id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-936v-x9xm-gc22
A vulnerability in the UDP forwarding code of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to bypass configured management plane protection policies and access the Simple Network Management Plane (SNMP) server of an affected device.This vulnerability is due to incorrect UDP forwarding programming when using SNMP with management plane protection. An attacker could exploit this vulnerability by attempting to perform an SNMP operation using broadcast as the destination address that could be processed by an affected device that is configured with an SNMP server. A successful exploit could allow the attacker to communicate to the device on the configured SNMP ports. Although an unauthenticated attacker could send UDP datagrams to the configured SNMP port, only an authenticated user can retrieve or modify data using SNMP requests.
[]
null
4.3
null
null
GHSA-3qvh-rmmw-6m99
For GitLab before 13.0.12, 13.1.6, 13.2.3 a cross-site scripting vulnerability exists in the issue reference number tooltip.
[]
null
5.4
null
null
CVE-2020-35885
An issue was discovered in the alpm-rs crate through 2020-08-20 for Rust. StrcCtx performs improper memory deallocation.
[ "cpe:2.3:a:alpm-rs_project:alpm-rs:*:*:*:*:*:rust:*:*" ]
null
9.8
null
7.5
CVE-2019-11779
In Eclipse Mosquitto 1.5.0 to 1.6.5 inclusive, if a malicious MQTT client sends a SUBSCRIBE packet containing a topic that consists of approximately 65400 or more '/' characters, i.e. the topic hierarchy separator, then a stack overflow will occur.
[ "cpe:2.3:a:eclipse:mosquitto:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
6.5
null
4
CVE-2019-12327
Hardcoded credentials in the Akuvox R50P VoIP phone 50.0.6.156 allow an attacker to get access to the device via telnet. The telnet service is running on port 2323; it cannot be turned off and the credentials cannot be changed.
[ "cpe:2.3:o:akuvox:sp-r50p_firmware:50.0.6.156:*:*:*:*:*:*:*", "cpe:2.3:h:akuvox:sp-r50p:-:*:*:*:*:*:*:*" ]
null
null
7.2
null
GHSA-h9rj-q5rw-5q3q
Stack-based buffer overflow in snmpviewer.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via a long HTTP Host header.
[]
null
null
null
null
CVE-2020-18705
XML External Entities (XXE) in Quokka v0.4.0 allows remote attackers to execute arbitrary code via the component 'quokka/core/content/views.py'.
[ "cpe:2.3:a:quokka_project:quokka:0.4.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2023-42472
Insufficient File type validation in SAP BusinessObjects Business Intelligence Platform (Web Intelligence HTML interface)
Due to insufficient file type validation, SAP BusinessObjects Business Intelligence Platform (Web Intelligence HTML interface) - version 420, allows a report creator to upload files from local system into the report over the network. When uploading the image file, an authenticated attacker could intercept the request, modify the content type and the extension to read and modify sensitive data causing a high impact on confidentiality and integrity of the application.
[ "cpe:2.3:a:sap:businessobjects_business_intelligence_platform:420:*:*:*:*:*:*:*" ]
null
8.7
null
null
GHSA-w8pw-mmh7-x243
In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, a Splunk dashboard view lets a low-privileged user exploit a vulnerability in the Bootstrap web framework (CVE-2019-8331) and build a stored cross-site scripting (XSS) payload.
[]
null
5.4
null
null
RHSA-2024:6991
Red Hat Security Advisory: kernel security update
kernel: hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs kernel: net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk() kernel: powerpc/fixmap: Fix VM debug warning on unmap kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create kernel: vsock: remove vsock from connected table when connect is interrupted by a signal kernel: perf: Fix list corruption in perf_cgroup_switch() kernel: SUNRPC: lock against ->sock changing during sysfs read kernel: mm/sparsemem: fix race in accessing memory_section->usage kernel: ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() kernel: mm: prevent derefencing NULL ptr in pfn_section_valid() kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream", "cpe:/o:redhat:rhel_e4s:9.0::baseos" ]
null
7.8
null
null
CVE-2005-1087
CRLF injection vulnerability in the cmdIS.DLL plugin for AN HTTPD Server 1.42n allows remote attackers to spoof or hide entries in the logfile, and possibly read files using an injected type command, via CRLF sequences in an HTTP request.
[ "cpe:2.3:a:an:an-httpd:1.42n:*:*:*:*:*:*:*" ]
null
null
null
6.4
GHSA-4vg4-q9rf-r94r
wpa_supplicant 2.0-16 does not properly check certificate subject name, which allows remote attackers to cause a man-in-the-middle attack.
[]
null
null
5.9
null
CVE-2021-26253
Bypass of Splunk Enterprise's implementation of DUO MFA
A potential vulnerability in Splunk Enterprise's implementation of DUO MFA allows for bypassing the MFA verification in Splunk Enterprise versions before 8.1.6. The potential vulnerability impacts Splunk Enterprise instances configured to use DUO MFA and does not impact or affect a DUO product or service.
[ "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*" ]
null
8.1
null
null
GHSA-f7qh-vmp7-6h75
The setuid doroot program in Voyant Sonata 3.x executes arbitrary command line arguments, which allows local users to gain root privileges.
[]
null
null
null
null
GHSA-8p4w-7mv8-cpr9
TP-Link TL-WA850RE Wi-Fi Range Extender with hardware version 5 allows remote attackers to cause a denial of service (reboot) via data/reboot.json.
[]
null
null
7.5
null
ICSA-24-319-05
Siemens Solid Edge
The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PSM files. This could allow an attacker to execute code in the context of the current process. The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. The affected applications suffer from a DLL hijacking vulnerability. This could allow an attacker to execute arbitrary code via placing a crafted DLL file on the system.
[]
null
7.3
null
null
CVE-2024-0047
In writeUserLP of UserManagerService.java, device policies are serialized with an incorrect tag due to a logic error in the code. This could lead to local denial of service when policies are deserialized on reboot with no additional execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2022-3407
I some cases, when the device is USB-tethered to a host PC, and the device is sharing its mobile network connection with the host PC, if the user originates a call on the device, then the device's modem may reset and cause the phone call to not succeed. This may block the user from dialing emergency services. This patch resolves the device's modem reset issue.
[ "cpe:2.3:o:motorola:smartphone_firmware:*:*:*:*:*:*:*:*" ]
null
4.9
null
null
ICSMA-20-079-01
Insulet Omnipod
The affected insulin pump is designed to communicate using a wireless RF with an Insulet manufactured Personal Diabetes Manager device. This wireless RF communication protocol does not properly implement authentication or authorization. An attacker with access to one of the affected insulin pump models may be able to modify and/or intercept data. This vulnerability could also allow attackers to change pump settings and control insulin delivery.CVE-2020-10627has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L).
[]
null
null
7.3
null
GHSA-6569-3785-r3v6
UniSharp Laravel Filemanager Code Injection vulnerability
Versions of the package unisharp/laravel-filemanager before 2.9.1 are vulnerable to Remote Code Execution (RCE) through using a valid mimetype and inserting the . character after the php file extension. This allows the attacker to execute malicious code.
[]
8.9
9.8
null
null
RHSA-2024:5690
Red Hat Security Advisory: 389-ds:1.4 security update
389-ds-base: a heap overflow leading to denail-of-servce while writing a value larger than 256 chars (in log_entry_attr) 389-ds-base: Malformed userPassword may cause crash at do_modify in slapd/modify.c 389-ds-base: potential denial of service via specially crafted kerberos AS-REQ request 389-ds-base: Malformed userPassword hash may cause Denial of Service
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
5.7
null
null
CVE-2015-8466
Swift3 before 1.9 allows remote attackers to conduct replay attacks via an Authorization request that lacks a Date header.
[ "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "cpe:2.3:a:openstack:swift3:*:*:*:*:*:*:*:*" ]
null
null
7.4
5.8
CVE-2005-1512
The Admin panel in PwsPHP 1.2.2 does not properly verify uploaded picture files, which allows remote attackers to upload and possibly execute arbitrary files.
[ "cpe:2.3:a:pwsphp:pwsphp:1.2.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
RHSA-2003:224
Red Hat Security Advisory: openssh security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
GHSA-465v-95qw-94v6
Multiple direct static code injection vulnerabilities in RunCMS before 1.6.1 allow remote authenticated administrators to inject arbitrary PHP code via the (1) header and (2) footer parameters to modules/system/admin.php in a meta-generator action, (3) the disclaimer parameter to modules/system/admin.php in a disclaimer action, (4) the disclaimer parameter to modules/mydownloads/admin/index.php in a mydownloadsConfigAdmin action, (5) the disclaimer parameter to modules/newbb_plus/admin/forum_config.php, (6) the disclaimer parameter to modules/mylinks/admin/index.php in a myLinksConfigAdmin action, or (7) the intro parameter to modules/sections/admin/index.php in a secconfig action, which inject PHP sequences into (a) sections/cache/intro.php, (b) mylinks/cache/disclaimer.php, (c) mydownloads/cache/disclaimer.php, (d) newbb_plus/cache/disclaimer.php, (e) system/cache/disclaimer.php, (f) system/cache/footer.php, (g) system/cache/header.php, or (h) system/cache/maintenance.php in modules/.
[]
null
null
null
null
RHSA-2022:0406
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3 security update
undertow: client side invocation timeout raised when calling over HTTP2
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3" ]
null
7.5
null
null
CVE-2009-4339
SQL injection vulnerability in the Subscription (mf_subscription) extension 0.2.2 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unknown vectors.
[ "cpe:2.3:a:stephan_vits:mf_subscription:0.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2010-1446
arch/powerpc/mm/fsl_booke_mmu.c in KGDB in the Linux kernel 2.6.30 and other versions before 2.6.33, when running on PowerPC, does not properly perform a security check for access to a kernel page, which allows local users to overwrite arbitrary kernel memory, related to Fsl booke.
[ "cpe:2.3:o:linux:linux_kernel:2.6.30:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.30.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.30.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.30.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.30.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.30.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.30.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.30.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.30.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.30.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.30.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.32:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.32.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.32.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.32.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.32.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.32.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.32.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.32.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.32.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.32.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.32.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.32.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.32.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.32.13:*:*:*:*:*:*:*" ]
null
null
null
1.9
CVE-2024-33686
Broken Access Control vulnerability affecting multiple WordPress themes by Extend Themes
Missing Authorization vulnerability in Extend Themes Pathway, Extend Themes Hugo WP, Extend Themes Althea WP, Extend Themes Elevate WP, Extend Themes Brite, Extend Themes Colibri WP, Extend Themes Vertice.This issue affects Pathway: from n/a through 1.0.15; Hugo WP: from n/a through 1.0.8; Althea WP: from n/a through 1.0.13; Elevate WP: from n/a through 1.0.15; Brite: from n/a through 1.0.11; Colibri WP: from n/a through 1.0.94; Vertice: from n/a through 1.0.7.
[]
null
4.3
null
null
CVE-2022-31016
Argo CD vulnerable to Uncontrolled Memory Consumption
Argo CD is a declarative continuous deployment for Kubernetes. Argo CD versions v0.7.0 and later are vulnerable to an uncontrolled memory consumption bug, allowing an authorized malicious user to crash the repo-server service, resulting in a Denial of Service. The attacker must be an authenticated Argo CD user authorized to deploy Applications from a repository which contains (or can be made to contain) a large file. The fix for this vulnerability is available in versions 2.3.5, 2.2.10, 2.1.16, and later. There are no known workarounds. Users are recommended to upgrade.
[ "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
CVE-2022-26322
Possible Insertion of Sensitive Information into Log File Vulnerability in Identity Manager
Possible Insertion of Sensitive Information into Log File Vulnerability in Identity Manager has been discovered in OpenText™ Identity Manager REST Driver. This impact version before 1.1.2.0200.
[ "cpe:2.3:a:netiq:identity_manager_rest_driver:*:*:*:*:*:*:*:*" ]
null
4.9
null
null
GHSA-h2f3-rmwp-xjm6
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
[]
null
8.8
null
null
GHSA-pcqv-c46v-2p4v
Ansible Arbitrary File Overwrite Vulnerability
`lib/ansible/playbook/__init__.py` in Ansible 1.2.x before 1.2.3, when playbook does not run due to an error, allows local users to overwrite arbitrary files via a symlink attack on a retry file with a predictable name in `/var/tmp/ansible/`.
[]
6.9
6.2
null
null
CVE-2021-21571
Dell UEFI BIOS https stack leveraged by the Dell BIOSConnect feature and Dell HTTPS Boot feature contains an improper certificate validation vulnerability. A remote unauthenticated attacker may exploit this vulnerability using a person-in-the-middle attack which may lead to a denial of service and payload tampering.
[ "cpe:2.3:o:dell:alienware_m15_r6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m15_r6:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3990_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3990:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3991_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3991:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g15_5510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g15_5510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g15_5511_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g15_5511:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g3_3500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g3_3500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g5_5500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g5_5500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g7_7500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g7_7500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g7_7700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g7_7700:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_14_5418_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_14_5418:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_15_5518_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_15_5518:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_15_7510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_15_7510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3501:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3880_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3880:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3881_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3881:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3891_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3891:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5301_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5301:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5400_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5400_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5400_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5400_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5401_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5401:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5401_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5401_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5402_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5402:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5406_2n1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5406_2n1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5408_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5408:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5409_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5409:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5410_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5410_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5501:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5502_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5502:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5508_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5508:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5509_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5509:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7300_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7300_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7306_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7306_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7500_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7500_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7501:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7506_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7506:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7610_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7610:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7700_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7700_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7706_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7706_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3120_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3120:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3320:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5310_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5310_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5320:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5320_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5320_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5411_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5411:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5511_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5511:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5521_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5521:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7210_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7210_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7320:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7320_detachable_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7320_detachable:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5421_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5421:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3080_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3080:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3090_uff_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3090_uff:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3280_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3280_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5080_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5080:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5090_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5090_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5490_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5490_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7080_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7080:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7090_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7090_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7090_uff_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7090_uff:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7480_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7480_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7490_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7490_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7780_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7780_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_17_m5750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_17_m5750:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3440_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3440:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3450_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3450:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3550:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3551_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3551:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3560_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3560:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3561_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3561:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3640_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3640:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3650_mt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3650_mt:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5550:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5560_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5560:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5760_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5760:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7550:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7560_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7560:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7750:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7760_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7760:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_14_5410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_14_5410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_15_5510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_15_5510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_15_7510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_15_7510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3501:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3681_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3681:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3690_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3690:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3881_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3881:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3888_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3888:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3890_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3890:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5301_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5301:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5401_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5401:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5402_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5402:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5501:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5502_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5502:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5880_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5880:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5890_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5890:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_7500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_7500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9305_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9305:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_2in1_9310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_2in1_9310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_15_9500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_15_9500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_15_9510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_15_9510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_17_9700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_17_9700:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_17_9710_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_17_9710:-:*:*:*:*:*:*:*" ]
null
5.9
null
null
CVE-2012-5072
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality via unknown vectors related to Security.
[ "cpe:2.3:a:oracle:jdk:*:update7:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:*:update7:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:*:update35:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:*:update35:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0.200:update20:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0.210:update21:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*" ]
null
null
null
5
CVE-2020-19364
OpenEMR 5.0.1 allows an authenticated attacker to upload and execute malicious PHP scripts through /controller.php.
[ "cpe:2.3:a:open-emr:openemr:5.0.1:*:*:*:*:*:*:*" ]
null
8.8
null
6.5
ICSA-18-023-01
Advantech WebAccess/SCADA
An attacker has read access to files within the directory structure of the target device. CVE-2018-5445 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). WebAccess/SCADA does not properly sanitize its inputs for SQL commands. CVE-2018-5443 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
[]
null
null
5.3
null
CVE-2024-29927
WordPress WishSuite plugin <= 1.3.7 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HasTheme WishSuite allows Stored XSS.This issue affects WishSuite: from n/a through 1.3.7.
[]
null
6.5
null
null
GHSA-3hwv-x5p9-3h2h
In Bluetooth, there is a possible way to pair a display only device without PIN confirmation due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-222289114
[]
null
3.3
null
null
GHSA-xpc5-rr39-v8v2
Mautic has an XSS in contact tracking and page hits report
SummaryPrior to this patch, a stored XSS vulnerability existed in the contact tracking and page hits report.PatchesPlease update to 4.4.13 or 5.1.1 or later.WorkaroundsNoneReferenceshttps://owasp.org/www-project-top-ten/2017/A7_2017-Cross-Site_Scripting_(XSS) https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/07-Input_Validation_Testing/02-Testing_for_Stored_Cross_Site_ScriptingIf you have any questions or comments about this advisory:Email us at [security@mautic.org](mailto:security@mautic.org)
[]
5.1
7.3
null
null
GHSA-jv3v-7c3q-8hh2
Multiple CODESYS Products are prone to a out-of bounds read or write access. A low privileged remote attacker may craft a request with invalid offset, which can cause an out-of-bounds read or write access, resulting in denial-of-service condition or local memory overwrite, which can lead to a change of local files. User interaction is not required.
[]
null
8.1
null
null
GHSA-x753-r8m4-q2wg
Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process, as demonstrated by Stephen Fewer as the third of three chained vulnerabilities during a Pwn2Own competition at CanSecWest 2011.
[]
null
null
null
null
CVE-2021-23839
Incorrect SSLv2 rollback protection
OpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are supposed to use a special form of padding. A server that supports greater than SSLv2 is supposed to reject connection attempts from a client where this special form of padding is present, because this indicates that a version rollback has occurred (i.e. both client and server support greater than SSLv2, and yet this is the version that is being requested). The implementation of this padding check inverted the logic so that the connection attempt is accepted if the padding is present, and rejected if it is absent. This means that such as server will accept a connection if a version rollback attack has occurred. Further the server will erroneously reject a connection if a normal SSLv2 connection attempt is made. Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this issue. In order to be vulnerable a 1.0.2 server must: 1) have configured SSLv2 support at compile time (this is off by default), 2) have configured SSLv2 support at runtime (this is off by default), 3) have configured SSLv2 ciphersuites (these are not in the default ciphersuite list) OpenSSL 1.1.1 does not have SSLv2 support and therefore is not vulnerable to this issue. The underlying error is in the implementation of the RSA_padding_check_SSLv23() function. This also affects the RSA_SSLV23_PADDING padding mode used by various other functions. Although 1.1.1 does not support SSLv2 the RSA_padding_check_SSLv23() function still exists, as does the RSA_SSLV23_PADDING padding mode. Applications that directly call that function or use that padding mode will encounter this issue. However since there is no support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a security issue in that version. OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.0.2y (Affected 1.0.2s-1.0.2x).
[ "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:business_intelligence:5.5.0.0.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:oracle:business_intelligence:5.9.0.0.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:oracle:business_intelligence:12.2.1.3.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:oracle:enterprise_manager_for_storage_management:13.4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:graalvm:19.3.5:*:*:*:enterprise:*:*:*", "cpe:2.3:a:oracle:graalvm:20.3.1.2:*:*:*:community:*:*:*", "cpe:2.3:a:oracle:graalvm:21.0.0.2:*:*:*:community:*:*:*", "cpe:2.3:a:oracle:jd_edwards_world_security:a9.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:sinec_ins:1.0:-:*:*:*:*:*:*", "cpe:2.3:a:siemens:sinec_ins:1.0:sp1:*:*:*:*:*:*" ]
null
3.7
null
4.3
GHSA-26m4-qjp9-xmc6
Apache InLong vulnerable to Deserialization of Untrusted Data
In versions of Apache InLong prior to 1.3.0, an attacker with sufficient privileges to specify MySQL JDBC connection URL parameters and to write arbitrary data to the MySQL database, could cause this data to be deserialized by Apache InLong, potentially leading to Remote Code Execution on the Apache InLong server. Users are advised to upgrade to Apache InLong 1.3.0 or newer.
[]
null
8.8
null
null
CVE-2002-0663
Buffer overflow in HTTP Proxy for Symantec Norton Personal Internet Firewall 3.0.4.91 and Norton Internet Security 2001 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large outgoing HTTP request.
[ "cpe:2.3:a:symantec:norton_internet_security:2001:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:norton_personal_firewall:2001_3.0.4.91:*:*:*:*:*:*:*" ]
null
null
null
7.5
ICSA-21-292-01
AUVESY Versiondog
The server permits communication without any authentication procedure, allowing the attacker to initiate a session with the server without providing any form of authentication.CVE-2021-38457 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The database connection to the server is performed by calling a specific API, which could allow an unprivileged user to gain SYSDBA permissions.CVE-2021-38475 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N). The affected product uses a hard-coded blowfish key for encryption/decryption processes. The key can be easily extracted from binaries.CVE-2021-38461 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N). The affected product 's proprietary protocol CSC allows for calling numerous function codes. In order to call those function codes, the user must supply parameters. There is no sanitation on the value of the offset, which allows the client to specify any offset and read out-of-bounds data.CVE-2021-38451 has been assigned to this vulnerability. A CVSS v3 base score of 4.8 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N). A specific function code receives a raw pointer supplied by the user and deallocates this pointer. The user can then control what memory regions will be freed and cause use-after-free condition.CVE-2021-38467 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H). Many API function codes receive raw pointers remotely from the user and trust these pointers as valid in-bound memory regions. An attacker can manipulate API functions by writing arbitrary data into the resolved address of a raw pointer.CVE-2021-38479 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N). Some API functions permit by-design writing or copying data into a given buffer. Since the client controls these parameters, an attacker could rewrite the memory in any location of the affected product.CVE-2021-38449 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The affected product 's code base doesn 't properly control arguments for specific functions, which could lead to a stack overflow.CVE-2021-38473 has been assigned to this vulnerability. A CVSS v3 base score of 8.0 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H). There are multiple API function codes that permit data writing to any file, which may allow an attacker to modify existing files or create new files.CVE-2021-38471 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H). There are multiple API function codes that permit reading and writing data to or from files and directories, which could lead to the manipulation and/or the deletion of files.CVE-2021-38477 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Some API functions allow interaction with the registry, which includes reading values as well as data modification.CVE-2021-38453has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H). The affected product 's OS Service does not verify any given parameter. A user can supply any type of parameter that will be passed to inner calls without checking the type of the parameter or the value.CVE-2021-38455 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H). The affected product does not properly control the allocation of resources. A user may be able to allocate unlimited memory buffers using API functions.CVE-2021-38463 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H). Many of the services used by the affected product do not specify full paths for the DLLs they are loading. An attacker can exploit the uncontrolled search path by implanting their own DLL near the affected product 's binaries, thus hijacking the loaded DLL.CVE-2021-38469 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H). The data of a network capture of the initial handshake phase can be used to authenticate at a SYSDBA level. If a specific .exe is not restarted often, it is possible to access the needed handshake packets between admin/client connections. Using the SYSDBA permission, an attacker can change user passwords or delete the database.CVE-2021-38459 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). The scheduler service running on a specific TCP port enables the user to start and stop jobs. There is no sanitation of the supplied JOB ID provided to the function. An attacker may send a malicious payload that can enable the user to execute another SQL expression by sending a specific string.CVE-2021-38481 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H). The webinstaller is a Golang web server executable that enables the generation of an Auvesy image agent. Resource consumption can be achieved by generating large amounts of installations, which are then saved without limitation in the temp folder of the webinstaller executable.CVE-2021-38465 has been assigned to this vulnerability. A CVSS v3 base score of 8.0 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H).
[]
null
null
8
null
GHSA-2f73-87g5-539c
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Wisdomlogix Solutions Pvt. Ltd. Fonts Manager | Custom Fonts allows Reflected XSS. This issue affects Fonts Manager | Custom Fonts: from n/a through 1.2.
[]
null
7.1
null
null
GHSA-mgvj-94j9-x737
DjVuLibre 3.5.27 has a NULL pointer dereference in the function DJVU::filter_fv at IW44EncodeCodec.cpp.
[]
null
7.5
null
null
GHSA-73g2-fg3c-4vx6
In ged, there is a possible out of bounds write due to an integer overflow. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation Patch ID: ALPS07835901; Issue ID: ALPS07835901.
[]
null
4.4
null
null
CVE-2020-6460
Insufficient data validation in URL formatting in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to perform domain spoofing via a crafted domain name.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
GHSA-f7f6-4cvv-wq88
A cross-site scripting (XSS) vulnerability in /staff/tools/custom-fields of Helpdeskz v2.0.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the email name field.
[]
null
4.8
null
null
CVE-2023-46257
An attacker sending specially crafted data packets to the Mobile Device Server can cause memory corruption which could result to a Denial of Service (DoS) or code execution.
[ "cpe:2.3:a:ivanti:avalanche:*:*:*:*:premise:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
9.8
null
CVE-2018-15542
An issue was discovered in the org.telegram.messenger application 4.8.11 for Android. The Passcode feature allows authentication bypass via runtime manipulation that forces a certain method's return value to true. In other words, an attacker could authenticate with an arbitrary passcode. NOTE: the vendor indicates that this is not an attack of interest within the context of their threat model, which excludes Android devices on which rooting has occurred
[ "cpe:2.3:a:telegram:telegram:4.8.11:*:*:*:*:android:*:*" ]
null
null
6.4
4.4
CVE-2019-20683
Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects D3600 before 1.0.0.76, D6000 before 1.0.0.76, D6200 before 1.1.00.32, D7000 before 1.0.1.68, JR6150 before 1.0.1.18, PR2000 before 1.0.0.28, R6020 before 1.0.0.38, R6050 before 1.0.1.18, R6080 before 1.0.0.38, R6120 before 1.0.0.46, R6220 before 1.1.0.80, R6260 before 1.1.0.40, R6700v2 before 1.2.0.36, R6800 before 1.2.0.36, R6900v2 before 1.2.0.36, WNR2020 before 1.1.0.62, and XR500 before 2.3.2.32.
[ "cpe:2.3:o:netgear:d3600_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d3600:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d6000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d6000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d6200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d6200:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d7000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:jr6150_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:jr6150:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:pr2000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:pr2000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6020_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6020:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6050_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6050:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6080_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6080:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6120_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6120:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6220_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6220:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6260_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6260:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6700:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6800:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6900:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wnr2020_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wnr2020:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:xr500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:xr500:-:*:*:*:*:*:*:*" ]
null
null
8.8
null
CVE-2016-11085
php/qmn_options_questions_tab.php in the quiz-master-next plugin before 4.7.9 for WordPress allows CSRF, with resultant stored XSS, via the question_name parameter because js/admin_question.js mishandles parsing inside of a SCRIPT element.
[ "cpe:2.3:a:expresstech:quiz_and_survey_master:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
4.3
CVE-2021-34582
Phoenix Contact: FL MGUARD XSS through web-based management and REST API
In Phoenix Contact FL MGUARD 1102 and 1105 in Versions 1.4.0, 1.4.1 and 1.5.0 a user with high privileges can inject HTML code (XSS) through web-based management or the REST API with a manipulated certificate file.
[ "cpe:2.3:o:phoenixcontact:fl_mguard_1102_firmware:1.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_1102_firmware:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_1102_firmware:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_1102:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_1105_firmware:1.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_1105_firmware:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_1105_firmware:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_1105:-:*:*:*:*:*:*:*" ]
null
4.8
null
null
CVE-2021-28112
Draeger X-Dock Firmware before 03.00.13 has Active Debug Code on a debug port, leading to remote code execution by an authenticated attacker.
[ "cpe:2.3:o:draeger:x-dock_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:draeger:x-dock_5300:-:*:*:*:*:*:*:*", "cpe:2.3:h:draeger:x-dock_6300:-:*:*:*:*:*:*:*", "cpe:2.3:h:draeger:x-dock_6600:-:*:*:*:*:*:*:*" ]
null
8.8
null
6.5
GHSA-r24v-9fmh-rqqg
UpLight cookiebanner before 1.5.1 was discovered to contain a SQL injection vulnerability via the component Hook::getHookModuleExecList().
[]
null
9.8
null
null
GHSA-6r92-968h-m757
SMU versions prior to 14.8.7825.01 are susceptible to unintended information disclosure, through URL manipulation. Authenticated users in Storage, Server or combined Server+Storage administrative roles are able to access SMU configuration backup, that would normally be barred to those specific administrative roles.
[]
null
7.6
null
null
GHSA-m77c-cx52-66gq
IBM Cloud Automation Manager 3.2.1.0 does not renew a session variable after a successful authentication which could lead to session fixation/hijacking vulnerability. This could force a user to utilize a cookie that may be known to an attacker. IBM X-Force ID: 168645.
[]
null
null
null
null
CVE-2021-25514
An improper intent redirection handling in Tags prior to SMR Dec-2021 Release 1 allows attackers to access sensitive information.
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
null
3.3
null
null
CVE-2024-9524
Privilege Escalation Vulnerability in Avira Prime Version 1.1.96.2
Link Following Local Privilege Escalation Vulnerability in System Speedup Service in Avira Operations GmbH Avira Prime Version 1.1.96.2 on Windows 10 x64 allows local attackers to escalate privileges and execute arbitrary code in the context of SYSTEM via creating a symbolic link and leveraging a TOCTTOU (time-of-check to time-of-use) attack.
[]
null
7.8
null
null
GHSA-98g7-wfc4-gfqp
Vulnerability in the Oracle Application Testing Suite component of Oracle Enterprise Manager Products Suite (subcomponent: Load Testing for Web Apps). The supported version that is affected is 13.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Testing Suite. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Testing Suite accessible data as well as unauthorized read access to a subset of Oracle Application Testing Suite accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Application Testing Suite. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).
[]
null
null
null
null
GHSA-74xc-6hpg-hp8m
ePerl 2.2.12 allows remote attackers to read arbitrary files and possibly execute certain commands by specifying a full pathname of the target file as an argument to bar.phtml.
[]
null
null
null
null
RHSA-2008:0665
Red Hat Security Advisory: Updated kernel packages for Red Hat Enterprise Linux 4.7
UDF truncating issue kernel: NULL ptr dereference in multiple network drivers due to missing checks in tty code
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
CVE-2024-57428
A stored cross-site scripting (XSS) vulnerability in PHPJabbers Cinema Booking System v2.0 exists due to unsanitized input in file upload fields (event_img, seat_maps) and seat number configurations (number[new_X] in pjActionCreate). Attackers can inject persistent JavaScript, leading to phishing, malware injection, and session hijacking.
[]
null
9.3
null
null
CVE-2025-2649
PHPGurukul Doctor Appointment Management System check-appointment.php sql injection
A vulnerability classified as critical was found in PHPGurukul Doctor Appointment Management System 1.0. This vulnerability affects unknown code of the file /check-appointment.php. The manipulation of the argument searchdata leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
7.3
7.5
CVE-2018-8876
In 2345 Security Guard 3.6, the driver file (2345Wrath.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x00222098.
[ "cpe:2.3:a:2345_security_guard_project:2345_security_guard:3.6:*:*:*:*:*:*:*" ]
null
null
7.8
6.1
GHSA-pvfc-9226-rpg4
Cross-Site Request Forgery (CSRF) vulnerability in McAfee ePO (legacy) Cloud allows unauthenticated users to perform unintended ePO actions using an authenticated user's session via unspecified vectors.
[]
null
null
8.8
null
GHSA-r496-7hgp-53wf
Vulnerability in dump function leads to arbitrary code execution via filePath parameters
aaptjs is a node wraper for aapt. An issue was discovered in the dump function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.
[]
null
9.8
null
null
RHSA-2020:4173
Red Hat Security Advisory: rh-maven35-jackson-databind security update
jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
8.1
null
null
GHSA-rq3x-g9v8-6qjm
FUEL CMS 1.4.1 allows PHP Code Evaluation via the pages/select/ filter parameter or the preview/ data parameter. This can lead to Pre-Auth Remote Code Execution.
[]
null
9.8
null
null
CVE-2024-54364
WordPress Feedpress Generator plugin <= 1.2.1 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Spartac Feedpress Generator allows Reflected XSS.This issue affects Feedpress Generator: from n/a through 1.2.1.
[]
null
7.1
null
null
GHSA-8gfm-8wff-rjvj
An issue was discovered in HTTP2 in Qt before 5.15.18, 6.x before 6.2.13, 6.3.x through 6.5.x before 6.5.7, and 6.6.x through 6.7.x before 6.7.3. Code to make security-relevant decisions about an established connection may execute too early, because the encrypted() signal has not yet been emitted and processed..
[]
null
8.6
null
null
CVE-2014-2925
Cross-site scripting (XSS) vulnerability in Advanced_Wireless_Content.asp in ASUS RT-AC68U and other RT series routers with firmware before 3.0.0.4.374.5047 allows remote attackers to inject arbitrary web script or HTML via the current_page parameter to apply.cgi.
[ "cpe:2.3:o:t-mobile:tm-ac1900:3.0.0.4.376_3169:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ac68u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ac68u_firmware:3.0.0.4.374.4755:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ac68u_firmware:3.0.0.4.374_4887:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-cq44-2wf7-v987
An issue in the stricmp component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
[]
null
7.5
null
null
RHSA-2024:0279
Red Hat Security Advisory: gstreamer-plugins-bad-free security update
gstreamer: MXF demuxer use-after-free vulnerability
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
CVE-2016-3755
decoder/ih264d_parse_pslice.c in mediaserver in Android 6.x before 2016-07-01 does not properly select concealment frames, which allows remote attackers to cause a denial of service (device hang or reboot) via a crafted media file, aka internal bug 28470138.
[ "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*" ]
null
null
7.5
7.8
CVE-2016-2443
The Qualcomm MDP driver in Android before 2016-05-01 on Nexus 5 and Nexus 7 (2013) devices allows attackers to gain privileges via a crafted application, aka internal bug 26404525.
[ "cpe:2.3:h:google:nexus_5:-:*:*:*:*:*:*:*", "cpe:2.3:h:google:nexus_7_\\(2013\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
7
7.6
CVE-2021-46633
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15463.
[ "cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*", "cpe:2.3:a:bentley:microstation_connect:*:*:*:*:*:*:*:*", "cpe:2.3:a:bentley:view:*:*:*:*:*:*:*:*" ]
null
null
7.8
null
GHSA-jvjm-j945-8qwc
XXE vulnerability in Jenkins Visualworks Store Plugin
Jenkins Visualworks Store Plugin 1.1.3 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.This allows attackers with the ability to control the output of a script that run Visualworks with StoreCI, or able to control an agent process, to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.Jenkins Visualworks Store Plugin 1.1.4 disables external entity resolution for its XML parser.
[]
null
6.5
null
null
CVE-2015-3907
CodeIgniter Rest Server (aka codeigniter-restserver) 2.7.1 allows XXE attacks.
[ "cpe:2.3:a:codeigniter-restserver_project:codeigniter-restserver:2.7.1:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
GHSA-w689-5mxw-fp2q
Missing Authorization vulnerability in Frank P. Walentynowicz FPW Category Thumbnails allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects FPW Category Thumbnails: from n/a through 1.9.5.
[]
null
6.3
null
null
GHSA-xm4x-wc47-pq9m
Use after free in Permissions in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
[]
null
null
null
null
CVE-2024-37276
WordPress Featured Image from URL (FIFU) plugin <= 4.8.1 - Broken Access Control vulnerability
Missing Authorization vulnerability in fifu.App Featured Image from URL allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Featured Image from URL: from n/a through 4.8.1.
[ "cpe:2.3:a:fifu:featured_image_from_url:-:*:*:*:*:wordpress:*:*" ]
null
5.3
null
null
GHSA-w78w-44c5-7mwx
In the Linux kernel, the following vulnerability has been resolved:vp_vdpa: fix id_table array not null terminated errorAllocate one extra virtio_device_id as null terminator, otherwise vdpa_mgmtdev_get_classes() may iterate multiple times and visit undefined memory.
[]
null
5.5
null
null
GHSA-2h6m-qr7j-x4hf
Vulnerability in the Oracle Fusion Middleware component of Oracle Fusion Middleware (subcomponent: Oracle Notification Service). Supported versions that are affected are 12.2.1.2 and 12.2.1.3. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTPS to compromise Oracle Fusion Middleware. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Fusion Middleware accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N).
[]
null
null
6.5
null
GHSA-q3q5-2v5f-27x5
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Intuitive Design GDReseller allows DOM-Based XSS.This issue affects GDReseller: from n/a through 1.6.
[]
null
6.5
null
null
RHSA-2013:1526
Red Hat Security Advisory: nagios security update
core: Insecure temporary file usage in nagios.upgrade_to_v3.sh core: html/rss-newsfeed.php insecure temporary file usage
[ "cpe:/a:redhat:openstack:3::el6" ]
null
null
null
null
CVE-2014-9933
Due to missing input validation in all Android releases from CAF using the Linux kernel, HLOS can write to fuses for which it should not have access.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
GHSA-jv89-hcw9-2wwr
When loading a document with Apache Open Office 4.1.5 and earlier with smaller end line termination than the operating system uses, the defect occurs. In this case OpenOffice runs into an Arithmetic Overflow at a string length calculation.
[]
null
null
7.8
null
CVE-2016-7644
An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (use-after-free) via a crafted app.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
GHSA-j347-89qm-vpj8
PHP remote file inclusion vulnerability in sms_config/gateway.php in PhpMySms 2.0 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the ROOT_PATH parameter.
[]
null
null
null
null
RHSA-2020:5401
Red Hat Security Advisory: libpq security update
postgresql: Reconnection can downgrade connection security settings postgresql: psql's \gset allows overwriting specially treated variables
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
CVE-2022-22401
IBM Aspera Faspex information disclosure
IBM Aspera Faspex 5.0.5 could allow a remote attacker to gather or persuade a naive user to supply sensitive information. IBM X-Force ID: 222567.
[ "cpe:2.3:a:ibm:aspera_faspex:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
5.9
null
null
CVE-2025-47450
WordPress Simple File List <= 6.1.13 - Settings Change Vulnerability
Missing Authorization vulnerability in Mitchell Bennis Simple File List allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Simple File List: from n/a through 6.1.13.
[]
null
5.3
null
null
GHSA-26g8-xr7h-wxh3
Potential security vulnerabilities including compromise of integrity, and allowed communication with untrusted clients has been identified in HP Support Assistant software.
[]
null
7.8
null
null
GHSA-2h3c-wrp2-qcxw
Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.29 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Cluster. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
[]
null
5.9
null
null
GHSA-cmr8-7h74-h25c
In video decoder, there is a possible out of bounds read due to improper input validation. This could lead to local denial of service with no additional execution privileges needed
[]
null
5.5
null
null
CVE-2023-44811
Cross Site Request Forgery (CSRF) vulnerability in MooSocial v.3.1.8 allows a remote attacker to execute arbitrary code and obtain sensitive information via the admin Password Change Function.
[ "cpe:2.3:a:moosocial:moosocial:3.1.8:*:*:*:*:*:*:*" ]
null
8.8
null
null