id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-pq8g-q463-5hp3 | IBM FileNet Content Manager 5.5.8, 5.5.10, and 5.5.11 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 259384. | [] |
|
CVE-2004-1889 | Unknown vulnerability in ftpd in SGI IRIX 6.5.20 through 6.5.23 allows remote attackers to cause a denial of service (hang) via a link failure with Microsoft Windows. | [
"cpe:2.3:o:sgi:irix:6.5.20:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.20f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.20m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.21:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.21f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.21m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.22:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.23:*:*:*:*:*:*:*"
] |
|
CVE-2005-1408 | Apple Keynote 2.0 and 2.0.1 allows remote attackers to read arbitrary files via the keynote: URI handler in a crafted Keynote presentation. | [
"cpe:2.3:a:apple:keynote:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:keynote:2.0.1:*:*:*:*:*:*:*"
] |
|
CVE-2023-38124 | Inductive Automation Ignition OPC UA Quick Client Task Scheduling Exposed Dangerous Function Remote Code Execution Vulnerability | Inductive Automation Ignition OPC UA Quick Client Task Scheduling Exposed Dangerous Function Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. Authentication is required to exploit this vulnerability.
The specific flaw exists within the Ignition Gateway server. The issue results from the exposure of a dangerous function. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-20541. | [
"cpe:2.3:a:inductiveautomation:ignition:*:*:*:*:*:*:*:*"
] |
GHSA-mf63-wm8x-6475 | SAP Process Integration (PGP Module - Business-to-Business Add On), version - 1.0, allows an attacker to read PGP Keys under certain conditions in the PGP Module of Business-to-Business Add-On, these keys can then be used to read messages processed by the module leading to Information Disclosure. | [] |
|
GHSA-pjfw-gjxc-hvgp | A remote authenticated command injection vulnerability was discovered in Aruba ClearPass Policy Manager version(s): Prior to 6.9.5, 6.8.8-HF1, 6.7.14-HF1. A vulnerability in the ClearPass web-based management interface allows remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise. | [] |
|
GHSA-8cg4-3m84-3pwg | Multiple cross-site scripting (XSS) vulnerabilities in member.php in MyBulletin Board (MyBB) 1.0.3 allow remote attackers to inject arbitrary web script or HTML via the (1) aim, (2) yahoo, (3) msn, or (4) website field. | [] |
|
CVE-2022-29795 | The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability. | [
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*"
] |
|
CVE-2005-3661 | Dell TrueMobile 2300 Wireless Broadband Router running firmware 3.0.0.8 and 5.1.1.6, and possibly other versions, allows remote attackers to reset authentication credentials, then change configuration or firmware, via a direct request to apply.cgi with the Page parameter set to adv_password.asp. | [
"cpe:2.3:h:dell:truemobile_2300_wireless_broadband_router:3.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:truemobile_2300_wireless_broadband_router:5.1.1.6:*:*:*:*:*:*:*"
] |
|
CVE-2020-6527 | Insufficient policy enforcement in CSP in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to bypass content security policy via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp2:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"
] |
|
CVE-2023-27284 | IBM Aspera code execution | IBM Aspera Cargo 4.2.5 and IBM Aspera Connect 4.2.5 are vulnerable to a buffer overflow, caused by improper bounds checking. An attacker could overflow a buffer and execute arbitrary code on the system. IBM X-Force ID: 248616. | [
"cpe:2.3:a:ibm:aspera_cargo:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:aspera_connect:*:*:*:*:*:*:*:*"
] |
GHSA-86mm-qq2x-p28p | The affected product is vulnerable to cookie information being transmitted as cleartext over HTTP. An attacker can capture network traffic, obtain the user’s cookie and take over the account. | [] |
|
GHSA-pjvr-qvh4-frwq | Open Networking Foundation SD-RAN ONOS onos-lib-go 0.10.25 allows an index out-of-range condition in putBitString. | [] |
|
GHSA-hff4-446w-6w6j | NessusWX 1.4.4 stores account passwords in plaintext in .session files, which allows local users to obtain passwords. | [] |
|
CVE-2014-5616 | The Web Browser & Explorer (aka com.explore.web.browser) application 2.0.7 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:litter_penguin:web_browser_\\&_explorer:2.0.7:*:*:*:*:android:*:*"
] |
|
GHSA-296x-6w33-2mmq | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0920, CVE-2019-1005, CVE-2019-1055, CVE-2019-1080. | [] |
|
CVE-2017-0448 | An information disclosure vulnerability in the NVIDIA video driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as High because it could be used to access sensitive data without explicit user permission. Product: Android. Versions: Kernel-3.10. Android ID: A-32721029. References: N-CVE-2017-0448. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*"
] |
|
CVE-2023-53030 | octeontx2-pf: Avoid use of GFP_KERNEL in atomic context | In the Linux kernel, the following vulnerability has been resolved:
octeontx2-pf: Avoid use of GFP_KERNEL in atomic context
Using GFP_KERNEL in preemption disable context, causing below warning
when CONFIG_DEBUG_ATOMIC_SLEEP is enabled.
[ 32.542271] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274
[ 32.550883] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1, name: swapper/0
[ 32.558707] preempt_count: 1, expected: 0
[ 32.562710] RCU nest depth: 0, expected: 0
[ 32.566800] CPU: 3 PID: 1 Comm: swapper/0 Tainted: G W 6.2.0-rc2-00269-gae9dcb91c606 #7
[ 32.576188] Hardware name: Marvell CN106XX board (DT)
[ 32.581232] Call trace:
[ 32.583670] dump_backtrace.part.0+0xe0/0xf0
[ 32.587937] show_stack+0x18/0x30
[ 32.591245] dump_stack_lvl+0x68/0x84
[ 32.594900] dump_stack+0x18/0x34
[ 32.598206] __might_resched+0x12c/0x160
[ 32.602122] __might_sleep+0x48/0xa0
[ 32.605689] __kmem_cache_alloc_node+0x2b8/0x2e0
[ 32.610301] __kmalloc+0x58/0x190
[ 32.613610] otx2_sq_aura_pool_init+0x1a8/0x314
[ 32.618134] otx2_open+0x1d4/0x9d0
To avoid use of GFP_ATOMIC for memory allocation, disable preemption
after all memory allocation is done. | [] |
CVE-2019-9294 | In libstagefright, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-111764444 | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] |
|
CVE-2021-45620 | Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR40 before 2.5.0.24, CBR750 before 4.6.3.6, EAX20 before 1.0.0.58, EAX80 before 1.0.1.68, LAX20 before 1.1.6.28, MR60 before 1.0.6.116, MR80 before 1.1.2.20, MS60 before 1.0.6.116, MS80 before 1.1.2.20, MK62 before 1.0.6.116, MK83 before 1.1.2.20, R6400 before 1.0.1.70, R6400v2 before 1.0.4.106, R6700v3 before 1.0.4.106, R6900P before 1.3.3.140, R7000 before 1.0.11.126, R7000P before 1.3.3.140, R7850 before 1.0.5.74, R7900 before 1.0.4.46, R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000 before 1.0.4.74, R8000P before 1.4.2.84, RAX15 before 1.0.3.96, RAX20 before 1.0.3.96, RAX200 before 1.0.4.120, RAX35v2 before 1.0.3.96, RAX40v2 before 1.0.3.96, RAX43 before 1.0.3.96, RAX45 before 1.0.3.96, RAX50 before 1.0.3.96, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RBK752 before 3.2.17.12, RBK852 before 3.2.17.12, RBR750 before 3.2.17.12, RBR850 before 3.2.17.12, RBS750 before 3.2.17.12, RBS850 before 3.2.17.12, RS400 before 1.5.1.80, XR1000 before 1.0.0.58, and XR300 before 1.0.3.68. | [
"cpe:2.3:o:netgear:cbr40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:cbr40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:cbr750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:cbr750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:eax20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:eax20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:eax80_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:eax80:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:lax20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:lax20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:mr60_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:mr60:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ms60_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ms60:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6400v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6400v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6700v3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6700v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7900p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7900p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7960p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7960p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8000p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8000p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax15_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax15:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax35v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax35v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax40v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax40v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax43_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax43:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax45_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax45:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax75_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax75:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax80_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax80:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk752_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk752:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk852_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk852:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rs400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rs400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:xr1000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:xr1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:xr300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:xr300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:mk62_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:mk62:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:mr80_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:mr80:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ms80_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ms80:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:mk83_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:mk83:-:*:*:*:*:*:*:*"
] |
|
GHSA-j49m-fvhp-27f5 | An incorrect check in the component cdr.php of Voipmonitor GUI before v24.96 allows unauthenticated attackers to escalate privileges via a crafted request. | [] |
|
CVE-2016-10637 | haxe-dev is a cross-platform toolkit. haxe-dev downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server. | [
"cpe:2.3:a:haxe:haxe-dev:-:*:*:*:*:node.js:*:*"
] |
|
CVE-2018-11076 | Dell EMC Avamar and Integrated Data Protection Appliance Information Exposure Vulnerability | Dell EMC Avamar Server versions 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.4.0 and 7.4.1 and Dell EMC Integrated Data Protection Appliance (IDPA) 2.0 are affected by an information exposure vulnerability. Avamar Java management console's SSL/TLS private key may be leaked in the Avamar Java management client package. The private key could potentially be used by an unauthenticated attacker on the same data-link layer to initiate a MITM attack on management console users. | [
"cpe:2.3:a:dell:emc_avamar:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:emc_avamar:7.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:emc_avamar:7.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:emc_avamar:7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:emc_avamar:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:emc_avamar:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:emc_integrated_data_protection_appliance:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vsphere_data_protection:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vsphere_data_protection:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vsphere_data_protection:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vsphere_data_protection:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vsphere_data_protection:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vsphere_data_protection:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vsphere_data_protection:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vsphere_data_protection:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vsphere_data_protection:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vsphere_data_protection:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vsphere_data_protection:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vsphere_data_protection:6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vsphere_data_protection:6.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vsphere_data_protection:6.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vsphere_data_protection:6.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vsphere_data_protection:6.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vsphere_data_protection:6.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vsphere_data_protection:6.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vsphere_data_protection:6.1.9:*:*:*:*:*:*:*"
] |
CVE-2021-24568 | AddToAny < 1.7.46 - Authenticated Stored XSS | The AddToAny Share Buttons WordPress plugin before 1.7.46 does not sanitise its Sharing Header setting when outputting it in frontend pages, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed | [
"cpe:2.3:a:addtoany:addtoany_share_buttons:*:*:*:*:*:wordpress:*:*"
] |
CVE-2020-26237 | Prototype Pollution in highlight.js | Highlight.js is a syntax highlighter written in JavaScript. Highlight.js versions before 9.18.2 and 10.1.2 are vulnerable to Prototype Pollution. A malicious HTML code block can be crafted that will result in prototype pollution of the base object's prototype during highlighting. If you allow users to insert custom HTML code blocks into your page/app via parsing Markdown code blocks (or similar) and do not filter the language names the user can provide you may be vulnerable. The pollution should just be harmless data but this can cause problems for applications not expecting these properties to exist and can result in strange behavior or application crashes, i.e. a potential DOS vector. If your website or application does not render user provided data it should be unaffected. Versions 9.18.2 and 10.1.2 and newer include fixes for this vulnerability. If you are using version 7 or 8 you are encouraged to upgrade to a newer release. | [
"cpe:2.3:a:highlightjs:highlight.js:*:*:*:*:*:node.js:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*"
] |
CVE-2021-21541 | Dell EMC iDRAC9 versions prior to 4.40.00.00 contain a DOM-based cross-site scripting vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability by tricking a victim application user to supply malicious HTML or JavaScript code to DOM environment in the browser. The malicious code is then executed by the web browser in the context of the vulnerable web application. | [
"cpe:2.3:o:dell:idrac9_firmware:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-25899 | A buffer overflow vulnerability was discovered in TP-Link TL-WR841ND V11 via the 'gw' parameter at /userRpm/WanDynamicIpV6CfgRpm.htm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. | [] |
|
CVE-2018-20026 | Improper Communication Address Filtering exists in CODESYS V3 products versions prior V3.5.14.0. | [
"cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_for_empc-a\\/imx6_sl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_rte_sl_\\(for_beckhoff_cx\\):*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_runtime_toolkit:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:development_system_v3:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:hmi_sl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:opc_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:plchandler:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:safety_sil2:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:targetvisu_sl:*:*:*:*:*:*:*:*"
] |
|
GHSA-cfxc-ch9m-pr95 | A local privilege escalation vlnerability in the WatchGuard Mobile VPN with SSL client on Windows enables a local user to execute arbitrary commands with elevated privileged. | [] |
|
CVE-2024-2505 | GamiPress < 6.8.9 - Broken Access Control | The GamiPress WordPress plugin before 6.8.9's access control mechanism fails to properly restrict access to its settings, permitting Authors to manipulate requests and extend access to lower privileged users, like Subscribers, despite initial settings prohibiting such access. This vulnerability resembles broken access control, enabling unauthorized users to modify critical GamiPress WordPress plugin before 6.8.9 configurations. | [
"cpe:2.3:a:gamipress:gamipress:-:*:*:*:*:wordpress:*:*"
] |
GHSA-g6xv-8q23-w2q3 | SQL Injection in Gogs | Multiple SQL injection vulnerabilities in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.6.1105 Beta allow remote attackers to execute arbitrary SQL commands via the q parameter to (1) api/v1/repos/search, which is not properly handled in models/repo.go, or (2) api/v1/users/search, which is not properly handled in models/user.go. | [] |
CVE-2019-2525 | Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 5.6 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N). | [
"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-2pc2-wxgf-m9mm | Cross-Site Scripting (XSS) vulnerability in School Event Management System affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted javascript payload to an authenticated user and partially take over their browser session via the 'id' and 'view' parameters in '/user/index.php'. | [] |
|
CVE-2025-22569 | WordPress Featured Page Widget Plugin <= 2.2 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in grandslambert Featured Page Widget allows Reflected XSS.This issue affects Featured Page Widget: from n/a through 2.2. | [] |
CVE-2024-29913 | WordPress Tutor LMS Elementor Addons plugin <= 2.1.3 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themeum Tutor LMS Elementor Addons allows Stored XSS.This issue affects Tutor LMS Elementor Addons: from n/a through 2.1.3.
| [] |
CVE-2022-39945 | An improper access control vulnerability [CWE-284] in FortiMail 7.2.0, 7.0.0 through 7.0.3, 6.4 all versions, 6.2 all versions, 6.0 all versions may allow an authenticated admin user assigned to a specific domain to access and modify other domains information via insecure direct object references (IDOR). | [
"cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.2.0:*:*:*:*:*:*:*"
] |
|
CVE-2007-1475 | Multiple buffer overflows in the (1) ibase_connect and (2) ibase_pconnect functions in the interbase extension in PHP 4.4.6 and earlier allow context-dependent attackers to execute arbitrary code via a long argument. | [
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
] |
|
CVE-1999-1123 | The installation of Sun Source (sunsrc) tapes allows local users to gain root privileges via setuid root programs (1) makeinstall or (2) winstall. | [
"cpe:2.3:o:sun:sunos:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*"
] |
|
CVE-2013-6742 | The Meeting Server in IBM Sametime 8.5.2 through 8.5.2.1 and 9.x through 9.0.0.1 do not have an off autocomplete attribute for a password field, which makes it easier for remote attackers to obtain access by leveraging an unattended workstation. | [
"cpe:2.3:a:ibm:sametime:8.5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:8.5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:9.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:9.0.0.1:*:*:*:*:*:*:*"
] |
|
GHSA-2p7g-6fmh-wpf3 | Cross-site scripting (XSS) vulnerability in the web management interface on Polycom HDX Video End Points with UC APL software before 2.7.1.1_J, and commercial software before 3.0.5, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
CVE-2017-2998 | Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable memory corruption vulnerability in the Primetime TVSDK API functionality related to timeline interactions. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*"
] |
|
GHSA-4g29-fccr-p59w | Reflected Cross-site Scripting in Shopware storefront | ImpactNot-stored XSS in storefront.
Request parameter were directly assigned to the template, so that malicious code could be send via an URL.PatchesWe recommend updating to the current version 5.7.9. You can get the update to 5.7.9 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/changelog-sw5/#5-7-9For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.htmlReferenceshttps://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022 | [] |
CVE-2004-0119 | The Negotiate Security Software Provider (SSP) interface in Windows 2000, Windows XP, and Windows Server 2003, allows remote attackers to cause a denial of service (crash from null dereference) or execute arbitrary code via a crafted SPNEGO NegTokenInit request during authentication protocol selection. | [
"cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*"
] |
|
GHSA-j2jm-v4rj-jq5r | An issue was discovered in RWS WorldServer before 11.7.3. Regular users can create users with the Administrator role via UserWSUserManager. | [] |
|
CVE-2022-49511 | fbdev: defio: fix the pagelist corruption | In the Linux kernel, the following vulnerability has been resolved:
fbdev: defio: fix the pagelist corruption
Easily hit the below list corruption:
==
list_add corruption. prev->next should be next (ffffffffc0ceb090), but
was ffffec604507edc8. (prev=ffffec604507edc8).
WARNING: CPU: 65 PID: 3959 at lib/list_debug.c:26
__list_add_valid+0x53/0x80
CPU: 65 PID: 3959 Comm: fbdev Tainted: G U
RIP: 0010:__list_add_valid+0x53/0x80
Call Trace:
<TASK>
fb_deferred_io_mkwrite+0xea/0x150
do_page_mkwrite+0x57/0xc0
do_wp_page+0x278/0x2f0
__handle_mm_fault+0xdc2/0x1590
handle_mm_fault+0xdd/0x2c0
do_user_addr_fault+0x1d3/0x650
exc_page_fault+0x77/0x180
? asm_exc_page_fault+0x8/0x30
asm_exc_page_fault+0x1e/0x30
RIP: 0033:0x7fd98fc8fad1
==
Figure out the race happens when one process is adding &page->lru into
the pagelist tail in fb_deferred_io_mkwrite(), another process is
re-initializing the same &page->lru in fb_deferred_io_fault(), which is
not protected by the lock.
This fix is to init all the page lists one time during initialization,
it not only fixes the list corruption, but also avoids INIT_LIST_HEAD()
redundantly.
V2: change "int i" to "unsigned int i" (Geert Uytterhoeven) | [] |
GHSA-6c2c-pccc-qw97 | Vulnerability in the Oracle Marketing component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2 and 12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Marketing, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Marketing accessible data as well as unauthorized update, insert or delete access to some of Oracle Marketing accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). | [] |
|
GHSA-7c3v-793j-crwq | Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable heap overflow vulnerability in the XSLT engine. Successful exploitation could lead to arbitrary code execution. | [] |
|
CVE-2019-11639 | An issue was discovered in GNU recutils 1.8. There is a stack-based buffer overflow in the function rec_type_check_enum at rec-types.c in librec.a. | [
"cpe:2.3:a:gnu:recutils:1.8:*:*:*:*:*:*:*"
] |
|
GHSA-556v-mrqm-gpj4 | IBM Emptoris Sourcing 10.1.0 through 10.1.3, IBM Contract Management 10.1.0 through 10.1.3, and IBM Emptoris Spend Analysis 10.1.0 through 10.1.3 generates an error message that includes sensitive information that could be used in further attacks against the system. IBM X-Force ID: 164069. | [] |
|
CVE-2024-53987 | Possible XSS vulnerability with certain configurations of rails-html-sanitizer 1.6.0 | rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. There is a possible XSS vulnerability with certain configurations of Rails::HTML::Sanitizer 1.6.0 when used with Rails >= 7.1.0. A possible XSS vulnerability with certain configurations of Rails::HTML::Sanitizer may allow an attacker to inject content if HTML5 sanitization is enabled and the application developer has overridden the sanitizer's allowed tags where the "style" element is explicitly allowed and the "svg" or "math" element is not allowed. This vulnerability is fixed in 1.6.1. | [] |
CVE-2022-32056 | Online Accreditation Management v1.0 was discovered to contain a SQL injection vulnerability via the USERNAME parameter at process.php. | [
"cpe:2.3:a:online_accreditation_management_system_project:online_accreditation_management_system:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-7j98-74jh-cjxh | Privilege escalation for users that can access mock configuration | The Mock software contains a vulnerability wherein an attacker could potentially exploit privilege escalation, enabling the execution of arbitrary code with root user privileges. This weakness stems from the absence of proper sandboxing during the expansion and execution of Jinja2 templates, which may be included in certain configuration parameters. While the Mock documentation advises treating users added to the mock group as privileged, certain build systems invoking mock on behalf of users might inadvertently permit less privileged users to define configuration tags. These tags could then be passed as parameters to mock during execution, potentially leading to the utilization of Jinja2 templates for remote privilege escalation and the execution of arbitrary code as the root user on the build server. | [] |
CVE-2024-43648 | Authenticated command injection via <redacted>.exe <redacted> parameter | Command injection in the <redacted> parameter of a <redacted>.exe request leads to remote code execution as the root user.
This issue affects Iocharger firmware for AC models before version 24120701.
Likelihood: Moderate – This action is not a common place for command injection vulnerabilities to occur. Thus, an attacker will likely only be able to find this vulnerability by reverse-engineering the firmware or trying it on all <redacted> fields. The attacker will also need a (low privilege) account to gain access to the <redacted> binary, or convince a user with such access to execute a payload.
Impact: Critical – The attacker has full control over the charging station as the root user, and can arbitrarily add, modify and delete files and services.
CVSS clarification. The attack can be executed over any network connection the station is listening to and serves the web interface (AV:N), and there are no additional security measure sin place that need to be circumvented (AC:L), the attack does not rely on preconditions (AT:N). The attack does require authentication, but the level of authentication is irrelevant (PR:L), it does not require user interaction (UI:N). If is a full system compromise, potentially fully compromising confidentiality, integrity and availability of the devicer (VC:H/VI:H/VA:H). A compromised charger can be used to "pivot" onto networks that should otherwise be closed, cause a low confidentiality and interity impact on subsequent systems. (SC:L/SI:L/SA:H). Because this device is an EV charger handing significant amounts of power, we suspect this vulnerability can have a safety impact (S:P). The attack can be automated (AU:Y). | [] |
CVE-2006-1246 | Unspecified vulnerability in mklvcopy in BOS.RTE.LVM in IBM AIX 5.3 allows local users to execute arbitrary commands when mklvcopy calls external commands, possibly due to an untrusted search path vulnerability. | [
"cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*"
] |
|
CVE-2019-15992 | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Code Execution Vulnerability | A vulnerability in the implementation of the Lua interpreter integrated in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to execute arbitrary code with root privileges on the underlying Linux operating system of an affected device. The vulnerability is due to insufficient restrictions on the allowed Lua function calls within the context of user-supplied Lua scripts. A successful exploit could allow the attacker to trigger a heap overflow condition and execute arbitrary code with root privileges on the underlying Linux operating system of an affected device. | [
"cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firepower_threat_defense:-:*:*:*:*:*:*:*"
] |
GHSA-6rww-x4m5-6j62 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kepware KEPServerEX V6.11.718.0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of text encoding conversions. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-18411. | [] |
|
GHSA-jfvj-f842-8cff | SQL injection vulnerability in sub_votepic.php in the Datsogallery (com_datsogallery) module 1.6 for Joomla! allows remote attackers to execute arbitrary SQL commands via the User-Agent HTTP header. | [] |
|
CVE-2017-2863 | An out-of-bounds write vulnerability exists in the PDF parsing functionality of Infix 7.1.5. A specially crafted PDF file can cause a vulnerability resulting in potential memory corruption. An attacker can send the victim a specific PDF file to trigger this vulnerability. | [
"cpe:2.3:a:iceni:infix:7.1.5:*:*:*:*:*:*:*"
] |
|
GHSA-cg3c-pj78-hrh5 | PGP Corporate Desktop before 7.1, Personal Security before 7.0.3, Freeware before 7.0.3, and E-Business Server before 7.1 does not properly display when invalid userID's are used to sign a message, which could allow an attacker to make the user believe that the document has been signed by a trusted third party by adding a second, invalid user ID to a key which has already been signed by the third party, aka the "PGPsdk Key Validity Vulnerability." | [] |
|
CVE-2023-49984 | A cross-site scripting (XSS) vulnerability in the component /management/settings of School Fees Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the name parameter. | [
"cpe:2.3:a:sourcecodester:school_fees_management_system:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2003-1582 | Microsoft Internet Information Services (IIS) 6.0, when DNS resolution is enabled for client IP addresses, allows remote attackers to inject arbitrary text into log files via an HTTP request in conjunction with a crafted DNS response, as demonstrated by injecting XSS sequences, related to an "Inverse Lookup Log Corruption (ILLC)" issue. | [
"cpe:2.3:a:microsoft:internet_information_server:6.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-20157 | Cisco Small Business Series Switches Buffer Overflow Vulnerabilities | Multiple vulnerabilities in the web-based user interface of certain Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code with root privileges on an affected device. These vulnerabilities are due to improper validation of requests that are sent to the web interface. For more information about these vulnerabilities, see the Details section of this advisory. | [
"cpe:2.3:o:cisco:250_series_smart_switches_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:350_series_managed_switches_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:350x_series_stackable_managed_switches_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:550x_series_stackable_managed_switches_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250_series_smart_switches_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350_series_managed_switches_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:small_business_200_series_smart_switches_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:small_business_300_series_managed_switches_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:small_business_500_series_stackable_managed_switches_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-16p-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-16p-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-16t-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-16t-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-24fp-4g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-24fp-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-24fp-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-24fp-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-24p-4g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-24p-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-24p-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-24p-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-24pp-4g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-24pp-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-24t-4g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-24t-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-24t-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-24t-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-48p-4g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-48p-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-48p-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-48p-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-48pp-4g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-48pp-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-48t-4g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-48t-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-48t-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-48t-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-8fp-e-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-8fp-e-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-8p-e-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-8p-e-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-8pp-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-8pp-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-8pp-e-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-8pp-e-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-8t-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-8t-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-8t-e-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-8t-e-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-12np-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-12np-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-12xs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-12xs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-12xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-12xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-16fp-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-16fp-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-16p-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-16p-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-16p-e-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-16p-e-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-16t-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-16t-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-16t-e-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-16t-e-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-16xts_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-16xts:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-24fp-4g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-24fp-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-24fp-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-24fp-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-24mgp-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-24mgp-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-24ngp-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-24ngp-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-24p-4g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-24p-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-24p-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-24p-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-24s-4g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-24s-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-24t-4g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-24t-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-24t-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-24t-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-24xs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-24xs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-24xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-24xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-24xts_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-24xts:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-48fp-4g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-48fp-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-48fp-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-48fp-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-48ngp-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-48ngp-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-48p-4g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-48p-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-48p-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-48p-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-48t-4g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-48t-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-48t-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-48t-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-48xt-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-48xt-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-8fp-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-8fp-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-8fp-e-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-8fp-e-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-8mgp-2x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-8mgp-2x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-8mp-2x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-8mp-2x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-8p-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-8p-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-8p-e-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-8p-e-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-8s-e-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-8s-e-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-8t-e-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-8t-e-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-8xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-8xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200-24fp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200-24p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200-48_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200-48p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200e-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200e-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200e-24p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200e-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200e-48_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200e-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200e-48p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200e-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200e48p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200e48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-08_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-08:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-08hp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-08hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-10p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-10p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-18_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-18:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-24p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-26_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-26:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-26hp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-26hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-26p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-26p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-48_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-48hp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-50_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-50hp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-50hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-50p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-50p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250x-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250x-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250x-24p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250x-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250x-48_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250x-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250x-48p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250x-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-08_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-24mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-24p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-24pp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-48_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-48p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-48pp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf302-08_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf302-08mpp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf302-08pp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-08_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-08:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-10_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-10mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-10mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-10p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-10p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-10sfp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-10sfp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-24mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-24mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-24p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-28_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-28:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-28mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-28mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-28p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-28p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-28sfp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-28sfp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-48_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-48mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-48p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-52_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-52:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-52mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-52mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-52p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-52p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-8mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-8mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-8pd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-8pd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf352-08_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf352-08:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf352-08mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf352-08mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf352-08p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf352-08p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf355-10p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf355-10p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf500-18p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf500-18p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf500-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf500-24mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf500-24mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf500-24p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf500-48_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf500-48mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf500-48mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf500-48p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf550x-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf550x-24mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf550x-24p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf550x-48_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf550x-48mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf550x-48p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-08_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-08p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-10fp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-18_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-26_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-26fp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-26p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-50_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-50fp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-50p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-08_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-08:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-08hp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-08hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-10p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-10p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-18_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-18:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-24p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-26_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-26:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-26hp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-26hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-26p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-26p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-48_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-48hp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-48hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-50_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-50hp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-50hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-50p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-50p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250x-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250x-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250x-24p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250x-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250x-48_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250x-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250x-48p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250x-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-10_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-10mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-10mpp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-10p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-10pp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-10sfp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-28_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-28mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-28p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-28pp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-28sfp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-28sfp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-52_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-52mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-52p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350-10_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350-10mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350-10p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350-28_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350-28mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350-28p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350x-12pmv_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350x-12pmv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350x-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350x-24mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350x-24p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350x-24pd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350x-24pd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350x-24pv_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350x-24pv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350x-48_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350x-48mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350x-48p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350x-48pv_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350x-48pv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350x-8pmd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350x-8pmd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350xg-24f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350xg-24t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350xg-2f10_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350xg-48t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg355-10mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg355-10mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg355-10p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500-28_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500-28mpp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500-28p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500-28pp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500-28pp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500-52p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500-52pp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500-52pp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500x-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500x-24mpp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500x-24mpp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500x-24p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500x-48_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500x-48mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500x-48mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500x-48mpp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500x-48mpp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500x-48p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500x24mpp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500x24mpp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500xg-8f8t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500xg8f8t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500xg8f8t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550x-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550x-24mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550x-24mpp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550x-24p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550x-48_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550x-48mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550x-48p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550x-48t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550x-48t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550xg-24f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550xg-24f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550xg-24t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550xg-24t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550xg-48t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550xg-48t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550xg-8f8t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550xg-8f8t:-:*:*:*:*:*:*:*"
] |
CVE-2021-44357 | Multiple denial of service vulnerabilities exist in the cgiserver.cgi JSON command parser functionality of Reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. An attacker can send an HTTP request to trigger this vulnerability. | [
"cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*",
"cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*"
] |
|
GHSA-vxpr-pv2v-9c9w | VMware ESXi, Workstation, and Fusion contain a double-fetch vulnerability in the UHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. | [] |
|
CVE-2017-12941 | libunrar.a in UnRAR before 5.5.7 has an out-of-bounds read in the Unpack::Unpack20 function. | [
"cpe:2.3:a:rarlab:unrar:*:*:*:*:*:*:*:*"
] |
|
GHSA-g9rc-hj23-83gf | Heap-based buffer overflow in QuickTimeMPEG.qtx in QuickTime in Apple Mac OS X before 10.6.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted genl atom in a QuickTime movie file with MPEG encoding, which is not properly handled during decompression. | [] |
|
GHSA-2r6j-862c-m2v2 | Unrestricted File Upload in Form Framework | ProblemDue to the lack of ensuring file extensions belong to configured allowed mime-types, attackers can upload arbitrary data with arbitrary file extensions - however, default _fileDenyPattern_ successfully blocked files like _.htaccess_ or _malicious.php_.TYPO3 Extbase extensions, which implement a file upload and do not implement a custom _TypeConverter_ to transform uploaded files into _FileReference_ domain model objects are affected by the vulnerability as well, since the _UploadedFileReferenceConverter_ of _ext:form_ handles the file upload and will accept files of any mime-type which are persisted to the default location.In any way, uploaded files are placed in the default location _/fileadmin/user_upload/_, in most scenarios keeping the submitted filename - which allows attackers to directly reference files, or even correctly guess filenames used by other individuals, disclosing this information.No authentication is required to exploit this vulnerability.SolutionUpdate to TYPO3 versions 8.7.40, 9.5.25, 10.4.14, 11.1.1 that fix the problem described.Type converter _UploadedFileReferenceConverter_ is not registered globally anymore and just handles uploaded files within the scope of the Form Framework. Guessable storage location has changed from _/fileadmin/user_upload/form\_\<random-hash\>/_ to _/fileadmin/form_uploads/<random-40-bit>_. Allowed mime-types must match expected file extensions (e.g. _application/pdf_ must be _.pdf_, and cannot be _.html_).Extbase extensions, who rely on the global availability of the _UploadedFileReferenceConverter_ must now implement a custom _TypeConverter_ to handle file uploads or explicitly implement the ext:form _UploadedFileReferenceConverter_ with appropriate setting for accepted mime-types.CreditsThanks to Sebastian Michaelsen, Marc Lindemann, Oliver Eglseder, Markus Volkmer, Jakob Kunzmann, Johannes Regner, Richie Lee who reported this issue, and to TYPO3 core & security team members Oliver Hader & Benni Mack, as well as TYPO3 contributor Ralf Zimmermann who fixed the issue.References[TYPO3-CORE-SA-2021-002](https://typo3.org/security/advisory/typo3-core-sa-2021-002) | [] |
CVE-2015-5602 | sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home/*/*/file.txt." | [
"cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*"
] |
|
CVE-2014-6737 | The Ultimate Target-Armored Sniper (aka air.wood.liame.ultimatetarget) application 1.0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:ultimate_target-armored_sniper_project:ultimate_target-armored_sniper:1.0.1:*:*:*:*:android:*:*"
] |
|
GHSA-76jc-5858-r6j2 | libavcodec/wmalosslessdec.c in FFmpeg before 2.1.4 uses an incorrect data-structure size for certain coefficients, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted WMA data. | [] |
|
GHSA-p5w7-h2h4-299j | Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the deviceMac parameter of the addWifiMacFilter function. | [] |
|
GHSA-c689-hwv4-37cm | Phorum allows remote attackers to hijack sessions of other users by stealing and replaying the session hash in the phorum_uriauth parameter, as demonstrated using profile.php. NOTE: the affected version was reported to be 4.3.7, but this may be erroneous. | [] |
|
CVE-2021-21218 | Uninitialized data in PDFium in Google Chrome prior to 90.0.4430.72 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted PDF file. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"
] |
|
GHSA-qr75-gfvc-2mvw | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CurrencyRate.Today Exchange Rates Widget allows Stored XSS.This issue affects Exchange Rates Widget: from n/a through 1.4.0. | [] |
|
GHSA-c3vw-3m8x-p7qv | Cross-Site Request Forgery (CSRF) vulnerability in Fla-shop.Com HTML5 Maps plugin <= 1.7.1.4 versions. | [] |
|
CVE-2019-10329 | Jenkins InfluxDB Plugin 1.21 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | [
"cpe:2.3:a:eficode:influxdb:*:*:*:*:*:jenkins:*:*"
] |
|
GHSA-87g7-g8rw-gjv7 | ASUS RT-AC51U, RT-AC58U, RT-AC66U, RT-AC1750, RT-ACRH13, and RT-N12 D1 routers with firmware before 3.0.0.4.380.8228; RT-AC52U B1, RT-AC1200 and RT-N600 routers with firmware before 3.0.0.4.380.10446; RT-AC55U and RT-AC55UHP routers with firmware before 3.0.0.4.382.50276; RT-AC86U and RT-AC2900 routers with firmware before 3.0.0.4.384.20648; and possibly other RT-series routers allow remote attackers to execute arbitrary code via unspecified vectors. | [] |
|
CVE-2023-26536 | WordPress Sp*tify Play Button for WordPress Plugin <= 2.05 is vulnerable to Cross Site Scripting (XSS) | Auth. (contributor+) Cross-Site Scripting (XSS) vulnerability in Jonk @ Follow me Darling Sp*tify Play Button for WordPress plugin <= 2.05 versions. | [
"cpe:2.3:a:followmedarling:spotify-play-button-for-wordpress:*:*:*:*:*:wordpress:*:*"
] |
GHSA-w427-f3fp-6x6x | vim 6.3 before 6.3.082, with modelines enabled, allows external user-assisted attackers to execute arbitrary commands via shell metacharacters in the (1) glob or (2) expand commands of a foldexpr expression for calculating fold levels. | [] |
|
CVE-2023-20025 | A vulnerability in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, and RV082 Routers could allow an unauthenticated, remote attacker to bypass authentication on an affected device.
This vulnerability is due to improper validation of user input within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to bypass authentication and gain root access on the underlying operating system. | [
"cpe:2.3:o:cisco:rv016_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv042_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv042g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv082_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*"
] |
|
GHSA-x7gw-ff28-c5mc | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [] |
|
GHSA-8c7w-228p-48xg | In ImageMagick 7.0.6-6 and GraphicsMagick 1.3.26, a heap-based buffer over-read was found in the function SFWScan in coders/sfw.c, which allows attackers to cause a denial of service via a crafted file. | [] |
|
GHSA-gc9g-pr94-xwgf | An XSS issue was discovered in FSMLabs TimeKeeper 8.0.17. On the "Configuration -> Compliance -> Add a new compliance report" and "Configuration -> Timekeeper Configuration -> Add a new source there" screens, there are entry points to inject JavaScript code. | [] |
|
CVE-2008-1083 | Heap-based buffer overflow in the CreateDIBPatternBrushPt function in GDI in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Vista, and Server 2008 allows remote attackers to execute arbitrary code via an EMF or WMF image file with a malformed header that triggers an integer overflow, aka "GDI Heap Overflow Vulnerability." | [
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp1:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*"
] |
|
GHSA-6q23-7r65-5wpj | Rejected reason: Not used | [] |
|
GHSA-jmqv-hx9g-2j64 | An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) software. Attackers can view notifications by entering many PINs in Lockdown mode. The Samsung ID is SVE-2019-16590 (March 2020). | [] |
|
GHSA-492f-5jc2-5m33 | Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-26786, CVE-2022-26787, CVE-2022-26789, CVE-2022-26790, CVE-2022-26791, CVE-2022-26792, CVE-2022-26794, CVE-2022-26795, CVE-2022-26796, CVE-2022-26797, CVE-2022-26798, CVE-2022-26801, CVE-2022-26802, CVE-2022-26803. | [] |
|
CVE-2022-4269 | A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of service condition. | [
"cpe:2.3:o:linux:linux_kernel:4.1:rc1:*:*:*:*:*:*"
] |
|
GHSA-p33h-j5pj-5f6r | Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and (2) libpurple/protocols/msnp9/slplink.c in Pidgin (formerly Gaim) before 2.5.6 on 32-bit platforms allow remote attackers to execute arbitrary code via a malformed SLP message with a crafted offset value, leading to buffer overflows. NOTE: this issue exists because of an incomplete fix for CVE-2008-2927. | [] |
|
GHSA-mwh4-fpf8-78h5 | Contenido CMS stores sensitive data under the web root with insufficient access control, which allows remote attackers to obtain database credentials and other information via a direct request to (1) db_msql.inc, (2) db_mssql.inc, (3) db_mysqli.inc, (4) db_oci8.inc, (5) db_odbc.inc, (6) db_oracle.inc, (7) db_pgsql.inc, or (8) db_sybase.inc in the conlib/ directory. | [] |
|
CVE-2022-3672 | SourceCodester Sanitization Management System SystemSettings.php cross site scripting | A vulnerability, which was classified as problematic, has been found in SourceCodester Sanitization Management System 1.0. This issue affects some unknown processing of the file /php-sms/classes/SystemSettings.php. The manipulation of the argument name/shortname leads to cross site scripting. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-212015. | [
"cpe:2.3:a:sanitization_management_system_project:sanitization_management_system:1.0:*:*:*:*:*:*:*"
] |
GHSA-7p28-5p54-rq49 | ping reads raw IP packets from the network to process responses in the pr_pack() function. As part of processing a response ping has to reconstruct the IP header, the ICMP header and if present a "quoted packet," which represents the packet that generated an ICMP error. The quoted packet again has an IP header and an ICMP header.The pr_pack() copies received IP and ICMP headers into stack buffers for further processing. In so doing, it fails to take into account the possible presence of IP option headers following the IP header in either the response or the quoted packet. When IP options are present, pr_pack() overflows the destination buffer by up to 40 bytes.The memory safety bugs described above can be triggered by a remote host, causing the ping program to crash.The ping process runs in a capability mode sandbox on all affected versions of FreeBSD and is thus very constrained in how it can interact with the rest of the system at the point where the bug can occur. | [] |
|
CVE-2022-22598 | An issue with app access to camera metadata was addressed with improved logic. This issue is fixed in iOS 15.4 and iPadOS 15.4. An app may be able to learn information about the current camera view before being granted camera access. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] |
|
GHSA-gmp4-m7cp-w84v | A NULL pointer dereference in the main() function dhry_1.c of dhrystone 2.1 causes a denial of service (DoS). | [] |
|
CVE-2017-3560 | Vulnerability in the Oracle Hospitality OPERA 5 Property Services component of Oracle Hospitality Applications (subcomponent: OXI Interface). Supported versions that are affected are 5.4.0.x, 5.4.1.x, 5.4.2.x, 5.4.3.x, 5.5.0.x and 5.5.1.x. Easily "exploitable" vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality OPERA 5 Property Services. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Hospitality OPERA 5 Property Services accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). | [
"cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.5.1:*:*:*:*:*:*:*"
] |
|
GHSA-9fr8-m4rq-565w | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in xtreeme Planyo online reservation system allows Stored XSS. This issue affects Planyo online reservation system: from n/a through 3.0. | [] |
|
GHSA-f473-rqfr-w67p | Western Digital My Cloud, My Cloud Mirror Gen2, My Cloud EX2 Ultra, My Cloud EX2100, My Cloud EX4100, My Cloud DL2100, My Cloud DL4100, My Cloud PR2100 and My Cloud PR4100 firmware before 2.31.174 is affected by an unauthenticated file upload vulnerability. The page web/jquery/uploader/uploadify.php can be accessed without any credentials, and allows uploading arbitrary files to any location on the attached storage. | [] |
|
GHSA-ggrx-fw3j-gvr2 | Vulnerability in KDE konsole allows local users to hijack or observe sessions of other users by accessing certain devices. | [] |
|
GHSA-7h5w-p8pc-wj2h | The mintToken function of a smart contract implementation for DVChain, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [] |
|
GHSA-hrfc-6g2q-85mp | The NVIDIA UNIX driver before 295.40 allows local users to access arbitrary memory locations by leveraging GPU device-node read/write privileges. | [] |
Subsets and Splits