id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2018-5752
|
The backend component in Open-Xchange OX App Suite before 7.6.3-rev36, 7.8.x before 7.8.2-rev39, 7.8.3 before 7.8.3-rev44, and 7.8.4 before 7.8.4-rev22 allows remote attackers to conduct server-side request forgery (SSRF) attacks via vectors involving non-decimal representations of IP addresses and special IPv6 related addresses.
|
[
"cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev14:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev15:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev16:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev17:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev18:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev20:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev22:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev23:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev24:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev25:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev26:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev28:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev29:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev30:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev31:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev32:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev33:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev35:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev10:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev11:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev12:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev13:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev14:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev15:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev16:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev17:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev18:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev19:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev20:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev21:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev22:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev23:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev24:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev25:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev26:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev27:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev28:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev29:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev30:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev31:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev32:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev33:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev34:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev35:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev36:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev38:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev39:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev40:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev41:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev42:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev43:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev5:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev6:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev8:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev9:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev10:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev11:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev13:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev14:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev15:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev16:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev17:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev18:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev19:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev20:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev21:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev3:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev4:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev5:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev6:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev7:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev8:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev9:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 | null |
|
RHSA-2023:6197
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Queued up rendering could have allowed websites to clickjack Mozilla: Large WebGL draw could have led to a crash Mozilla: WebExtensions could open arbitrary URLs Mozilla: Improper object tracking during GC in the JavaScript engine could have led to a crash. Mozilla: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4 Mozilla: Address bar spoofing via bidirectional characters libvpx: crash related to VP9 encoding in libvpx
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.5 | null | null | null |
GHSA-m87f-ggqj-7457
|
Cross-site scripting (XSS) vulnerability in Claroline before 1.8.9 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2024-37198
|
WordPress Digital Newspaper theme <= 1.1.5 - Cross Site Request Forgery (CSRF) vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in blazethemes Digital Newspaper.This issue affects Digital Newspaper: from n/a through 1.1.5.
|
[
"cpe:2.3:a:blazethemes:digital_newspaper:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null |
GHSA-ggjw-c9jm-j9xw
|
Multiple PHP remote file inclusion vulnerabilities in Puzzle Apps CMS 2.2.1 allow remote attackers to execute arbitrary PHP code via a URL in the MODULEDIR parameter to (1) core/modules/my/my.module.php or (2) core/modules/xml/xml.module.php; the COREROOT parameter to (3) config.loader.php, (4) platform.loader.php, (5) core.loader.php, (6) person.loader.php, or (7) module.loader.php in core/ or (8) install/steps/step_3.php; or the THISDIR parameter to (9) people.lib.php, (10) general.lib.php, (11) content.lib.php, or (12) templates.lib.php in core/modules/admin/libs/ or (13) core/modules/webstat/MEC/index.php.
|
[] | null | null | null | null | null |
|
GHSA-7376-p46c-9w5f
|
IOHIDFamily in Apple iOS before 8.3, Apple OS X before 10.10.3, and Apple TV before 7.2 allows attackers to obtain sensitive information about kernel memory via a crafted app.
|
[] | null | null | null | null | null |
|
GHSA-5pq5-cp3w-7chj
|
IBM Operational Decision Manager 8.10.3, 8.10.4, 8.10.5.1, 8.11, 8.11.0.1, and 8.12.0.1 could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an unsafe deserialization. By sending specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code in the context of SYSTEM. IBM X-Force ID: 279146.
|
[] | null | 9.8 | null | null | null |
|
GHSA-j9fh-4mc8-rjqx
|
Microsoft Dynamics GP uses a substitution cipher to encrypt the system password field and unspecified other fields, which makes it easier for remote authenticated users to obtain sensitive information by decrypting a field's contents.
|
[] | null | null | null | null | null |
|
CVE-2023-3006
|
A known cache speculation vulnerability, known as Branch History Injection (BHI) or Spectre-BHB, becomes actual again for the new hw AmpereOne. Spectre-BHB is similar to Spectre v2, except that malicious code uses the shared branch history (stored in the CPU Branch History Buffer, or BHB) to influence mispredicted branches within the victim's hardware context. Once that occurs, speculation caused by the mispredicted branches can cause cache allocation. This issue leads to obtaining information that should not be accessible.
|
[
"cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
GHSA-84w6-v28g-4xr9
|
IBM Sterling File Gateway 2.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 131289.
|
[] | null | null | 5.4 | null | null |
|
CVE-2019-9500
|
Broadcom brcmfmac driver is vulnerable to a heap buffer overflow
|
The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.
|
[
"cpe:2.3:a:broadcom:brcmfmac_driver:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 7.9 | null | null | null |
RHSA-2024:4265
|
Red Hat Security Advisory: cups security update
|
cups: Cupsd Listen arbitrary chmod 0140777
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 4.4 | null | null | null |
GHSA-vqv5-7mjm-v78g
|
Multiple untrusted search path vulnerabilities in Maxthon Browser 1.6.7.35 and 2.5.15 allow local users to gain privileges via a Trojan horse (1) RSRC32.dll or (2) dwmapi.dll file in the current working directory, as demonstrated by a directory that contains a .html file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] | null | null | null | null | null |
|
CVE-2019-0637
|
A security feature bypass vulnerability exists when Windows Defender Firewall incorrectly applies firewall profiles to cellular network connections, aka 'Windows Defender Firewall Security Feature Bypass Vulnerability'.
|
[
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-6mqq-rw6c-7747
|
Users of the LearnPress WordPress plugin before 4.1.5 can upload an image as a profile avatar after the registration. After this process the user crops and saves the image. Then a "POST" request that contains user supplied name of the image is sent to the server for renaming and cropping of the image. As a result of this request, the name of the user-supplied image is changed with a MD5 value. This process can be conducted only when type of the image is JPG or PNG. An attacker can use this vulnerability in order to rename an arbitrary image file. By doing this, they could destroy the design of the web site.
|
[] | null | 4.3 | null | null | null |
|
RHSA-2021:0794
|
Red Hat Security Advisory: .NET 5.0 on Red Hat Enterprise Linux security and bugfix update
|
dotnet: System.Text.Encodings.Web Remote Code Execution
|
[
"cpe:/a:redhat:rhel_dotnet:5.0::el7"
] | null | 8.1 | null | null | null |
GHSA-j9q7-p3q3-f2xh
|
The Alcatel Lucent I-240W-Q GPON ONT using firmware version 3FE54567BOZJ19 is vulnerable to a stack buffer overflow via crafted HTTP POST request sent by a remote, unauthenticated attacker to /GponForm/fsetup_Form. An attacker can leverage this vulnerability to potentially execute arbitrary code.
|
[] | null | 9.8 | null | null | null |
|
GHSA-vgx6-h88h-2vc3
|
Due to lack of proper memory management, when a victim opens a manipulated SolidWorks Drawing (.slddrw, CoreCadTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory.
|
[] | null | 7.8 | null | null | null |
|
RHSA-2023:0903
|
Red Hat Security Advisory: webkit2gtk3 security update
|
webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null | null |
CVE-2010-4863
|
Cross-site scripting (XSS) vulnerability in admin/changedata.php in GetSimple CMS 2.01 allows remote attackers to inject arbitrary web script or HTML via the post-title parameter.
|
[
"cpe:2.3:a:get-simple:getsimple_cms:2.01:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-x4v7-c63g-mh6m
|
Adobe Acrobat and Reader versions 2020.006.20034 and earlier, 2017.011.30158 and earlier, 2017.011.30158 and earlier, 2015.006.30510 and earlier, and 2015.006.30510 and earlier have a use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution .
|
[] | null | null | null | null | null |
|
GHSA-p8xw-m97m-vrf2
|
Heap-based buffer overflow in _mprosrv.exe in Progress Software Progress 9.1E and OpenEdge 10.1x, as used by the RSA Authentication Manager 6.0 and 6.1, SecurID Appliance 2.0, ACE/Server 5.2, and possibly other products, allows remote attackers to execute arbitrary code via crafted packets. NOTE: this issue might overlap CVE-2007-3491.
|
[] | null | null | null | null | null |
|
CVE-2021-44892
|
A Remote Code Execution (RCE) vulnerability exists in ThinkPHP 3.x.x via value[_filename] in index.php, which could let a malicious user obtain server control privileges.
|
[
"cpe:2.3:a:thinkphp:thinkphp:3.2.3:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 | null |
|
RHSA-2022:7019
|
Red Hat Security Advisory: firefox security update
|
expat: a use-after-free in the doContent function in xmlparse.c
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.1 | null | null | null |
ICSA-19-190-05
|
Siemens SIPROTEC 5 and DIGSI 5 (Update C)
|
A remote attacker could use specially crafted packets sent to port 443/TCP to upload, download or delete files in certain parts of the file system. A remote attacker could use specially crafted packets sent to port 443/TCP to upload, download or delete files in certain parts of the file system.
|
[] | null | 7.5 | null | null | null |
GHSA-2h2j-hwh4-6vfv
|
VP9 Video Extensions Remote Code Execution Vulnerability
|
[] | null | 7.8 | null | null | null |
|
CVE-2006-3095
|
Multiple cross-site scripting (XSS) vulnerabilities in iPostMX 2005 2.0 and earlier allow remote attackers to inject arbitrary web script or HTML via the RETURNURL parameter in (1) userlogin.cfm and (2) account.cfm.
|
[
"cpe:2.3:a:ipostmx:ipostmx_2005:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
PYSEC-2022-43143
| null |
OpenZeppelin Contracts for Cairo is a library for contract development written in Cairo for StarkNet, a decentralized ZK Rollup. Version 0.2.0 is vulnerable to an error that renders account contracts unusable on live networks. This issue affects all accounts (vanilla and ethereum flavors) in the v0.2.0 release of OpenZeppelin Contracts for Cairo, which are not whitelisted on StarkNet mainnet. Only goerli deployments of v0.2.0 accounts are affected. This faulty behavior is not observed in StarkNet's testing framework. This bug has been patched in v0.2.1.
|
[] | null | 6.5 | null | null | null |
GHSA-f4vv-x4c4-5m9c
|
Certain HP DesignJet products may be vulnerable to information disclosure though printer's web interface allowing unauthenticated users to view sensitive print job information.
|
[] | 6 | null | null | null | null |
|
CVE-2023-3371
|
The User Registration plugin for WordPress is vulnerable to Sensitive Information Exposure due to hardcoded encryption key on the 'lock_content_form_handler' and 'display_password_form' function in versions up to, and including, 3.7.3. This makes it possible for unauthenticated attackers to decrypt and view the password protected content.
|
[
"cpe:2.3:a:wpdeveloper:embedpress:*:*:*:*:*:wordpress:*:*"
] | null | 5.3 | null | null | null |
|
CVE-2015-9293
|
The all-in-one-wp-security-and-firewall plugin before 3.9.8 for WordPress has XSS in the unlock request feature.
|
[
"cpe:2.3:a:tipsandtricks-hq:all_in_one_wp_security_\\&_firewall:*:*:*:*:*:wordpress:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2021-34569
|
WAGO I/O-Check Service prone to Out-of-bounds Write
|
In WAGO I/O-Check Service in multiple products an attacker can send a specially crafted packet containing OS commands to crash the diagnostic tool and write memory.
|
[
"cpe:2.3:o:wago:750-8100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8100_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8100_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8100_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8101_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8101_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8101_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8101_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8101:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8101\\/025-000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8101\\/025-000_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8101\\/025-000_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8101\\/025-000_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8101\\/025-000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8102_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8102_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8102_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8102_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8102:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8102\\/025-000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8102\\/025-000_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8102\\/025-000_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8102\\/025-000_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8102\\/025-000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8202:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/000-011_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/000-011_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/000-011_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/000-011_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8202\\/000-011:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/000-012_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/000-012_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/000-012_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/000-012_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8202\\/000-012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/000-022_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/000-022_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/000-022_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/000-022_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8202\\/000-022:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/025-000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/025-000_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/025-000_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/025-000_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8202\\/025-000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/025-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/025-001_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/025-001_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/025-001_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8202\\/025-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/025-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/025-002_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/025-002_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/025-002_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8202\\/025-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/040-000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/040-000_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/040-000_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/040-000_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8202\\/040-000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/040-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/040-001_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/040-001_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/040-001_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8202\\/040-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:752-8303\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:752-8303\\/8000-002_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:752-8303\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:752-8303\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:752-8303\\/8000-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4101_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4101_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4101_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4101_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4101:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4102_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4102_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4102_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4102_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4102:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4103_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4103_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4103_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4103_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4103:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4104_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4104_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4104_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4104_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4104:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4201\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4201\\/8000-001_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4201\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4201\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4201\\/8000-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4202\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4202\\/8000-001_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4202\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4202\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4202\\/8000-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4203\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4203\\/8000-001_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4203\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4203\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4203\\/8000-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4204\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4204\\/8000-001_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4204\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4204\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4204\\/8000-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4205\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4205\\/8000-001_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4205\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4205\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4205\\/8000-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4205\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4205\\/8000-002_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4205\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4205\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4205\\/8000-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4206\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4206\\/8000-001_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4206\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4206\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4206\\/8000-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4206\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4206\\/8000-002_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4206\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4206\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4206\\/8000-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4301\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4301\\/8000-002_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4301\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4301\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4301\\/8000-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4302\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4302\\/8000-002_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4302\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4302\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4302\\/8000-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4303\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4303\\/8000-002_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4303\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4303\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4303\\/8000-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4304\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4304\\/8000-002_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4304\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4304\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4304\\/8000-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4305\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4305\\/8000-002_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4305\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4305\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4305\\/8000-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4306\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4306\\/8000-002_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4306\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4306\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4306\\/8000-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5203\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5203\\/8000-001_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5203\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5203\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-5203\\/8000-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5204\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5204\\/8000-001_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5204\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5204\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-5204\\/8000-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5205\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5205\\/8000-001_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5205\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5205\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-5205\\/8000-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5206\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5206\\/8000-001_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5206\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5206\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-5206\\/8000-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5303\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5303\\/8000-002_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5303\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5303\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-5303\\/8000-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5304\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5304\\/8000-002_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5304\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5304\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-5304\\/8000-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5305\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5305\\/8000-002_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5305\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5305\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-5305\\/8000-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5306\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5306\\/8000-002_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5306\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5306\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-5306\\/8000-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6201\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6201\\/8000-001_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6201\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6201\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-6201\\/8000-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6202\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6202\\/8000-001_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6202\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6202\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-6202\\/8000-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6203\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6203\\/8000-001_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6203\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6203\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-6203\\/8000-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6204\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6204\\/8000-001_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6204\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6204\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-6204\\/8000-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6301\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6301\\/8000-002_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6301\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6301\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-6301\\/8000-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6302\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6302\\/8000-002_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6302\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6302\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-6302\\/8000-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6303\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6303\\/8000-002_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6303\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6303\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-6303\\/8000-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6304\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6304\\/8000-002_firmware:18:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6304\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6304\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-6304\\/8000-002:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
CVE-2006-5099
|
lib/exec/fetch.php in DokuWiki before 2006-03-09e, when conf[imconvert] is configured to use ImageMagick, allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) w and (2) h parameters, which are not filtered when invoking convert.
|
[
"cpe:2.3:a:andreas_gohr:dokuwiki:release_2006-03-05:*:*:*:*:*:*:*",
"cpe:2.3:a:andreas_gohr:dokuwiki:release_2006-03-09:*:*:*:*:*:*:*",
"cpe:2.3:a:andreas_gohr:dokuwiki:release_2006-03-09e:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-5fmq-fmjj-gvcc
|
Insufficient policy enforcement in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)
|
[] | null | 4.3 | null | null | null |
|
GHSA-x9wv-x8g7-f28h
|
Multiple cross-site scripting (XSS) vulnerabilities in ls/htmlchat.php in the VideoWhisper Live Streaming Integration plugin 4.25.3 and possibly earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) name or (2) message parameter. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
CVE-2023-2512
|
Buffer under-read in workerd
|
Prior to version v1.20230419.0, the FormData API implementation was subject to an integer overflow. If a FormData instance contained more than 2^31 elements, the forEach() method could end up reading from the wrong location in memory while iterating over elements. This would most likely lead to a segmentation fault, but could theoretically allow arbitrary undefined behavior.
In order for the bug to be exploitable, the process would need to be able to allocate 160GB of RAM. Due to this, the bug was never exploitable on the Cloudflare Workers platform, but could theoretically be exploitable on deployments of workerd running on machines with a huge amount of memory. Moreover, in order to be remotely exploited, an attacker would have to upload a single form-encoded HTTP request of at least tens of gigabytes in size. The application code would then have to use request.formData() to parse the request and formData.forEach() to iterate over this data. Due to these limitations, the exploitation likelihood was considered Low.
A fix that addresses this vulnerability has been released in version v1.20230419.0 and users are encouraged to update to the latest version available.
|
[
"cpe:2.3:a:cloudflare:workerd:*:*:*:*:*:node.js:*:*"
] | null | 6.5 | null | null | null |
CVE-2007-2671
|
Mozilla Firefox 2.0.0.3 allows remote attackers to cause a denial of service (application crash) via a long hostname in an HREF attribute in an A element, which triggers an out-of-bounds memory access.
|
[
"cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*"
] | null | null | null | 7.1 | null |
|
CVE-2010-3041
|
Multiple buffer overflows in the Cisco WebEx Recording Format (WRF) and Advanced Recording Format (ARF) Players T27LB before SP21 EP3 and T27LC before SP22 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted (1) .wrf or (2) .arf file, related to atas32.dll, a different vulnerability than CVE-2010-3042, CVE-2010-3043, and CVE-2010-3044.
|
[
"cpe:2.3:a:cisco:webex_recording_format_player:26.49:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_recording_format_player:27.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_recording_format_player:27.11.0.3328:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_recording_format_player:27.12:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_recording_format_player:27.13:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_advanced_recording_format_player:26.49:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_advanced_recording_format_player:27.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_advanced_recording_format_player:27.11.0.3328:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_advanced_recording_format_player:27.12:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_advanced_recording_format_player:27.13:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2024-38889
|
An issue in Horizon Business Services Inc. Caterease 16.0.1.1663 through 24.0.1.2405 and possibly later versions, allows a remote attacker to perform SQL Injection due to improper neutralization of special elements used in an SQL command.
|
[
"cpe:2.3:a:horizoncloud:caterease:16.0.1.1663:*:*:*:*:*:*:*",
"cpe:2.3:a:horizoncloud:caterease:*:*:*:*:*:*:*:*"
] | null | 9.6 | null | null | null |
|
GHSA-c8jj-4grw-46cf
|
NETGEAR XR1000 devices before 1.0.0.58 are affected by command injection by an unauthenticated attacker.
|
[] | null | null | null | null | null |
|
GHSA-56cx-256p-gj3x
|
SQL injection vulnerability in the mc_project_get_attachments function in api/soap/mc_project_api.php in MantisBT before 1.2.18 allows remote attackers to execute arbitrary SQL commands via the project_id parameter. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1609.
|
[] | null | null | null | null | null |
|
GHSA-rrgq-3j34-jqg8
|
Windows Internet Storage Name Service (iSNS) Server Information Disclosure Vulnerability
|
[] | null | 6.2 | null | null | null |
|
GHSA-crvq-r2jc-v9jv
|
Missing Authorization vulnerability in Fahad Mahmood WP Docs allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP Docs: from n/a through n/a.
|
[] | null | 4.3 | null | null | null |
|
GHSA-3v2g-m6qm-pvj3
|
An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. The password for the PostgreSQL wguest account is weak.
|
[] | null | 9.8 | null | null | null |
|
GHSA-vqmh-h9f4-cvv4
|
gnomesu-pam-backend in libgnomesu 1.0.0 prints an error message but proceeds with the non-error code path upon failure of the setgid or setuid function, which allows local users to gain privileges by leveraging access to two unprivileged user accounts, and running many processes under one of these accounts.
|
[] | null | null | null | null | null |
|
GHSA-58h5-h554-429q
|
ezplatform-admin-ui vulnerable to Cross-Site Scripting (XSS)
|
It is possible to inject JavaScript XSS in the content type entries "name" and "short name". To exploit this, one must already have permission to edit content types, which limits it in many cases to people who are already administrators. However, please verify which users have this permission. The fix ensures any injections are escaped.
|
[] | null | null | null | null | null |
CVE-2025-3393
|
mrcen springboot-ucan-admin Personal Settings Interface index cross site scripting
|
A vulnerability was found in mrcen springboot-ucan-admin up to 5f35162032cbe9288a04e429ef35301545143509. It has been classified as problematic. This affects an unknown part of the file /ucan-admin/index of the component Personal Settings Interface. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.
|
[] | 5.1 | 3.5 | 3.5 | 4 | null |
GHSA-3485-7x7c-qrw2
|
A Improper Access Control vulnerability in the systemd service of cana in openSUSE Backports SLE-15-SP3, openSUSE Backports SLE-15-SP4 allows local users to hijack the UNIX domain socket This issue affects: openSUSE Backports SLE-15-SP3 canna versions prior to canna-3.7p3-bp153.2.3.1. openSUSE Backports SLE-15-SP4 canna versions prior to 3.7p3-bp154.3.3.1. openSUSE Factory was also affected. Instead of fixing the package it was deleted there.
|
[] | null | 7.8 | null | null | null |
|
CVE-2018-11328
|
An issue was discovered in Joomla! Core before 3.8.8. Under specific circumstances (a redirect issued with a URI containing a username and password when the Location: header cannot be used), a lack of escaping the user-info component of the URI could result in an XSS vulnerability.
|
[
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] | null | null | 4.7 | 2.6 | null |
|
GHSA-c3gx-j29w-p5pp
|
Pearson ProctorCache before 2015.1.17 uses the same hardcoded password across different customers' installations, which allows remote attackers to modify test metadata or cause a denial of service (test disruption) by leveraging knowledge of this password.
|
[] | null | null | null | null | null |
|
CVE-2005-2995
|
bacula 1.36.3 and earlier allows local users to modify or read sensitive files via symlink attacks on (1) the temporary file used by autoconf/randpass when openssl is not available, or (2) the mtx.[PID] temporary file in mtx-changer.in.
|
[
"cpe:2.3:a:bacula:bacula:*:*:*:*:*:*:*:*"
] | null | null | null | 3.6 | null |
|
GHSA-9j87-4jmc-mrvg
|
In the Linux kernel, the following vulnerability has been resolved:drm/vrr: Set VRR capable prop only if it is attached to connectorVRR capable property is not attached by default to the connector
It is attached only if VRR is supported.
So if the driver tries to call drm core set prop function without
it being attached that causes NULL dereference.
|
[] | null | 5.5 | null | null | null |
|
CVE-2024-1428
|
The Element Pack Elementor Addons (Header Footer, Free Template Library, Grid, Carousel, Table, Parallax Animation, Register Form, Twitter Grid) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘element_pack_wrapper_link’ attribute of the Trailer Box widget in all versions up to, and including, 5.5.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
GHSA-rmx6-3w23-whmj
|
A vulnerability in Absolute Persistence® versions before 2.8 exists when it is not activated. This may allow a skilled attacker with both physical access to the device, and full hostile network control, to initiate OS commands on the device. To remediate this vulnerability, update the device firmware to the latest available version. Please contact the device manufacturer for upgrade instructions or contact Absolute Security, see reference below.
|
[] | 6.9 | 6.4 | null | null | null |
|
GHSA-gf9w-mffq-c45p
|
ZoIPer 2.22, and possibly other versions before 2.24 Library 5324, allows remote attackers to cause a denial of service (crash) via a SIP INVITE request with an empty Call-Info header.
|
[] | null | null | null | null | null |
|
GHSA-hx3m-959f-v849
|
ZendFramework local file inclusion vector in `Zend_View::setScriptPath()` and `render()`
|
Zend_View is a component that utilizes PHP as a templating language. To utilize it, you specify "script paths" that contain view scripts, and then `render()` view scripts by specifying subdirectories within those script paths; the output is then returned as a string value which may be cached or directly output.`Zend_View::setScriptPath()` in versions up to and including 1.7.4 include a potential Local File Inclusion vulnerability. If untrusted input is used to specify the script path and/or view script itself, a malicious attacker could potentially specify a system directory and thus render a system file.As an example, if the user-supplied string `/etc/passwd` or a relative path that resolved to that file, was supplied to `Zend_View::render()`, that file would be rendered.
|
[] | null | 7.5 | null | null | null |
RHSA-2025:2868
|
Red Hat Security Advisory: libreoffice security update
|
libreoffice: Macro URL arbitrary script execution
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.6 | null | null | null |
CVE-2017-11133
|
An issue was discovered in heinekingmedia StashCat through 1.7.5 for Android, through 0.0.80w for Web, and through 0.0.86 for Desktop. To encrypt messages, AES in CBC mode is used with a pseudo-random secret. This secret and the IV are generated with math.random() in previous versions and with CryptoJS.lib.WordArray.random() in newer versions, which uses math.random() internally. This is not cryptographically strong.
|
[
"cpe:2.3:a:stashcat:heinekingmedia:*:*:*:*:*:android:*:*",
"cpe:2.3:a:stashcat:heinekingmedia:*:*:*:*:web:*:*:*",
"cpe:2.3:a:stashcat:heinekingmedia:*:*:*:*:desktop:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-pw79-h962-2rw9
|
The App::Context module 0.01 through 0.968 for Perl does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via a crafted request to (1) App::Session::Cookie or (2) App::Session::HTMLHidden, which is not properly handled when it is deserialized.
|
[] | null | null | null | null | null |
|
GHSA-xpff-c35g-j3cr
|
silverstripe/framework Privilege Escalation Risk in Member Edit form
|
A member with the permission `EDIT_PERMISSIONS` and access to the "Security" section is able to re-assign themselves (or another member) to `ADMIN` level.CMS Fields for the member are constructed using DirectGroups instead of Groups relation which results in bypassing security logic preventing privilege escalation.
|
[] | null | 6.5 | null | null | null |
CVE-2000-0582
|
Check Point FireWall-1 4.0 and 4.1 allows remote attackers to cause a denial of service by sending a stream of invalid commands (such as binary zeros) to the SMTP Security Server proxy.
|
[
"cpe:2.3:a:checkpoint:firewall-1:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:firewall-1:4.1:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-r95q-f4c4-7f24
|
Forminator prior to 1.29.3 contains a SQL injection vulnerability. If this vulnerability is exploited, a remote authenticated attacker with an administrative privilege may obtain and alter any information in the database and cause a denial-of-service (DoS) condition.
|
[] | null | 7.2 | null | null | null |
|
GHSA-6vjp-wc2j-cvcc
|
Unify (former Siemens) OpenStage SIP and OpenScape Desk Phone IP V3 devices before R3.32.0 allow remote attackers to gain super-user privileges by leveraging SSH access and incorrect ownership of (1) ConfigureCoreFile.sh, (2) Traceroute.sh, (3) apps.sh, (4) conversion_java2native.sh, (5) coreCompression.sh, (6) deletePasswd.sh, (7) findHealthSvcFDs.sh, (8) fw_printenv.sh, (9) fw_setenv.sh, (10) hw_wd_kicker.sh, (11) new_rootfs.sh, (12) opera_killSnmpd.sh, (13) opera_startSnmpd.sh, (14) rebootOperaSoftware.sh, (15) removeLogFiles.sh, (16) runOperaServices.sh, (17) setPasswd.sh, (18) startAccTestSvcs.sh, (19) usbNotification.sh, or (20) appWeb in /Opera_Deploy.
|
[] | null | 7.5 | null | null | null |
|
CVE-2025-3005
|
Sayski ForestBlog Friend Link cross site scripting
|
A vulnerability was found in Sayski ForestBlog up to 20250321 and classified as problematic. Affected by this issue is some unknown functionality of the component Friend Link Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.1 | 3.5 | 3.5 | 4 | null |
GHSA-3rc9-qgq4-2p4w
|
There is a local privilege escalation vulnerability in Alfredo Milani Comparetti SpeedFan 4.52. Attackers can use constructed programs to increase user privileges
|
[] | null | null | null | null | null |
|
CVE-2019-14312
|
Aptana Jaxer 1.0.3.4547 is vulnerable to a local file inclusion vulnerability in the wikilite source code viewer. This vulnerability allows a remote attacker to read internal files on the server via a tools/sourceViewer/index.html?filename=../ URI.
|
[
"cpe:2.3:a:aptana:jaxer:1.0.3.4547:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4 | null |
|
GHSA-6j5j-5wvh-853p
|
Multiple cross-site scripting (XSS) vulnerabilities in AN Guestbook (ANG) before 0.7.6 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2025-30192
|
A Recursor configured to send out ECS enabled queries can be sensitive to spoofing attempts
|
An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries.
The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers.
The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled.
|
[] | null | 7.5 | null | null | null |
CVE-2015-1056
|
Cross-site scripting (XSS) vulnerability in Brother MFC-J4410DW printer with firmware before L allows remote attackers to inject arbitrary web script or HTML via the url parameter to general/status.html and possibly other pages.
|
[
"cpe:2.3:o:brother:mfc-j4410dw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:brother:mfc-j4410dw:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-g43w-x7fj-gvxf
|
An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.1. There is a blind SQL injection in the knximport component via an advanced attack vector, allowing logged in attackers to discover arbitrary information.
|
[] | null | null | null | null | null |
|
GHSA-cm48-4cv7-p665
|
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.1.30. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H).
|
[] | null | null | 7.3 | null | null |
|
GHSA-qxwq-j6rc-mmpc
|
andrzuk/FineCMS through 2017-05-28 is vulnerable to a reflected XSS in the sitename parameter to admin.php.
|
[] | null | null | 6.1 | null | null |
|
CVE-2020-3771
|
Adobe Photoshop CC 2019 versions 20.0.8 and earlier, and Photoshop 2020 versions 21.1 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
|
[
"cpe:2.3:a:adobe:photoshop_2020:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:photoshop_cc:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4.3 | null |
|
CVE-2010-3865
|
Integer overflow in the rds_rdma_pages function in net/rds/rdma.c in the Linux kernel allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted iovec struct in a Reliable Datagram Sockets (RDS) request, which triggers a buffer overflow.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_real_time:11:sp1:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2009-0440
|
IBM WebSphere Partner Gateway (WPG) 6.0.0 through 6.0.0.7 does not properly handle failures of signature verification, which might allow remote authenticated users to submit a crafted RosettaNet (aka RNIF) document to a backend application, related to (1) "altered service content" and (2) "digital signature foot-print."
|
[
"cpe:2.3:a:ibm:websphere_partner_gateway:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_partner_gateway:6.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_partner_gateway:6.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_partner_gateway:6.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_partner_gateway:6.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_partner_gateway:6.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_partner_gateway:6.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_partner_gateway:6.0.0.7:*:*:*:*:*:*:*"
] | null | null | null | 6.5 | null |
|
CVE-2025-7154
|
TOTOLINK N200RE cstecgi.cgi sub_41A0F8 os command injection
|
A vulnerability, which was classified as critical, has been found in TOTOLINK N200RE 9.3.5u.6095_B20200916/9.3.5u.6139_B20201216. Affected by this issue is the function sub_41A0F8 of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument Hostname leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3 | 6.3 | 6.3 | 6.5 | null |
CVE-2024-32017
|
Buffer overflows in RIOT
|
RIOT is a real-time multi-threading operating system that supports a range of devices that are typically 8-bit, 16-bit and 32-bit microcontrollers. The size check in the `gcoap_dns_server_proxy_get()` function contains a small typo that may lead to a buffer overflow in the subsequent `strcpy()`. In detail, the length of the `_uri` string is checked instead of the length of the `_proxy` string. The `_gcoap_forward_proxy_copy_options()` function does not implement an explicit size check before copying data to the `cep->req_etag` buffer that is `COAP_ETAG_LENGTH_MAX` bytes long. If an attacker can craft input so that `optlen` becomes larger than `COAP_ETAG_LENGTH_MAX`, they can cause a buffer overflow. If the input above is attacker-controlled and crosses a security boundary, the impact of the buffer overflow vulnerabilities could range from denial of service to arbitrary code execution. This issue has yet to be patched. Users are advised to add manual bounds checking.
|
[
"cpe:2.3:o:riot-os:riot:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
GHSA-f9cg-c8c7-cmx3
|
A flaw was found in the Openshift console. The /API/helm/verify endpoint is tasked to fetch and verify the installation of a Helm chart from a URI that is remote HTTP/HTTPS or local. Access to this endpoint is gated by the authHandlerWithUser() middleware function. Contrary to its name, this middleware function does not verify the validity of the user's credentials. As a result, unauthenticated users can access this endpoint.
|
[] | null | 5.4 | null | null | null |
|
CVE-2019-6470
|
dhcpd: use-after-free error leads crash in IPv6 mode when using mismatched BIND libraries
|
There had existed in one of the ISC BIND libraries a bug in a function that was used by dhcpd when operating in DHCPv6 mode. There was also a bug in dhcpd relating to the use of this function per its documentation, but the bug in the library function prevented this from causing any harm. All releases of dhcpd from ISC contain copies of this, and other, BIND libraries in combinations that have been tested prior to release and are known to not present issues like this. Some third-party packagers of ISC software have modified the dhcpd source, BIND source, or version matchup in ways that create the crash potential. Based on reports available to ISC, the crash probability is large and no analysis has been done on how, or even if, the probability can be manipulated by an attacker. Affects: Builds of dhcpd versions prior to version 4.4.1 when using BIND versions 9.11.2 or later, or BIND versions with specific bug fixes backported to them. ISC does not have access to comprehensive version lists for all repackagings of dhcpd that are vulnerable. In particular, builds from other vendors may also be affected. Operators are advised to consult their vendor documentation.
|
[
"cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcpd:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
GHSA-v8rv-c4hj-xh2q
|
SQL injection vulnerability in staticpages/easycalendar/index.php in MyioSoft EasyDynamicPages 3.0 trial edition (tr) allows remote attackers to execute arbitrary SQL commands via the read parameter.
|
[] | null | null | null | null | null |
|
GHSA-jhfj-f9w2-rhxg
|
SQL injection vulnerability in logout.php in T.G.S. CMS 0.1.7 and earlier allows remote attackers to execute arbitrary SQL commands via the myauthorid cookie.
|
[] | null | null | null | null | null |
|
CVE-2023-38327
|
An issue was discovered in eGroupWare 17.1.20190111. A User Enumeration vulnerability exists under calendar/freebusy.php, which allows unauthenticated remote attackers to enumerate the users of web applications based on server response.
|
[] | null | 5.3 | null | null | null |
|
CVE-2020-26818
|
SAP NetWeaver AS ABAP (Web Dynpro), versions - 731, 740, 750, 751, 752, 753, 754, 755, 782, allows an authenticated user to access Web Dynpro components, which reveals sensitive system information that would otherwise be restricted to highly privileged users because of missing authorization, resulting in Information Disclosure.
|
[
"cpe:2.3:a:sap:netweaver_application_server_abap:731:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:740:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:750:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:751:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:752:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:753:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:754:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:755:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:782:*:*:*:*:*:*:*"
] | null | null | 6.5 | null | null |
|
GHSA-78p4-q6hj-fmp7
|
Multiple memory corruption issues were addressed with improved input validation. This issue is fixed in macOS Sonoma 14.2. Processing a maliciously crafted file may lead to unexpected app termination or arbitrary code execution.
|
[] | null | 7.8 | null | null | null |
|
CVE-2022-20568
|
In (TBD) of (TBD), there is a possible way to corrupt kernel memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-220738351References: Upstream kernel
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
GHSA-q34c-v76q-8jx6
|
LedgerSMB does not set the 'Secure' attribute on the session authorization cookie when the client uses HTTPS and the LedgerSMB server is behind a reverse proxy. By tricking a user to use an unencrypted connection (HTTP), an attacker may be able to obtain the authentication data by capturing network traffic. LedgerSMB 1.8 and newer switched from Basic authentication to using cookie authentication with encrypted cookies. Although an attacker can't access the information inside the cookie, nor the password of the user, possession of the cookie is enough to access the application as the user from which the cookie has been obtained. In order for the attacker to obtain the cookie, first of all the server must be configured to respond to unencrypted requests, the attacker must be suitably positioned to eavesdrop on the network traffic between the client and the server *and* the user must be tricked into using unencrypted HTTP traffic. Proper audit control and separation of duties limit Integrity impact of the attack vector. Users of LedgerSMB 1.8 are urged to upgrade to known-fixed versions. Users of LedgerSMB 1.7 or 1.9 are unaffected by this vulnerability and don't need to take action. As a workaround, users may configure their Apache or Nginx reverse proxy to add the Secure attribute at the network boundary instead of relying on LedgerSMB. For Apache, please refer to the 'Header always edit' configuration command in the mod_headers module. For Nginx, please refer to the 'proxy_cookie_flags' configuration command.
|
[] | null | 6.8 | null | null | null |
|
CVE-2007-4886
|
Incomplete blacklist vulnerability in index.php in AuraCMS 1.x and probably 2.x allows remote attackers to execute arbitrary PHP code via a (1) UNC share pathname, or a (2) ftp, (3) ftps, or (4) ssh2.sftp URL, in the pilih parameter, for which PHP remote file inclusion is blocked only for http URLs.
|
[
"cpe:2.3:a:auracms:auracms:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:auracms:auracms:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:auracms:auracms:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:auracms:auracms:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:auracms:auracms:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:auracms:auracms:1.6_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:auracms:auracms:1.61:*:*:*:*:*:*:*",
"cpe:2.3:a:auracms:auracms:1.62:*:*:*:*:*:*:*",
"cpe:2.3:a:auracms:auracms:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:auracms:auracms:2.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-m6m9-gr85-79vm
|
Pimcore Cross-site Scripting (XSS) in name field of Custom Reports
|
ImpactThis vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites.PatchesUpdate to version 10.5.21 or apply this patch manually:
https://github.com/pimcore/pimcore/commit/c36ef54ce33f7b5e74b7b0ab9eabfed47c018fc7.patchWorkaroundsApply patches manually:
https://github.com/pimcore/pimcore/commit/c36ef54ce33f7b5e74b7b0ab9eabfed47c018fc7.patchReferenceshttps://huntr.dev/bounties/1a5e6c65-2c5e-4617-9411-5b47a7e743a6/
|
[] | null | null | null | null | null |
CVE-2017-12236
|
A vulnerability in the implementation of the Locator/ID Separation Protocol (LISP) in Cisco IOS XE 3.2 through 16.5 could allow an unauthenticated, remote attacker using an x tunnel router to bypass authentication checks performed when registering an Endpoint Identifier (EID) to a Routing Locator (RLOC) in the map server/map resolver (MS/MR). The vulnerability is due to a logic error introduced via a code regression for the affected software. An attacker could exploit this vulnerability by sending specific valid map-registration requests, which will be accepted by the MS/MR even if the authentication keys do not match, to the affected software. A successful exploit could allow the attacker to inject invalid mappings of EIDs to RLOCs in the MS/MR of the affected software. This vulnerability affects Cisco devices that are configured with LISP acting as an IPv4 or IPv6 map server. This vulnerability affects Cisco IOS XE Software release trains 3.9E and Everest 16.4. Cisco Bug IDs: CSCvc18008.
|
[
"cpe:2.3:o:cisco:ios_xe:3.2.0ja:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.1c:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
CVE-2016-4717
|
The File Bookmark component in Apple OS X before 10.12 mishandles scoped-bookmark file descriptors, which allows attackers to cause a denial of service via a crafted app.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 3.3 | 5 | null |
|
CVE-2024-48579
|
SQL Injection vulnerability in Best House rental management system project in php v.1.0 allows a remote attacker to execute arbitrary code via the username parameter of the login request.
|
[
"cpe:2.3:a:php:best_house_rental_management_system:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-xp6r-5ghh-6w2m
|
Directory traversal vulnerability in editconfig_gedcom.php for phpGedView 2.65.1 and earlier allows remote attackers to read arbitrary files or execute arbitrary PHP programs on the server via .. (dot dot) sequences in the gedcom_config parameter.
|
[] | null | null | null | null | null |
|
GHSA-92pp-5g9w-8mgr
|
CSV Injection vulnerability in Sesami Cash Point & Transport Optimizer (CPTO) version 6.3.8.6 (#718), allows remote attackers to obtain sensitive information via the Delivery Name field.
|
[] | null | 7.5 | null | null | null |
|
GHSA-hj9w-rhc7-6m8g
|
An issue was discovered in Adobe Experience Manager 6.3, 6.2, 6.1, 6.0. Sensitive tokens are included in http GET requests under certain circumstances.
|
[] | null | null | 7.5 | null | null |
|
GHSA-fm7m-qq3h-62vp
|
Readymade PHP Classified Script 3.3 has SQL Injection via the /categories subctid or mctid parameter.
|
[] | null | null | 9.8 | null | null |
|
GHSA-9jg7-rcr6-x7vx
|
Avahi before 0.6.10 allows local users to cause a denial of service (mDNS/DNS-SD service disconnect) via unspecified mDNS name conflicts.
|
[] | null | null | null | null | null |
|
CVE-2013-0870
|
The 'vp3_decode_frame' function in FFmpeg 1.1.4 moves threads check out of header packet type check.
|
[
"cpe:2.3:a:ffmpeg:ffmpeg:1.1.4:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
RHSA-2023:4520
|
Red Hat Security Advisory: python-requests security update
|
python-requests: Unintended leak of Proxy-Authorization header
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.1 | null | null | null |
GHSA-hxvh-x39f-f92f
|
Multiple heap-based buffer overflows in the ApiThread function in the firewall service (aka TmPfw.exe) in Trend Micro Network Security Component (NSC) modules, as used in Trend Micro OfficeScan 8.0 SP1 Patch 1 and Internet Security 2007 and 2008 17.0.1224, allow remote attackers to execute arbitrary code via a packet with a small value in an unspecified size field.
|
[] | null | null | null | null | null |
|
CVE-2022-43162
|
Online Diagnostic Lab Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /tests/view_test.php.
|
[
"cpe:2.3:a:online_diagnostic_lab_management_system_project:online_diagnostic_lab_management_system:1.0:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.