id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2019-12961 | LiveZilla Server before 8.0.1.1 is vulnerable to CSV Injection in the Export Function. | [
"cpe:2.3:a:livezilla:livezilla:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-18301 | A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. | [
"cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-39288 | A vulnerability in the Connect Mobility Router component of Mitel MiVoice Connect through 9.6.2304.102 could allow an authenticated attacker with elevated privileges and internal network access to conduct a command argument injection due to insufficient parameter sanitization. A successful exploit could allow an attacker to access network information and to generate excessive network traffic. | [
"cpe:2.3:a:mitel:mivoice_connect:*:*:*:*:*:*:*:*"
] |
|
GHSA-xcc4-j2gc-c9xj | Veritas APTARE versions prior to 10.5 included code that bypassed the normal login process when specific authentication credentials were provided to the server. An unauthenticated user could login to the application and gain access to the data and functionality accessible to the targeted user account. | [] |
|
GHSA-r4r9-268q-qj6x | Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component allow information disclosure during parsing of ICMP packets in prvProcessICMPPacket. | [] |
|
CVE-2024-4997 | WPUpper Share Buttons <= 3.43 - Missing Authorization | The WPUpper Share Buttons plugin for WordPress is vulnerable to unauthorized access of data when preparing sharing links for posts and pages in all versions up to, and including, 3.43. This makes it possible for unauthenticated attackers to obtain the contents of password protected posts and pages. | [
"cpe:2.3:a:victor_freitas:wpupper_share_buttons:*:*:*:*:*:*:*:*"
] |
CVE-2017-17614 | Food Order Script 1.0 has SQL Injection via the /list city parameter. | [
"cpe:2.3:a:hotel_restaurant_reviews_and_feedback_script_project:hotel_restaurant_reviews_and_feedback_script:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-435h-73r2-vf64 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Crocoblock JetWidgets for Elementor and WooCommerce allows PHP Local File Inclusion.This issue affects JetWidgets for Elementor and WooCommerce: from n/a through 1.1.7. | [] |
|
CVE-2009-2071 | Google Chrome before 1.0.154.53 displays a cached certificate for a (1) 4xx or (2) 5xx CONNECT response page returned by a proxy server, which allows man-in-the-middle attackers to spoof an arbitrary https site by letting a browser obtain a valid certificate from this site during one request, and then sending the browser a crafted 502 response page upon a subsequent request. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.2.149.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.2.149.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.2.152.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.2.153.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.3.154.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.3.154.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.4.154.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.4.154.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.4.154.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.4.154.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:1.0.154.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:1.0.154.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:1.0.154.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:1.0.154.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:1.0.154.46:*:*:*:*:*:*:*"
] |
|
CVE-2008-6643 | LokiCMS 0.3.4 and possibly earlier versions does not properly restrict access to administrative functions, which allows remote attackers to bypass intended restrictions and modify configuration settings via the LokiACTION parameter in a direct request to admin.php. | [
"cpe:2.3:a:lokicms:lokicms:0.3.4:*:*:*:*:*:*:*"
] |
|
CVE-2016-5814 | Buffer overflow in Rockwell Automation RSLogix Micro Starter Lite, RSLogix Micro Developer, RSLogix 500 Starter Edition, RSLogix 500 Standard Edition, and RSLogix 500 Professional Edition allows remote attackers to execute arbitrary code via a crafted RSS project file. | [
"cpe:2.3:a:rockwellautomation:rslogix_500_professional_edition:-:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:rslogix_500_standard_edition:-:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:rslogix_500_starter_edition:-:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:rslogix_micro_developer:-:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:rslogix_micro_starter_lite:-:*:*:*:*:*:*:*"
] |
|
CVE-2012-0012 | Microsoft Internet Explorer 9 does not properly handle the creation and initialization of string objects, which allows remote attackers to read data from arbitrary process-memory locations via a crafted web site, aka "Null Byte Information Disclosure Vulnerability." | [
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*"
] |
|
GHSA-mxwj-xfpv-wqcg | Kofax Power PDF response Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the implementation of the app.response method. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20601. | [] |
|
CVE-2021-26304 | PHPGurukul Daily Expense Tracker System 1.0 is vulnerable to stored XSS via the add-expense.php Item parameter. | [
"cpe:2.3:a:phpgurukul:daily_expense_tracker_system:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-rpfr-3prf-w7f2 | In the Linux kernel, the following vulnerability has been resolved:usb: dwc3: gadget: check that event count does not exceed event buffer lengthThe event count is read from register DWC3_GEVNTCOUNT.
There is a check for the count being zero, but not for exceeding the
event buffer length.
Check that event count does not exceed event buffer length,
avoiding an out-of-bounds access when memcpy'ing the event.
Crash log:
Unable to handle kernel paging request at virtual address ffffffc0129be000
pc : __memcpy+0x114/0x180
lr : dwc3_check_event_buf+0xec/0x348
x3 : 0000000000000030 x2 : 000000000000dfc4
x1 : ffffffc0129be000 x0 : ffffff87aad60080
Call trace:
__memcpy+0x114/0x180
dwc3_interrupt+0x24/0x34 | [] |
|
CVE-2019-5089 | An exploitable memory corruption vulnerability exists in Investintech Able2Extract Professional 4.0.7 x64. A specially crafted JPEG file can cause an out-of-bounds memory write, allowing an attacker to execute arbitrary code on the victim machine. An attacker could exploit a vulnerability by providing the user with a specially crafted JPEG file. | [
"cpe:2.3:a:investintech:able2extract:14.0.7:*:*:*:professional:*:x64:*"
] |
|
CVE-2007-4642 | Multiple buffer overflows in Doomsday (aka deng) 1.9.0-beta5.1 and earlier allow remote attackers to execute arbitrary code via a long chat (PKT_CHAT) message that is not properly handled by the (1) D_NetPlayerEvent function in d_net.c or the (2) Msg_Write function in net_msg.c, or (3) many commands that are not properly handled by the NetSv_ReadCommands function in d_netsv.c; or (4) cause a denial of service (daemon crash) via a chat (PKT_CHAT) message without a final '\0' character. | [
"cpe:2.3:a:doomsday:doomsday:*:*:*:*:*:*:*:*"
] |
|
CVE-2008-3277 | Untrusted search path vulnerability in a certain Red Hat build script for the ibmssh executable in ibutils packages before ibutils-1.5.7-2.el6 in Red Hat Enterprise Linux (RHEL) 6 and ibutils-1.2-11.2.el5 in Red Hat Enterprise Linux (RHEL) 5 allows local users to gain privileges via a Trojan Horse program in refix/lib/, related to an incorrect RPATH setting in the ELF header. | [
"cpe:2.3:a:openfabrics:ibutils:1.5.7-2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openfabrics:ibutils:1.2-11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*"
] |
|
GHSA-88pg-cj77-9fxr | Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c. | [] |
|
CVE-2016-5583 | Unspecified vulnerability in the Oracle One-to-One Fulfillment component in Oracle E-Business Suite 12.1.1 through 12.1.3 and 12.2.3 through 12.2.6 allows remote attackers to affect integrity via unknown vectors. | [
"cpe:2.3:a:oracle:one-to-one_fulfillment:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:one-to-one_fulfillment:12.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:one-to-one_fulfillment:12.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:one-to-one_fulfillment:12.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:one-to-one_fulfillment:12.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:one-to-one_fulfillment:12.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:one-to-one_fulfillment:12.2.6:*:*:*:*:*:*:*"
] |
|
CVE-2023-33171 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | [
"cpe:2.3:a:microsoft:dynamics_365:*:*:*:*:on-premises:*:*:*"
] |
CVE-2024-7149 | Event Manager, Events Calendar, Tickets, Registrations – Eventin <= 4.0.8 - Authenticated (Contributor+) Local File Inclusion | The Event Manager, Events Calendar, Tickets, Registrations – Eventin plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.0.8 via multiple style parameters. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. | [
"cpe:2.3:a:themewinter:eventin:*:*:*:*:*:*:*:*",
"cpe:2.3:a:themewinter:eventin:*:*:*:*:*:wordpress:*:*"
] |
GHSA-rx32-c25r-79mx | Directory Traversal in serverhuwenhui | Affected versions of `serverhuwenhui` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.**Example request:**RecommendationNo patch is available for this vulnerability.It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [] |
CVE-2024-12088 | Rsync: --safe-links option bypass leads to path traversal | A flaw was found in rsync. When using the `--safe-links` option, the rsync client fails to properly verify if a symbolic link destination sent from the server contains another symbolic link within it. This results in a path traversal vulnerability, which may lead to arbitrary file write outside the desired directory. | [
"cpe:/o:redhat:enterprise_linux:8::baseos",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos",
"cpe:/o:redhat:enterprise_linux:6",
"cpe:/o:redhat:enterprise_linux:7",
"cpe:/a:redhat:openshift:4",
"cpe:/o:redhat:enterprise_linux:10"
] |
CVE-2020-25219 | url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion. | [
"cpe:2.3:a:libproxy_project:libproxy:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
] |
|
CVE-2018-0761 | The Microsoft Windows Embedded OpenType (EOT) font engine in Microsoft Windows 7 SP1 and Windows Server 2008 R2 allows information disclosure, due to how the Windows EOT font engine handles embedded fonts, aka "Windows EOT Font Engine Information Disclosure Vulnerability". This CVE ID is unique from CVE-2018-0755, CVE-2018-0760, and CVE-2018-0855. | [
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*"
] |
|
CVE-2018-14923 | A vulnerability in uniview EZPlayer 1.0.6 could allow an attacker to execute arbitrary code on a targeted system via video playback. | [
"cpe:2.3:a:uniview:ezplayer:1.0.6:*:*:*:*:*:*:*"
] |
|
CVE-2017-18571 | The search-everything plugin before 8.1.7 for WordPress has SQL injection related to WordPress 4.7.x, a different vulnerability than CVE-2014-2316. | [
"cpe:2.3:a:search_everything_project:search_everything:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-jmr4-rffv-36cj | A cross-site scripting (XSS) vulnerability exists in MISP v2.4.128 in app/Controller/UserSettingsController.php at SetHomePage() function. Due to a lack of controller validation in "path" parameter, an attacker can execute malicious JavaScript code. | [] |
|
CVE-2022-20864 | Cisco IOS XE ROM Monitor Software for Catalyst Switches Information Disclosure Vulnerability | A vulnerability in the password-recovery disable feature of Cisco IOS XE ROM Monitor (ROMMON) Software for Cisco Catalyst Switches could allow an unauthenticated, local attacker to recover the configuration or reset the enable password. This vulnerability is due to a problem with the file and boot variable permissions in ROMMON. An attacker could exploit this vulnerability by rebooting the switch into ROMMON and entering specific commands through the console. A successful exploit could allow the attacker to read any file or reset the enable password. | [
"cpe:2.3:o:cisco:ios_xe_rom_monitor:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48fd-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48fd-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48fd-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48uq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48uq-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48uq-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48uq-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48ur:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48ur-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48ur-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48ur-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48uz:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48uz-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48uz-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48uz-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24pd:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24pd-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24pd-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24pd-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24pdm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24pdm-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24pdm-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24pdm-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24ps-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24ps-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24ps-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24td-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24td-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24td-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24ts-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24ts-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24ts-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fd-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fd-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fd-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fq-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fq-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fq-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fqm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fqm-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fqm-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fqm-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fs-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fs-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fs-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48pd-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48pd-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48pd-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48pq-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48pq-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48pq-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48ps-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48ps-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48ps-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48td-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48td-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48td-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48tq-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48tq-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48tq-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48ts-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48ts-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48ts-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-8x24pd-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-8x24pd-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-8x24pd-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-8x24uq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-8x24uq-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-8x24uq-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-8x24uq-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-12s-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-12s-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-12x48u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-12xs-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-12xs-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-16xs-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-16xs-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24p-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24p-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24p-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24pw-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24s-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24s-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24t-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24t-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24t-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24u-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24u-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24u-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24xs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24xs-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24xs-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24xu:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24xu-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24xu-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24xu-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-32xs-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-32xs-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48f-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48f-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48f-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48p-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48p-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48p-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48pw-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48t-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48t-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48t-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48u-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48u-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48u-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48xs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48xs-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48xs-f-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48xs-f-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48xs-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-nm-2-40g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-nm-8-10g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9200cx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9200l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-24p-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-24p-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-24s-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-24s-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-24t-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-24t-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-24u-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-24u-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-24ux-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-24ux-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48p-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48p-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48s-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48s-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48t-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48t-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48u-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48u-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48un-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48un-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48uxm-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48uxm-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-24p-4g-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-24p-4g-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-24p-4x-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-24p-4x-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-24t-4g-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-24t-4g-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-24t-4x-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-24t-4x-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-48p-4g-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-48p-4g-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-48p-4x-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-48p-4x-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-48t-4g-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-48t-4g-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-48t-4x-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-48t-4x-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l_stack:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300lm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9407r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9410r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9500h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9600x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c2928-24lt-c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c2928-48tc-c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c3850-12x48u-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c3850-12x48u-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c3850-12x48u-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200-24t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200-48t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-24p-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-24p-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-24pxg-2y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-24pxg-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-24t-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-24t-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-48p-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-48p-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-48pxg-2y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-48pxg-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-48t-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-48t-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-24s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-24t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-24u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-24ux:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-48s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-48t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-48u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-48un:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-48uxm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-24p-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-24p-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-24t-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-24t-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-48p-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-48p-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-48t-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-48t-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9404r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9407r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9410r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-12q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-12q-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-12q-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-16x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-16x-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-16x-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-24q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-24q-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-24q-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-24y4c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-32c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-32qc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-40x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-40x-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-40x-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-48y4c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9600-lc-24c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9600-lc-48s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9600-lc-48tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9600-lc-48yl:-:*:*:*:*:*:*:*"
] |
GHSA-g4q9-4c3v-qw9g | An insecure modification vulnerability in the /etc/passwd file was found in the openshift/ocp-release-operator-sdk. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges. This CVE is specific to the openshift/ansible-operator-container as shipped in Openshift 4. | [] |
|
GHSA-phqw-cxwg-55mq | Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | [] |
|
CVE-2023-21308 | In Composer, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-4198 | WP Social Sharing <= 2.2 - Admin+ Stored XSS | The WP Social Sharing WordPress plugin through 2.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | [
"cpe:2.3:a:wp_social_sharing_project:wp_social_sharing:*:*:*:*:*:wordpress:*:*"
] |
GHSA-f95j-vgvv-g77f | Symantec pcAnywhere 12.5 uses weak integrity protection for .cif (aka caller or CallerID) files, which allows local users to generate a custom .cif file and modify the superuser flag. | [] |
|
CVE-2023-0225 | A flaw was found in Samba. An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory. | [
"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.18.0:-:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.18.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.18.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.18.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.18.0:rc4:*:*:*:*:*:*"
] |
|
CVE-2021-25354 | Improper input check in Samsung Internet prior to version 13.2.1.46 allows attackers to launch non-exported activity in Samsung Browser via malicious deeplink. | [
"cpe:2.3:a:samsung:internet:*:*:*:*:*:*:*:*"
] |
|
GHSA-ph55-568m-j5wm | D-Link G416 nodered chmod Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link G416 routers. Authentication is not required to exploit this vulnerability.The specific flaw exists within the HTTP service listening on TCP port 80. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-21296. | [] |
|
GHSA-gm67-259q-5m4f | Improper Validation of Array Index In the adreno OpenGL driver in Snapdragon Automobile, Snapdragon Mobile and Snapdragon Wear, an out-of-bounds access can occur in SurfaceFlinger. | [] |
|
GHSA-68jp-qmpx-qxww | Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) in EMC Avamar Server before 7.3.0-233 rely on client-side authentication, which allows remote attackers to spoof clients and read backup data via a modified client agent. | [] |
|
CVE-2021-4407 | The Custom Banners plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.2.2 This is due to missing or incorrect nonce validation on the saveCustomFields() function. This makes it possible for unauthenticated attackers to save custom fields via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [
"cpe:2.3:a:goldplugins:custom_banners:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-2mgx-qf67-h3rj | Unbound before 1.9.5 allows an out-of-bounds write in sldns_bget_token_par. | [] |
|
GHSA-m22p-g7xv-5j93 | A vulnerability has been found in 1000 Projects Portfolio Management System MCA 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /register.php. The manipulation of the argument name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. | [] |
|
CVE-2021-30669 | A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.4, Security Update 2021-003 Catalina, Security Update 2021-004 Mojave. A malicious application may bypass Gatekeeper checks. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] |
|
GHSA-83v9-5w5v-c8pj | Authenticated WordPress Options Change vulnerability in Biplob Adhikari's Flipbox plugin <= 2.6.0 at WordPress. | [] |
|
CVE-2015-7896 | LibQJpeg in the Samsung Galaxy S6 before the October 2015 MR allows remote attackers to cause a denial of service (memory corruption and SIGSEGV) via a crafted image file. | [
"cpe:2.3:o:samsung:samsung_mobile:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:samsung_mobile:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:samsung_mobile:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:samsung_mobile:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:samsung_mobile:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:samsung_mobile:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:samsung_mobile:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:samsung_mobile:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:samsung_mobile:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:samsung_mobile:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:samsung_mobile:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:galaxy_s6:-:*:*:*:*:*:*:*"
] |
|
GHSA-xr77-4rxw-6357 | IBM MQ, IBM MQ Appliance, and IBM MQ for HPE NonStop 8.0, 9.1 CD, and 9.1 LTS is vulnerable to a buffer overflow vulnerability due to an error within the channel processing code. A remote attacker could overflow the buffer using an older client and cause a denial of service. IBM X-Force ID: 181562. | [] |
|
GHSA-rhj6-8m2c-87ch | SQL injection vulnerability in ioRD.asp in RedDot CMS 7.5 Build 7.5.0.48, and possibly other versions including 6.5 and 7.0, allows remote attackers to execute arbitrary SQL commands via the LngId parameter. | [] |
|
GHSA-fhx3-jwgv-mpc2 | Tenda AX1803 v1.0.0.1 contains a stack overflow via the serverName parameter in the function fromAdvSetMacMtuWan. | [] |
|
CVE-2017-14378 | EMC RSA Authentication Agent API 8.5 for C and RSA Authentication Agent SDK 8.6 for C allow attackers to bypass authentication, aka an "Error Handling Vulnerability." | [
"cpe:2.3:a:emc:rsa_authentication_agent_api_for_c:8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_authentication_agent_sdk_for_c:8.6:*:*:*:*:*:*:*"
] |
|
CVE-2005-0923 | The SmartScan feature in the Auto-Protect module for Symantec Norton AntiVirus 2004 and 2005, as also used in Internet Security 2004/2005 and System Works 2004/2005, allows attackers to cause a denial of service (CPU consumption and system crash) by renaming a file on a network share. | [
"cpe:2.3:a:symantec:norton_antivirus:2.1:*:ms_exchange:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_antivirus:2005:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_internet_security:2004:*:professional:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_internet_security:2005:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_system_works:2004_professional:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_system_works:2005_premier:*:*:*:*:*:*:*"
] |
|
GHSA-f7jc-5gw7-phrf | OpenAFS 1.x before 1.6.22 does not properly validate Rx ack packets, which allows remote attackers to cause a denial of service (system crash or application crash) via crafted fields, as demonstrated by an integer underflow and assertion failure for a small MTU value. | [] |
|
GHSA-qqpw-v685-55rr | Unspecified vulnerability on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.2(4) and earlier allows remote attackers to cause a denial of service (block exhaustion) via multicast traffic, aka Bug ID CSCtg63992. | [] |
|
GHSA-px6m-95hm-g25h | In the Linux kernel, the following vulnerability has been resolved:ice: Add a per-VF limit on number of FDIR filtersWhile the iavf driver adds a s/w limit (128) on the number of FDIR
filters that the VF can request, a malicious VF driver can request more
than that and exhaust the resources for other VFs.Add a similar limit in ice. | [] |
|
CVE-2021-31487 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop 16.6.3.84. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DWF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12715. | [
"cpe:2.3:a:opentext:brava\\!_desktop:16.6.3.84:*:*:*:*:*:*:*"
] |
|
CVE-2024-55089 | Rhymix 2.1.19 is vulnerable to Server-Side Request Forgery (SSRF) in the background import data function. | [] |
|
CVE-2019-20079 | The autocmd feature in window.c in Vim before 8.1.2136 accesses freed memory. | [
"cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
] |
|
CVE-2023-38498 | Discourse vulnerable to DoS via defer queue | Discourse is an open source discussion platform. Prior to version 3.0.6 of the `stable` branch and version 3.1.0.beta7 of the `beta` and `tests-passed` branches, a malicious user can prevent the defer queue from proceeding promptly on sites hosted in the same multisite installation. The issue is patched in version 3.0.6 of the `stable` branch and version 3.1.0.beta7 of the `beta` and `tests-passed` branches. There are no known workarounds for this vulnerability. Users of multisite configurations should upgrade. | [
"cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta6b:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta12:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta12:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta13:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta13b:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta14:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta12:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta12:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta13:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta12:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta13:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta14:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta15:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta16:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta17:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.1.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.1.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.1.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.1.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.1.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.1.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.5.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.5.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.5.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.5.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.5.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.5.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.5.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.6.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.6.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.6.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.6.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.6.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.6.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta12:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta13:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta14:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:3.0.0:beta15:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:3.0.0:beta16:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:3.1.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:3.1.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:3.1.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:3.1.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:3.1.0:beta6:*:*:beta:*:*:*"
] |
GHSA-wjmf-gq8m-5v77 | Airspan AirVelocity 1500 software version 15.18.00.2511 lacks CSRF protections in the eNodeB's web management UI. This issue may affect other AirVelocity and AirSpeed models. | [] |
|
CVE-2002-1926 | Directory traversal vulnerability in source.php in Aquonics File Manager 1.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the HTTP query string. | [
"cpe:2.3:a:aquonics_scripting:aquonics_file_manager:1.5:*:*:*:*:*:*:*"
] |
|
CVE-2014-7181 | Cross-site scripting (XSS) vulnerability in the Max Foundry MaxButtons plugin before 1.26.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the id parameter in a button action on the maxbuttons-controller page to wp-admin/admin.php, related to the button creation page. | [
"cpe:2.3:a:maxfoundry:maxbuttons:1.26.0:*:*:*:*:*:*:*"
] |
|
GHSA-gj43-gc6c-4xvw | Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2014-0455 and CVE-2014-2402. | [] |
|
GHSA-f3rf-mrmp-8fvg | An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1, iOS 14.2 and iPadOS 14.2, tvOS 14.2, watchOS 7.1. Processing a maliciously crafted audio file may lead to arbitrary code execution. | [] |
|
GHSA-9v32-c484-vc8x | A vulnerability was found in fanzila WebFinance 0.5. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file htdocs/prospection/save_contact.php. The manipulation of the argument nom/prenom/email/tel/mobile/client/fonction/note leads to sql injection. The name of the patch is 165dfcaa0520ee0179b7c1282efb84f5a03df114. It is recommended to apply a patch to fix this issue. The identifier VDB-220057 was assigned to this vulnerability. | [] |
|
GHSA-j9pv-457m-mpv3 | SQL injection vulnerability to viewforum.php in S-CMS 2.5 allows remote attackers to execute arbitrary SQL commands via the id parameter. | [] |
|
CVE-2015-8009 | The MWOAuthDataStore::lookup_token function in Extension:OAuth for MediaWiki 1.25.x before 1.25.3, 1.24.x before 1.24.4, and before 1.23.11 does not properly validate the signature when checking the authorization signature, which allows remote registered Consumers to use another Consumer's credentials by leveraging knowledge of the credentials. | [
"cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.24.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.24.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.24.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.25.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.25.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.25.2:*:*:*:*:*:*:*"
] |
|
CVE-2022-22348 | IBM Spectrum Protect Operations Center 8.1.0.000 through 8.1.13.xxx is vulnerable to reverse tabnabbing where it could allow a page linked to from within Operations Center to rewrite it. An administrator could enter a link to a malicious URL that another administrator could then click. Once clicked, that malicious URL could then rewrite the original page with a phishing page. IBM X-Force ID: 220139. | [
"cpe:2.3:a:ibm:spectrum_protect_operations_center:*:*:*:*:*:*:*:*"
] |
|
GHSA-p5q7-3j52-5rg9 | Untrusted search path vulnerability in trickle 1.07 allows local users to execute arbitrary code via a Trojan horse trickle-overload.so in the current working directory, which is referenced in the LD_PRELOAD path. | [] |
|
GHSA-4jp8-75fv-797w | Stack-based buffer overflow in the Read32s_64 function in src/lib/cdfread64.c in the NASA Goddard Space Flight Center Common Data Format (CDF) library before 3.2.1 allows context-dependent attackers to execute arbitrary code via a .cdf file with crafted length tags. | [] |
|
GHSA-xhgh-53f7-w2q7 | Buffer overflow in the Webserver component on the Huawei E5332 router before 21.344.27.00.1080 allows remote authenticated users to cause a denial of service (reboot) via a long parameter in an API service request message. | [] |
|
CVE-2007-4911 | JSMP3OGGWt.dll in JetCast Server 2.0.0.4308 allows remote attackers to cause a denial of service (daemon crash) via a long .mp3 URI to TCP port 8000. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:cowon_america:jetcast_server:2:*:*:*:*:*:*:*"
] |
|
GHSA-4gqj-v768-rp5w | Unspecified "input validation" vulnerability in WebCore in Apple Mac OS X 10.4 through 10.4.10 allows remote attackers to modify form field values via unknown vectors related to file uploads. | [] |
|
CVE-2022-37348 | Trend Micro Security 2021 and 2022 (Consumer) is vulnerable to an Out-Of-Bounds Read Information Disclosure Vulnerability that could allow an attacker to read sensitive information from other memory locations and cause a crash on an affected machine. This vulnerability is similar to, but not the same as CVE-2022-37347. | [
"cpe:2.3:a:trendmicro:security:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
CVE-2006-5115 | Directory traversal vulnerability in kgcall.php in KGB 1.87 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the engine parameter, as demonstrated by uploading a file containing PHP code with an image/jpeg content type, and then referencing this file through the engine parameter. | [
"cpe:2.3:a:kgb:kgb:1.87:*:*:*:*:*:*:*"
] |
|
GHSA-5hvx-pxpw-33vc | In register of UidObserverController.java, there is a missing permission check. This could lead to local information disclosure of app usage with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-217934898 | [] |
|
GHSA-6p63-9ccx-hw3f | Microsoft Windows 10 1511, 1607, and 1703, and Windows Server 2016 allow an unauthenticated attacker to send a specially crafted kernel mode request to cause a denial of service on the target system, aka "Windows VAD Cloning Denial of Service Vulnerability". | [] |
|
GHSA-4mwf-r2cw-r8wg | PHP remote file inclusion vulnerability in layout/default/params.php in Boonex Orca 2.0 and 2.0.2, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the gConf[dir][layouts] parameter. | [] |
|
CVE-2024-53441 | An issue in the index.js decryptCookie function of cookie-encrypter v1.0.1 allows attackers to execute a bit flipping attack. | [] |
|
GHSA-p3q7-2gx5-pjfq | SQL injection vulnerability in zero_transact_article.php in ZeroCMS 1.0 allows remote attackers to execute arbitrary SQL commands via the article_id parameter in a Submit Comment action. | [] |
|
CVE-2018-1999014 | FFmpeg before commit bab0716c7f4793ec42e05a5aa7e80d82a0dd4e75 contains an out of array access vulnerability in MXF format demuxer that can result in DoS. This attack appear to be exploitable via specially crafted MXF file which has to be provided as input. This vulnerability appears to have been fixed in bab0716c7f4793ec42e05a5aa7e80d82a0dd4e75 and later. | [
"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*"
] |
|
GHSA-69h4-r42q-6wmv | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in gVectors Team wpDiscuz allows Code Injection.This issue affects wpDiscuz: from n/a through 7.6.10. | [] |
|
GHSA-95ch-8j4p-q55m | Memory corruption in Audio during a playback or a recording due to race condition between allocation and deallocation of graph object. | [] |
|
CVE-2024-9781 | Improper Handling of Missing Values in Wireshark | AppleTalk and RELOAD Framing dissector crash in Wireshark 4.4.0 and 4.2.0 to 4.2.7 allows denial of service via packet injection or crafted capture file | [
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:4.4.0:*:*:*:*:*:*:*"
] |
GHSA-wp72-7hj9-5265 | Remote file existence check vulnerability in `mlflow server` and `mlflow ui` CLIs | ImpactUsers of the MLflow Open Source Project who are hosting the MLflow Model Registry using the `mlflow server` or `mlflow ui` commands using an MLflow version older than MLflow 2.2.1 may be vulnerable to a remote file existence check exploit if they are not limiting who can query their server (for example, by using a cloud VPC, an IP allowlist for inbound requests, or authentication / authorization middleware).This issue only affects users and integrations that run the `mlflow server` and `mlflow ui` commands. Integrations that do not make use of `mlflow server` or `mlflow ui` are unaffected; for example, the Databricks Managed MLflow product and MLflow on Azure Machine Learning do not make use of these commands and are not impacted by these vulnerabilities in any way.The vulnerability detailed in https://nvd.nist.gov/vuln/detail/CVE-2023-1176 enables an actor to check the existence of arbitrary files unrelated to MLflow from the host server, including any files stored in remote locations to which the host server has access.PatchesThis vulnerability has been patched in MLflow 2.2.1, which was released to PyPI on March 2nd, 2023. If you are using `mlflow server` or `mlflow ui` with the MLflow Model Registry, we recommend upgrading to MLflow 2.2.1 as soon as possible.WorkaroundsIf you are using the MLflow open source `mlflow server` or `mlflow ui` commands, we strongly recommend limiting who can access your MLflow Model Registry and MLflow Tracking servers using a cloud VPC, an IP allowlist for inbound requests, authentication / authorization middleware, or another access restriction mechanism of your choosing.If you are using the MLflow open source `mlflow server` or `mlflow ui` commands, we also strongly recommend limiting the remote files to which your MLflow Model Registry and MLflow Tracking servers have access. For example, if your MLflow Model Registry or MLflow Tracking server uses cloud-hosted blob storage for MLflow artifacts, make sure to restrict the scope of your server's cloud credentials such that it can only access files and directories related to MLflow.ReferencesMore information about the vulnerability is available at https://nvd.nist.gov/vuln/detail/CVE-2023-1176. | [] |
GHSA-xw2r-f8xv-c8xp | PrestaShop XSS injection through Validate::isCleanHTML method | Impactxss injection through `isCleanHTML` methodPatches1.7.8.10
8.0.5
8.1.1Found byAleksey Solovev (Positive Technologies)WorkaroundsReferences | [] |
GHSA-wh7w-vjg6-xh6h | Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service. | [] |
|
CVE-2008-6851 | SQL injection vulnerability in page.php in PHP Link Directory (phpLD) 3.3, when register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the name parameter. | [
"cpe:2.3:a:php_link_directory:php_link_directory:3.3:*:*:*:*:*:*:*"
] |
|
GHSA-74m3-p55c-j2rg | Cross-site scripting (XSS) vulnerability in index.php in Zorum Forum 3.5 allows remote attackers to inject web script or HTML via the multiple unspecified parameters, including the (1) frommethod, (2) list, and (3) method, which are reflected in an error message. NOTE: some of these vectors might be resultant from SQL injection. | [] |
|
GHSA-m83x-3x2c-26q8 | rsync 3.1.3-development before 2017-10-24 mishandles archaic checksums, which makes it easier for remote attackers to bypass intended access restrictions. NOTE: the rsync development branch has significant use beyond the rsync developers, e.g., the code has been copied for use in various GitHub projects. | [] |
|
GHSA-q4wg-3c94-73xq | Format string vulnerability in kvt in KDE 1.1.2 may allow local users to execute arbitrary commands via a DISPLAY environmental variable that contains formatting characters. | [] |
|
CVE-2022-21444 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 5.7.37 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
] |
|
CVE-2020-36723 | The ListingPro - WordPress Directory & Listing Theme for WordPress is vulnerable to Sensitive Data Exposure in versions before 2.6.1 via the ~/listingpro-plugin/functions.php file. This makes it possible for unauthenticated attackers to extract sensitive data including usernames, full names, email addresses, phone numbers, physical addresses and user post counts. | [
"cpe:2.3:a:cridio:listingpro:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2019-19889 | An issue was discovered on Humax Wireless Voice Gateway HGB10R-2 20160817_1855 devices. The attacker can discover admin credentials in the backup file, aka backupsettings.conf. | [
"cpe:2.3:o:humaxdigital:hgb10r-02_firmware:20160817_1855:*:*:*:*:*:*:*",
"cpe:2.3:h:humaxdigital:hgb10r-02:-:*:*:*:*:*:*:*"
] |
|
GHSA-c7xm-pc9f-6xw4 | Incorrect pointer checks within the NvmExpressDxe driver can allow tampering with SMRAM and OS memory Incorrect pointer checks within the NvmExpressDxe driver can allow tampering with SMRAM and OS memory. This issue was discovered by Insyde during security review. Fixed in: Kernel 5.1: Version 05.17.23 Kernel 5.2: Version 05.27.23 Kernel 5.3: Version 05.36.23 Kernel 5.4: Version 05.44.23 Kernel 5.5: Version 05.52.23 https://www.insyde.com/security-pledge/SA-2022061 | [] |
|
GHSA-fhrw-r9xq-8xhg | EasyVirt DCScope 8.6.0 and earlier and co2Scope 1.3.0 and earlier are vulnerable to Command injection. | [] |
|
CVE-2023-48229 | Out-of-bounds write in the radio driver for Contiki-NG nRF platforms | Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An out-of-bounds write exists in the driver for IEEE 802.15.4 radios on nRF platforms in the Contiki-NG operating system. The problem is triggered when parsing radio frames in the `read_frame` function in the `arch/cpu/nrf/net/nrf-ieee-driver-arch.c` module. More specifically, the `read_frame` function performs an incomplete validation of the payload length of the packet, which is a value that can be set by an external party that sends radio packets to a Contiki-NG system. Although the value is validated to be in the range of the MTU length, it is not validated to fit into the given buffer into which the packet will be copied. The problem has been patched in the "develop" branch of Contiki-NG and is expected to be included in subsequent releases. Users are advised to update their develop branch or to update to a subsequent release when available. Users unable to upgrade should consider manually applying the changes in PR #2741. | [
"cpe:2.3:o:contiki-ng:contiki-ng:*:*:*:*:*:*:*:*"
] |
CVE-2015-7245 | Directory traversal vulnerability in D-Link DVG-N5402SP with firmware W1000CN-00, W1000CN-03, or W2000EN-00 allows remote attackers to read sensitive information via a .. (dot dot) in the errorpage parameter. | [
"cpe:2.3:o:d-link:dvg-n5402sp_firmware:w1000cn-00:*:*:*:*:*:*:*",
"cpe:2.3:o:d-link:dvg-n5402sp_firmware:w1000cn-03:*:*:*:*:*:*:*",
"cpe:2.3:o:d-link:dvg-n5402sp_firmware:w2000en-00:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dvg-n5402sp:-:*:*:*:*:*:*:*"
] |
|
CVE-2017-6870 | A vulnerability was discovered in Siemens SIMATIC WinCC Sm@rtClient for Android (All versions before V1.0.2.2). The existing TLS protocol implementation could allow an attacker to read and modify data within a TLS session while performing a Man-in-the-Middle (MitM) attack. | [
"cpe:2.3:a:siemens:simatic_wincc_sm\\@rtclient:*:*:*:*:*:android:*:*"
] |
|
GHSA-44vf-h2q2-97cq | The kernel in Apple iOS before 5.0.1 does not ensure the validity of flag combinations for an mmap system call, which allows local users to execute arbitrary unsigned code via a crafted app. | [] |
|
GHSA-g6wj-cmhj-qw7h | Cross-Site Request Forgery (CSRF) vulnerability in Criss Swaim TPG Redirect plugin <= 1.0.7 versions. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.