:prifnw3s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:prifnw6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:prifnw6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:prifnw7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:prifnw7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:prifnw7u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:prifnw7u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:prifnw7s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:prifnw7s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:pa-w11g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:pa-w11g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:pa-w11g2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:pa-w11g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:esnsb1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:esnsb1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:esnsb2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:esnsb2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:esifnw1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:esifnw1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-t3250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-t3250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-t3255_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-t3255:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-t5250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-t5250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-t5255_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-t5255:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-t7250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-t7250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-t7255_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-t7255:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-t5250d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-t5250d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-t5255d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-t5255d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-t7250d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-t7250d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-t7255d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-t7255d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-p5050_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-p5050:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-p7050_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-p7050:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-p9050_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-p9050:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-p6050_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-p6050:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-p8050_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-p8050:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-p20050_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-p20050:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-s80650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-s80650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-s60650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-s60650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-s40650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-s40650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-s60650l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-s60650l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-s80650l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-s80650l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-f7200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-f7200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-f6350_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-f6350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-f9450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-f9450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-f9450h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-f9450h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-f2150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-f2150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:tm-c7500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:tm-c7500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:tm-c3500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:tm-c3500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:tm-c3400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:tm-c3400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:px-b510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:px-b510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:px-b500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:px-b500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:px-5800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:px-5800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:px-5002_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:px-5002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:px-5v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:px-5v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:px-7v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:px-7v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-px7v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-px7v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-px5v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-px5v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-px3v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-px3v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:px-6250s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:px-6250s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:px-6550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:px-6550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:px-7500n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:px-7500n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:px-7550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:px-7550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:px-7550s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:px-7550s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:px-9500n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:px-9500n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:px-9550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:px-9550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:px-9550s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:px-9550s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:px-20000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:px-20000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:stylus_pro_gs6000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:stylus_pro_gs6000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:px-w8000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:px-w8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:px-f8000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:px-f8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:px-f8000m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:px-f8000m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:px-f10000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:px-f10000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:px-h6000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:px-h6000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:px-h7000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:px-h7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:px-h8000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:px-h8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:px-h9000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:px-h9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:px-h10000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:px-h10000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-t3050_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-t3050:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-t5050_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-t5050:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-t7050_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-t7050:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-p10050_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-p10050:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-s30650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-s30650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-s50650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-s50650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-s70650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-s70650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-f6000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-f6000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-f7100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-f7100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-f6200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-f6200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-f9200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-f9200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-f9350_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-f9350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:epson:sc-f2000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:sc-f2000:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-cg6f-88f9-rp7x
|
cPanel before 88.0.13 mishandles file-extension dispatching, leading to code execution (SEC-488).
|
[] | null | null | null | null | null |
|
GHSA-q547-25x8-mx66
|
A flaw was found in the X Record extension. The RecordSanityCheckRegisterClients function does not check for an integer overflow when computing request length, which allows a client to bypass length checks.
|
[] | null | 6.6 | null | null | null |
|
CVE-2025-49131
|
FastGPT Sandbox Vulnerable to Sandbox Bypass
|
FastGPT is an open-source project that provides a platform for building, deploying, and operating AI-driven workflows and conversational agents. The Sandbox container (fastgpt-sandbox) is a specialized, isolated environment used by FastGPT to safely execute user-submitted or dynamically generated code in isolation. The sandbox before version 4.9.11 has insufficient isolation and inadequate restrictions on code execution by allowing overly permissive syscalls, which allows attackers to escape the intended sandbox boundaries. Attackers could exploit this to read and overwrite arbitrary files and bypass Python module import restrictions. This is patched in version 4.9.11 by restricting the allowed system calls to a safer subset and additional descriptive error messaging.
|
[] | null | 6.3 | null | null | null |
GHSA-mx4j-f4jq-chwv
|
A vulnerability was found in Belkin F9K1122 1.00.33. It has been rated as critical. Affected by this issue is the function formBSSetSitesurvey of the file /goform/formBSSetSitesurvey of the component webs. The manipulation of the argument submit-url-ok leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 7.4 | 8.8 | null | null | null |
|
CVE-2020-35564
|
An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. There is an outdated and unused component allowing for malicious user input of active code.
|
[
"cpe:2.3:a:mbconnectline:mbconnect24:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mbconnectline:mymbconnect24:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-r5fw-3pw4-7hhg
|
Multiple unspecified vulnerabilities in the Human Capital Management component in Oracle PeopleSoft Enterprise 8.9 Bundle 11 allow local users to have unknown impact via unknown vectors, aka (1) PSE06 and (2) PSE07.
|
[] | null | null | null | null | null |
|
RHSA-2019:1424
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.2 security update
|
picketlink: reflected XSS in SAMLRequest via RelayState parameter picketlink: URL injection via xinclude parameter undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2"
] | null | null | 5.3 | null | null |
GHSA-2h4c-86hw-hmr7
|
Cross-site Scripting (XSS) - DOM in GitHub repository chatwoot/chatwoot prior to 2.7.0.
|
[] | null | 6.1 | null | null | null |
|
GHSA-q3pp-76rw-fqvm
|
An issue was discovered in Gajim through 1.4.7. The vulnerability allows attackers, via crafted XML stanzas, to correct messages that were not sent by them. The attacker needs to be part of the group chat or single chat.
|
[] | null | 5.3 | null | null | null |
|
CVE-2025-3016
|
Open Asset Import Library Assimp MDL File MDLMaterialLoader.cpp ParseTextureColorData resource consumption
|
A vulnerability classified as problematic was found in Open Asset Import Library Assimp 5.4.3. This vulnerability affects the function Assimp::MDLImporter::ParseTextureColorData of the file code/AssetLib/MDL/MDLMaterialLoader.cpp of the component MDL File Handler. The manipulation of the argument mWidth/mHeight leads to resource consumption. The attack can be initiated remotely. Upgrading to version 6.0 is able to address this issue. The name of the patch is 5d2a7482312db2e866439a8c05a07ce1e718bed1. It is recommended to apply a patch to fix this issue.
|
[] | 5.3 | 4.3 | 4.3 | 5 |
https://github.com/assimp/assimp/commit/5d2a7482312db2e866439a8c05a07ce1e718bed1
|
RHSA-2021:2328
|
Red Hat Security Advisory: qt5-qtimageformats security update
|
libwebp: heap-based buffer overflow in PutLE16() libwebp: use of uninitialized value in ReadSymbol() libwebp: heap-based buffer overflow in WebPDecode*Into functions libwebp: use-after-free in EmitFancyRGB() in dec/io_dec.c
|
[
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 9.8 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.