id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
CVE-2018-5752
The backend component in Open-Xchange OX App Suite before 7.6.3-rev36, 7.8.x before 7.8.2-rev39, 7.8.3 before 7.8.3-rev44, and 7.8.4 before 7.8.4-rev22 allows remote attackers to conduct server-side request forgery (SSRF) attacks via vectors involving non-decimal representations of IP addresses and special IPv6 related addresses.
[ "cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev14:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev15:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev16:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev17:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev18:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev20:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev22:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev23:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev24:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev25:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev26:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev28:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev29:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev30:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev31:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev32:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev33:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:rev35:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev10:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev11:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev12:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev13:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev14:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev15:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev16:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev17:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev18:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev19:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev20:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev21:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev22:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev23:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev24:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev25:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev26:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev27:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev28:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev29:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev30:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev31:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev32:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev33:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev34:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev35:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev36:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev38:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev39:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev40:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev41:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev42:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev43:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev5:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev6:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev8:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.3:rev9:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev10:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev11:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev13:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev14:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev15:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev16:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev17:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev18:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev19:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev20:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev21:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev3:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev4:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev5:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev6:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev7:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev8:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev9:*:*:*:*:*:*" ]
null
null
8.8
6.5
null
RHSA-2023:6197
Red Hat Security Advisory: thunderbird security update
Mozilla: Queued up rendering could have allowed websites to clickjack Mozilla: Large WebGL draw could have led to a crash Mozilla: WebExtensions could open arbitrary URLs Mozilla: Improper object tracking during GC in the JavaScript engine could have led to a crash. Mozilla: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4 Mozilla: Address bar spoofing via bidirectional characters libvpx: crash related to VP9 encoding in libvpx
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
7.5
null
null
null
GHSA-m87f-ggqj-7457
Cross-site scripting (XSS) vulnerability in Claroline before 1.8.9 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
null
CVE-2024-37198
WordPress Digital Newspaper theme <= 1.1.5 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in blazethemes Digital Newspaper.This issue affects Digital Newspaper: from n/a through 1.1.5.
[ "cpe:2.3:a:blazethemes:digital_newspaper:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
null
GHSA-ggjw-c9jm-j9xw
Multiple PHP remote file inclusion vulnerabilities in Puzzle Apps CMS 2.2.1 allow remote attackers to execute arbitrary PHP code via a URL in the MODULEDIR parameter to (1) core/modules/my/my.module.php or (2) core/modules/xml/xml.module.php; the COREROOT parameter to (3) config.loader.php, (4) platform.loader.php, (5) core.loader.php, (6) person.loader.php, or (7) module.loader.php in core/ or (8) install/steps/step_3.php; or the THISDIR parameter to (9) people.lib.php, (10) general.lib.php, (11) content.lib.php, or (12) templates.lib.php in core/modules/admin/libs/ or (13) core/modules/webstat/MEC/index.php.
[]
null
null
null
null
null
GHSA-7376-p46c-9w5f
IOHIDFamily in Apple iOS before 8.3, Apple OS X before 10.10.3, and Apple TV before 7.2 allows attackers to obtain sensitive information about kernel memory via a crafted app.
[]
null
null
null
null
null
GHSA-5pq5-cp3w-7chj
IBM Operational Decision Manager 8.10.3, 8.10.4, 8.10.5.1, 8.11, 8.11.0.1, and 8.12.0.1 could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an unsafe deserialization. By sending specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code in the context of SYSTEM. IBM X-Force ID: 279146.
[]
null
9.8
null
null
null
GHSA-j9fh-4mc8-rjqx
Microsoft Dynamics GP uses a substitution cipher to encrypt the system password field and unspecified other fields, which makes it easier for remote authenticated users to obtain sensitive information by decrypting a field's contents.
[]
null
null
null
null
null
CVE-2023-3006
A known cache speculation vulnerability, known as Branch History Injection (BHI) or Spectre-BHB, becomes actual again for the new hw AmpereOne. Spectre-BHB is similar to Spectre v2, except that malicious code uses the shared branch history (stored in the CPU Branch History Buffer, or BHB) to influence mispredicted branches within the victim's hardware context. Once that occurs, speculation caused by the mispredicted branches can cause cache allocation. This issue leads to obtaining information that should not be accessible.
[ "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-84w6-v28g-4xr9
IBM Sterling File Gateway 2.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 131289.
[]
null
null
5.4
null
null
CVE-2019-9500
Broadcom brcmfmac driver is vulnerable to a heap buffer overflow
The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.
[ "cpe:2.3:a:broadcom:brcmfmac_driver:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
7.9
null
null
null
RHSA-2024:4265
Red Hat Security Advisory: cups security update
cups: Cupsd Listen arbitrary chmod 0140777
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
4.4
null
null
null
GHSA-vqv5-7mjm-v78g
Multiple untrusted search path vulnerabilities in Maxthon Browser 1.6.7.35 and 2.5.15 allow local users to gain privileges via a Trojan horse (1) RSRC32.dll or (2) dwmapi.dll file in the current working directory, as demonstrated by a directory that contains a .html file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
null
CVE-2019-0637
A security feature bypass vulnerability exists when Windows Defender Firewall incorrectly applies firewall profiles to cellular network connections, aka 'Windows Defender Firewall Security Feature Bypass Vulnerability'.
[ "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
GHSA-6mqq-rw6c-7747
Users of the LearnPress WordPress plugin before 4.1.5 can upload an image as a profile avatar after the registration. After this process the user crops and saves the image. Then a "POST" request that contains user supplied name of the image is sent to the server for renaming and cropping of the image. As a result of this request, the name of the user-supplied image is changed with a MD5 value. This process can be conducted only when type of the image is JPG or PNG. An attacker can use this vulnerability in order to rename an arbitrary image file. By doing this, they could destroy the design of the web site.
[]
null
4.3
null
null
null
RHSA-2021:0794
Red Hat Security Advisory: .NET 5.0 on Red Hat Enterprise Linux security and bugfix update
dotnet: System.Text.Encodings.Web Remote Code Execution
[ "cpe:/a:redhat:rhel_dotnet:5.0::el7" ]
null
8.1
null
null
null
GHSA-j9q7-p3q3-f2xh
The Alcatel Lucent I-240W-Q GPON ONT using firmware version 3FE54567BOZJ19 is vulnerable to a stack buffer overflow via crafted HTTP POST request sent by a remote, unauthenticated attacker to /GponForm/fsetup_Form. An attacker can leverage this vulnerability to potentially execute arbitrary code.
[]
null
9.8
null
null
null
GHSA-vgx6-h88h-2vc3
Due to lack of proper memory management, when a victim opens a manipulated SolidWorks Drawing (.slddrw, CoreCadTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory.
[]
null
7.8
null
null
null
RHSA-2023:0903
Red Hat Security Advisory: webkit2gtk3 security update
webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
null
null
null
CVE-2010-4863
Cross-site scripting (XSS) vulnerability in admin/changedata.php in GetSimple CMS 2.01 allows remote attackers to inject arbitrary web script or HTML via the post-title parameter.
[ "cpe:2.3:a:get-simple:getsimple_cms:2.01:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-x4v7-c63g-mh6m
Adobe Acrobat and Reader versions 2020.006.20034 and earlier, 2017.011.30158 and earlier, 2017.011.30158 and earlier, 2015.006.30510 and earlier, and 2015.006.30510 and earlier have a use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution .
[]
null
null
null
null
null
GHSA-p8xw-m97m-vrf2
Heap-based buffer overflow in _mprosrv.exe in Progress Software Progress 9.1E and OpenEdge 10.1x, as used by the RSA Authentication Manager 6.0 and 6.1, SecurID Appliance 2.0, ACE/Server 5.2, and possibly other products, allows remote attackers to execute arbitrary code via crafted packets. NOTE: this issue might overlap CVE-2007-3491.
[]
null
null
null
null
null
CVE-2021-44892
A Remote Code Execution (RCE) vulnerability exists in ThinkPHP 3.x.x via value[_filename] in index.php, which could let a malicious user obtain server control privileges.
[ "cpe:2.3:a:thinkphp:thinkphp:3.2.3:*:*:*:*:*:*:*" ]
null
8.8
null
6.5
null
RHSA-2022:7019
Red Hat Security Advisory: firefox security update
expat: a use-after-free in the doContent function in xmlparse.c
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
8.1
null
null
null
ICSA-19-190-05
Siemens SIPROTEC 5 and DIGSI 5 (Update C)
A remote attacker could use specially crafted packets sent to port 443/TCP to upload, download or delete files in certain parts of the file system. A remote attacker could use specially crafted packets sent to port 443/TCP to upload, download or delete files in certain parts of the file system.
[]
null
7.5
null
null
null
GHSA-2h2j-hwh4-6vfv
VP9 Video Extensions Remote Code Execution Vulnerability
[]
null
7.8
null
null
null
CVE-2006-3095
Multiple cross-site scripting (XSS) vulnerabilities in iPostMX 2005 2.0 and earlier allow remote attackers to inject arbitrary web script or HTML via the RETURNURL parameter in (1) userlogin.cfm and (2) account.cfm.
[ "cpe:2.3:a:ipostmx:ipostmx_2005:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
PYSEC-2022-43143
null
OpenZeppelin Contracts for Cairo is a library for contract development written in Cairo for StarkNet, a decentralized ZK Rollup. Version 0.2.0 is vulnerable to an error that renders account contracts unusable on live networks. This issue affects all accounts (vanilla and ethereum flavors) in the v0.2.0 release of OpenZeppelin Contracts for Cairo, which are not whitelisted on StarkNet mainnet. Only goerli deployments of v0.2.0 accounts are affected. This faulty behavior is not observed in StarkNet's testing framework. This bug has been patched in v0.2.1.
[]
null
6.5
null
null
null
GHSA-f4vv-x4c4-5m9c
Certain HP DesignJet products may be vulnerable to information disclosure though printer's web interface allowing unauthenticated users to view sensitive print job information.
[]
6
null
null
null
null
CVE-2023-3371
The User Registration plugin for WordPress is vulnerable to Sensitive Information Exposure due to hardcoded encryption key on the 'lock_content_form_handler' and 'display_password_form' function in versions up to, and including, 3.7.3. This makes it possible for unauthenticated attackers to decrypt and view the password protected content.
[ "cpe:2.3:a:wpdeveloper:embedpress:*:*:*:*:*:wordpress:*:*" ]
null
5.3
null
null
null
CVE-2015-9293
The all-in-one-wp-security-and-firewall plugin before 3.9.8 for WordPress has XSS in the unlock request feature.
[ "cpe:2.3:a:tipsandtricks-hq:all_in_one_wp_security_\\&_firewall:*:*:*:*:*:wordpress:*:*" ]
null
null
6.1
4.3
null
CVE-2021-34569
WAGO I/O-Check Service prone to Out-of-bounds Write
In WAGO I/O-Check Service in multiple products an attacker can send a specially crafted packet containing OS commands to crash the diagnostic tool and write memory.
[ "cpe:2.3:o:wago:750-8100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8100_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8100_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8100_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8100:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8101:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101\\/025-000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101\\/025-000_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101\\/025-000_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101\\/025-000_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8101\\/025-000:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8102:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102\\/025-000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102\\/025-000_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102\\/025-000_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102\\/025-000_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8102\\/025-000:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-011_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-011_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-011_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-011_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/000-011:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-012_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-012_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-012_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-012_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/000-012:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-022_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-022_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-022_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-022_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/000-022:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-000_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-000_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-000_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/025-000:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/025-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/025-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-000_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-000_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-000_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/040-000:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/040-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:752-8303\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4101_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4101_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4101_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4101_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4101:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4102_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4102_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4102_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4102_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4102:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4103_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4103_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4103_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4103_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4103:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4104_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4104_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4104_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4104_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4104:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4201\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4201\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4201\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4201\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4201\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4202\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4202\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4202\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4202\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4202\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4203\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4203\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4203\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4203\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4203\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4204\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4204\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4204\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4204\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4204\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4205\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4205\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4206\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4206\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4301\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4301\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4301\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4301\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4301\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4302\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4302\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4302\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4302\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4302\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4303\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4303\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4303\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4303\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4303\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4304\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4304\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4304\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4304\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4304\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4305\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4305\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4305\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4305\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4305\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4306\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4306\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4306\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4306\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4306\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5203\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5203\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5203\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5203\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5203\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5204\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5204\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5204\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5204\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5204\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5205\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5205\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5205\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5205\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5205\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5206\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5206\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5206\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5206\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5206\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5303\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5303\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5303\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5303\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5303\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5304\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5304\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5304\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5304\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5304\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5305\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5305\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5305\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5305\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5305\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5306\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5306\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5306\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5306\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5306\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6201\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6201\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6201\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6201\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6201\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6202\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6202\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6202\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6202\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6202\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6203\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6203\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6203\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6203\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6203\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6204\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6204\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6204\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6204\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6204\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6301\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6301\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6301\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6301\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6301\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6302\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6302\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6302\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6302\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6302\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6303\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6303\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6303\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6303\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6303\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6304\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6304\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6304\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6304\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6304\\/8000-002:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2006-5099
lib/exec/fetch.php in DokuWiki before 2006-03-09e, when conf[imconvert] is configured to use ImageMagick, allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) w and (2) h parameters, which are not filtered when invoking convert.
[ "cpe:2.3:a:andreas_gohr:dokuwiki:release_2006-03-05:*:*:*:*:*:*:*", "cpe:2.3:a:andreas_gohr:dokuwiki:release_2006-03-09:*:*:*:*:*:*:*", "cpe:2.3:a:andreas_gohr:dokuwiki:release_2006-03-09e:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-5fmq-fmjj-gvcc
Insufficient policy enforcement in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)
[]
null
4.3
null
null
null
GHSA-x9wv-x8g7-f28h
Multiple cross-site scripting (XSS) vulnerabilities in ls/htmlchat.php in the VideoWhisper Live Streaming Integration plugin 4.25.3 and possibly earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) name or (2) message parameter. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
null
CVE-2023-2512
Buffer under-read in workerd
Prior to version v1.20230419.0, the FormData API implementation was subject to an integer overflow. If a FormData instance contained more than 2^31 elements, the forEach() method could end up reading from the wrong location in memory while iterating over elements. This would most likely lead to a segmentation fault, but could theoretically allow arbitrary undefined behavior. In order for the bug to be exploitable, the process would need to be able to allocate 160GB of RAM. Due to this, the bug was never exploitable on the Cloudflare Workers platform, but could theoretically be exploitable on deployments of workerd running on machines with a huge amount of memory. Moreover, in order to be remotely exploited, an attacker would have to upload a single form-encoded HTTP request of at least tens of gigabytes in size. The application code would then have to use request.formData() to parse the request and formData.forEach() to iterate over this data. Due to these limitations, the exploitation likelihood was considered Low. A fix that addresses this vulnerability has been released in version v1.20230419.0 and users are encouraged to update to the latest version available.
[ "cpe:2.3:a:cloudflare:workerd:*:*:*:*:*:node.js:*:*" ]
null
6.5
null
null
null
CVE-2007-2671
Mozilla Firefox 2.0.0.3 allows remote attackers to cause a denial of service (application crash) via a long hostname in an HREF attribute in an A element, which triggers an out-of-bounds memory access.
[ "cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*" ]
null
null
null
7.1
null
CVE-2010-3041
Multiple buffer overflows in the Cisco WebEx Recording Format (WRF) and Advanced Recording Format (ARF) Players T27LB before SP21 EP3 and T27LC before SP22 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted (1) .wrf or (2) .arf file, related to atas32.dll, a different vulnerability than CVE-2010-3042, CVE-2010-3043, and CVE-2010-3044.
[ "cpe:2.3:a:cisco:webex_recording_format_player:26.49:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_recording_format_player:27.10:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_recording_format_player:27.11.0.3328:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_recording_format_player:27.12:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_recording_format_player:27.13:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_advanced_recording_format_player:26.49:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_advanced_recording_format_player:27.10:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_advanced_recording_format_player:27.11.0.3328:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_advanced_recording_format_player:27.12:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_advanced_recording_format_player:27.13:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
CVE-2024-38889
An issue in Horizon Business Services Inc. Caterease 16.0.1.1663 through 24.0.1.2405 and possibly later versions, allows a remote attacker to perform SQL Injection due to improper neutralization of special elements used in an SQL command.
[ "cpe:2.3:a:horizoncloud:caterease:16.0.1.1663:*:*:*:*:*:*:*", "cpe:2.3:a:horizoncloud:caterease:*:*:*:*:*:*:*:*" ]
null
9.6
null
null
null
GHSA-c8jj-4grw-46cf
NETGEAR XR1000 devices before 1.0.0.58 are affected by command injection by an unauthenticated attacker.
[]
null
null
null
null
null
GHSA-56cx-256p-gj3x
SQL injection vulnerability in the mc_project_get_attachments function in api/soap/mc_project_api.php in MantisBT before 1.2.18 allows remote attackers to execute arbitrary SQL commands via the project_id parameter. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1609.
[]
null
null
null
null
null
GHSA-rrgq-3j34-jqg8
Windows Internet Storage Name Service (iSNS) Server Information Disclosure Vulnerability
[]
null
6.2
null
null
null
GHSA-crvq-r2jc-v9jv
Missing Authorization vulnerability in Fahad Mahmood WP Docs allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP Docs: from n/a through n/a.
[]
null
4.3
null
null
null
GHSA-3v2g-m6qm-pvj3
An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. The password for the PostgreSQL wguest account is weak.
[]
null
9.8
null
null
null
GHSA-vqmh-h9f4-cvv4
gnomesu-pam-backend in libgnomesu 1.0.0 prints an error message but proceeds with the non-error code path upon failure of the setgid or setuid function, which allows local users to gain privileges by leveraging access to two unprivileged user accounts, and running many processes under one of these accounts.
[]
null
null
null
null
null
GHSA-58h5-h554-429q
ezplatform-admin-ui vulnerable to Cross-Site Scripting (XSS)
It is possible to inject JavaScript XSS in the content type entries "name" and "short name". To exploit this, one must already have permission to edit content types, which limits it in many cases to people who are already administrators. However, please verify which users have this permission. The fix ensures any injections are escaped.
[]
null
null
null
null
null
CVE-2025-3393
mrcen springboot-ucan-admin Personal Settings Interface index cross site scripting
A vulnerability was found in mrcen springboot-ucan-admin up to 5f35162032cbe9288a04e429ef35301545143509. It has been classified as problematic. This affects an unknown part of the file /ucan-admin/index of the component Personal Settings Interface. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.
[]
5.1
3.5
3.5
4
null
GHSA-3485-7x7c-qrw2
A Improper Access Control vulnerability in the systemd service of cana in openSUSE Backports SLE-15-SP3, openSUSE Backports SLE-15-SP4 allows local users to hijack the UNIX domain socket This issue affects: openSUSE Backports SLE-15-SP3 canna versions prior to canna-3.7p3-bp153.2.3.1. openSUSE Backports SLE-15-SP4 canna versions prior to 3.7p3-bp154.3.3.1. openSUSE Factory was also affected. Instead of fixing the package it was deleted there.
[]
null
7.8
null
null
null
CVE-2018-11328
An issue was discovered in Joomla! Core before 3.8.8. Under specific circumstances (a redirect issued with a URI containing a username and password when the Location: header cannot be used), a lack of escaping the user-info component of the URI could result in an XSS vulnerability.
[ "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*" ]
null
null
4.7
2.6
null
GHSA-c3gx-j29w-p5pp
Pearson ProctorCache before 2015.1.17 uses the same hardcoded password across different customers' installations, which allows remote attackers to modify test metadata or cause a denial of service (test disruption) by leveraging knowledge of this password.
[]
null
null
null
null
null
CVE-2005-2995
bacula 1.36.3 and earlier allows local users to modify or read sensitive files via symlink attacks on (1) the temporary file used by autoconf/randpass when openssl is not available, or (2) the mtx.[PID] temporary file in mtx-changer.in.
[ "cpe:2.3:a:bacula:bacula:*:*:*:*:*:*:*:*" ]
null
null
null
3.6
null
GHSA-9j87-4jmc-mrvg
In the Linux kernel, the following vulnerability has been resolved:drm/vrr: Set VRR capable prop only if it is attached to connectorVRR capable property is not attached by default to the connector It is attached only if VRR is supported. So if the driver tries to call drm core set prop function without it being attached that causes NULL dereference.
[]
null
5.5
null
null
null
CVE-2024-1428
The Element Pack Elementor Addons (Header Footer, Free Template Library, Grid, Carousel, Table, Parallax Animation, Register Form, Twitter Grid) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘element_pack_wrapper_link’ attribute of the Trailer Box widget in all versions up to, and including, 5.5.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
GHSA-rmx6-3w23-whmj
A vulnerability in Absolute Persistence® versions before 2.8 exists when it is not activated. This may allow a skilled attacker with both physical access to the device, and full hostile network control, to initiate OS commands on the device. To remediate this vulnerability, update the device firmware to the latest available version. Please contact the device manufacturer for upgrade instructions or contact Absolute Security, see reference below.
[]
6.9
6.4
null
null
null
GHSA-gf9w-mffq-c45p
ZoIPer 2.22, and possibly other versions before 2.24 Library 5324, allows remote attackers to cause a denial of service (crash) via a SIP INVITE request with an empty Call-Info header.
[]
null
null
null
null
null
GHSA-hx3m-959f-v849
ZendFramework local file inclusion vector in `Zend_View::setScriptPath()` and `render()`
Zend_View is a component that utilizes PHP as a templating language. To utilize it, you specify "script paths" that contain view scripts, and then `render()` view scripts by specifying subdirectories within those script paths; the output is then returned as a string value which may be cached or directly output.`Zend_View::setScriptPath()` in versions up to and including 1.7.4 include a potential Local File Inclusion vulnerability. If untrusted input is used to specify the script path and/or view script itself, a malicious attacker could potentially specify a system directory and thus render a system file.As an example, if the user-supplied string `/etc/passwd` or a relative path that resolved to that file, was supplied to `Zend_View::render()`, that file would be rendered.
[]
null
7.5
null
null
null
RHSA-2025:2868
Red Hat Security Advisory: libreoffice security update
libreoffice: Macro URL arbitrary script execution
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.6
null
null
null
CVE-2017-11133
An issue was discovered in heinekingmedia StashCat through 1.7.5 for Android, through 0.0.80w for Web, and through 0.0.86 for Desktop. To encrypt messages, AES in CBC mode is used with a pseudo-random secret. This secret and the IV are generated with math.random() in previous versions and with CryptoJS.lib.WordArray.random() in newer versions, which uses math.random() internally. This is not cryptographically strong.
[ "cpe:2.3:a:stashcat:heinekingmedia:*:*:*:*:*:android:*:*", "cpe:2.3:a:stashcat:heinekingmedia:*:*:*:*:web:*:*:*", "cpe:2.3:a:stashcat:heinekingmedia:*:*:*:*:desktop:*:*:*" ]
null
null
7.5
5
null
GHSA-pw79-h962-2rw9
The App::Context module 0.01 through 0.968 for Perl does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via a crafted request to (1) App::Session::Cookie or (2) App::Session::HTMLHidden, which is not properly handled when it is deserialized.
[]
null
null
null
null
null
GHSA-xpff-c35g-j3cr
silverstripe/framework Privilege Escalation Risk in Member Edit form
A member with the permission `EDIT_PERMISSIONS` and access to the "Security" section is able to re-assign themselves (or another member) to `ADMIN` level.CMS Fields for the member are constructed using DirectGroups instead of Groups relation which results in bypassing security logic preventing privilege escalation.
[]
null
6.5
null
null
null
CVE-2000-0582
Check Point FireWall-1 4.0 and 4.1 allows remote attackers to cause a denial of service by sending a stream of invalid commands (such as binary zeros) to the SMTP Security Server proxy.
[ "cpe:2.3:a:checkpoint:firewall-1:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.1:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-r95q-f4c4-7f24
Forminator prior to 1.29.3 contains a SQL injection vulnerability. If this vulnerability is exploited, a remote authenticated attacker with an administrative privilege may obtain and alter any information in the database and cause a denial-of-service (DoS) condition.
[]
null
7.2
null
null
null
GHSA-6vjp-wc2j-cvcc
Unify (former Siemens) OpenStage SIP and OpenScape Desk Phone IP V3 devices before R3.32.0 allow remote attackers to gain super-user privileges by leveraging SSH access and incorrect ownership of (1) ConfigureCoreFile.sh, (2) Traceroute.sh, (3) apps.sh, (4) conversion_java2native.sh, (5) coreCompression.sh, (6) deletePasswd.sh, (7) findHealthSvcFDs.sh, (8) fw_printenv.sh, (9) fw_setenv.sh, (10) hw_wd_kicker.sh, (11) new_rootfs.sh, (12) opera_killSnmpd.sh, (13) opera_startSnmpd.sh, (14) rebootOperaSoftware.sh, (15) removeLogFiles.sh, (16) runOperaServices.sh, (17) setPasswd.sh, (18) startAccTestSvcs.sh, (19) usbNotification.sh, or (20) appWeb in /Opera_Deploy.
[]
null
7.5
null
null
null
CVE-2025-3005
Sayski ForestBlog Friend Link cross site scripting
A vulnerability was found in Sayski ForestBlog up to 20250321 and classified as problematic. Affected by this issue is some unknown functionality of the component Friend Link Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
5.1
3.5
3.5
4
null
GHSA-3rc9-qgq4-2p4w
There is a local privilege escalation vulnerability in Alfredo Milani Comparetti SpeedFan 4.52. Attackers can use constructed programs to increase user privileges
[]
null
null
null
null
null
CVE-2019-14312
Aptana Jaxer 1.0.3.4547 is vulnerable to a local file inclusion vulnerability in the wikilite source code viewer. This vulnerability allows a remote attacker to read internal files on the server via a tools/sourceViewer/index.html?filename=../ URI.
[ "cpe:2.3:a:aptana:jaxer:1.0.3.4547:*:*:*:*:*:*:*" ]
null
null
6.5
4
null
GHSA-6j5j-5wvh-853p
Multiple cross-site scripting (XSS) vulnerabilities in AN Guestbook (ANG) before 0.7.6 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
null
CVE-2025-30192
A Recursor configured to send out ECS enabled queries can be sensitive to spoofing attempts
An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled.
[]
null
7.5
null
null
null
CVE-2015-1056
Cross-site scripting (XSS) vulnerability in Brother MFC-J4410DW printer with firmware before L allows remote attackers to inject arbitrary web script or HTML via the url parameter to general/status.html and possibly other pages.
[ "cpe:2.3:o:brother:mfc-j4410dw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:brother:mfc-j4410dw:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-g43w-x7fj-gvxf
An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.1. There is a blind SQL injection in the knximport component via an advanced attack vector, allowing logged in attackers to discover arbitrary information.
[]
null
null
null
null
null
GHSA-cm48-4cv7-p665
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.1.30. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H).
[]
null
null
7.3
null
null
GHSA-qxwq-j6rc-mmpc
andrzuk/FineCMS through 2017-05-28 is vulnerable to a reflected XSS in the sitename parameter to admin.php.
[]
null
null
6.1
null
null
CVE-2020-3771
Adobe Photoshop CC 2019 versions 20.0.8 and earlier, and Photoshop 2020 versions 21.1 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
[ "cpe:2.3:a:adobe:photoshop_2020:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:photoshop_cc:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
4.3
null
4.3
null
CVE-2010-3865
Integer overflow in the rds_rdma_pages function in net/rds/rdma.c in the Linux kernel allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted iovec struct in a Reliable Datagram Sockets (RDS) request, which triggers a buffer overflow.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp1:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_real_time:11:sp1:*:*:*:*:*:*" ]
null
null
null
7.2
null
CVE-2009-0440
IBM WebSphere Partner Gateway (WPG) 6.0.0 through 6.0.0.7 does not properly handle failures of signature verification, which might allow remote authenticated users to submit a crafted RosettaNet (aka RNIF) document to a backend application, related to (1) "altered service content" and (2) "digital signature foot-print."
[ "cpe:2.3:a:ibm:websphere_partner_gateway:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_partner_gateway:6.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_partner_gateway:6.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_partner_gateway:6.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_partner_gateway:6.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_partner_gateway:6.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_partner_gateway:6.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_partner_gateway:6.0.0.7:*:*:*:*:*:*:*" ]
null
null
null
6.5
null
CVE-2025-7154
TOTOLINK N200RE cstecgi.cgi sub_41A0F8 os command injection
A vulnerability, which was classified as critical, has been found in TOTOLINK N200RE 9.3.5u.6095_B20200916/9.3.5u.6139_B20201216. Affected by this issue is the function sub_41A0F8 of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument Hostname leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
6.3
6.5
null
CVE-2024-32017
Buffer overflows in RIOT
RIOT is a real-time multi-threading operating system that supports a range of devices that are typically 8-bit, 16-bit and 32-bit microcontrollers. The size check in the `gcoap_dns_server_proxy_get()` function contains a small typo that may lead to a buffer overflow in the subsequent `strcpy()`. In detail, the length of the `_uri` string is checked instead of the length of the `_proxy` string. The `_gcoap_forward_proxy_copy_options()` function does not implement an explicit size check before copying data to the `cep->req_etag` buffer that is `COAP_ETAG_LENGTH_MAX` bytes long. If an attacker can craft input so that `optlen` becomes larger than `COAP_ETAG_LENGTH_MAX`, they can cause a buffer overflow. If the input above is attacker-controlled and crosses a security boundary, the impact of the buffer overflow vulnerabilities could range from denial of service to arbitrary code execution. This issue has yet to be patched. Users are advised to add manual bounds checking.
[ "cpe:2.3:o:riot-os:riot:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-f9cg-c8c7-cmx3
A flaw was found in the Openshift console. The /API/helm/verify endpoint is tasked to fetch and verify the installation of a Helm chart from a URI that is remote HTTP/HTTPS or local. Access to this endpoint is gated by the authHandlerWithUser() middleware function. Contrary to its name, this middleware function does not verify the validity of the user's credentials. As a result, unauthenticated users can access this endpoint.
[]
null
5.4
null
null
null
CVE-2019-6470
dhcpd: use-after-free error leads crash in IPv6 mode when using mismatched BIND libraries
There had existed in one of the ISC BIND libraries a bug in a function that was used by dhcpd when operating in DHCPv6 mode. There was also a bug in dhcpd relating to the use of this function per its documentation, but the bug in the library function prevented this from causing any harm. All releases of dhcpd from ISC contain copies of this, and other, BIND libraries in combinations that have been tested prior to release and are known to not present issues like this. Some third-party packagers of ISC software have modified the dhcpd source, BIND source, or version matchup in ways that create the crash potential. Based on reports available to ISC, the crash probability is large and no analysis has been done on how, or even if, the probability can be manipulated by an attacker. Affects: Builds of dhcpd versions prior to version 4.4.1 when using BIND versions 9.11.2 or later, or BIND versions with specific bug fixes backported to them. ISC does not have access to comprehensive version lists for all repackagings of dhcpd that are vulnerable. In particular, builds from other vendors may also be affected. Operators are advised to consult their vendor documentation.
[ "cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*", "cpe:2.3:a:isc:dhcpd:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
GHSA-v8rv-c4hj-xh2q
SQL injection vulnerability in staticpages/easycalendar/index.php in MyioSoft EasyDynamicPages 3.0 trial edition (tr) allows remote attackers to execute arbitrary SQL commands via the read parameter.
[]
null
null
null
null
null
GHSA-jhfj-f9w2-rhxg
SQL injection vulnerability in logout.php in T.G.S. CMS 0.1.7 and earlier allows remote attackers to execute arbitrary SQL commands via the myauthorid cookie.
[]
null
null
null
null
null
CVE-2023-38327
An issue was discovered in eGroupWare 17.1.20190111. A User Enumeration vulnerability exists under calendar/freebusy.php, which allows unauthenticated remote attackers to enumerate the users of web applications based on server response.
[]
null
5.3
null
null
null
CVE-2020-26818
SAP NetWeaver AS ABAP (Web Dynpro), versions - 731, 740, 750, 751, 752, 753, 754, 755, 782, allows an authenticated user to access Web Dynpro components, which reveals sensitive system information that would otherwise be restricted to highly privileged users because of missing authorization, resulting in Information Disclosure.
[ "cpe:2.3:a:sap:netweaver_application_server_abap:731:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_application_server_abap:740:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_application_server_abap:750:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_application_server_abap:751:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_application_server_abap:752:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_application_server_abap:753:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_application_server_abap:754:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_application_server_abap:755:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_application_server_abap:782:*:*:*:*:*:*:*" ]
null
null
6.5
null
null
GHSA-78p4-q6hj-fmp7
Multiple memory corruption issues were addressed with improved input validation. This issue is fixed in macOS Sonoma 14.2. Processing a maliciously crafted file may lead to unexpected app termination or arbitrary code execution.
[]
null
7.8
null
null
null
CVE-2022-20568
In (TBD) of (TBD), there is a possible way to corrupt kernel memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-220738351References: Upstream kernel
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-q34c-v76q-8jx6
LedgerSMB does not set the 'Secure' attribute on the session authorization cookie when the client uses HTTPS and the LedgerSMB server is behind a reverse proxy. By tricking a user to use an unencrypted connection (HTTP), an attacker may be able to obtain the authentication data by capturing network traffic. LedgerSMB 1.8 and newer switched from Basic authentication to using cookie authentication with encrypted cookies. Although an attacker can't access the information inside the cookie, nor the password of the user, possession of the cookie is enough to access the application as the user from which the cookie has been obtained. In order for the attacker to obtain the cookie, first of all the server must be configured to respond to unencrypted requests, the attacker must be suitably positioned to eavesdrop on the network traffic between the client and the server *and* the user must be tricked into using unencrypted HTTP traffic. Proper audit control and separation of duties limit Integrity impact of the attack vector. Users of LedgerSMB 1.8 are urged to upgrade to known-fixed versions. Users of LedgerSMB 1.7 or 1.9 are unaffected by this vulnerability and don't need to take action. As a workaround, users may configure their Apache or Nginx reverse proxy to add the Secure attribute at the network boundary instead of relying on LedgerSMB. For Apache, please refer to the 'Header always edit' configuration command in the mod_headers module. For Nginx, please refer to the 'proxy_cookie_flags' configuration command.
[]
null
6.8
null
null
null
CVE-2007-4886
Incomplete blacklist vulnerability in index.php in AuraCMS 1.x and probably 2.x allows remote attackers to execute arbitrary PHP code via a (1) UNC share pathname, or a (2) ftp, (3) ftps, or (4) ssh2.sftp URL, in the pilih parameter, for which PHP remote file inclusion is blocked only for http URLs.
[ "cpe:2.3:a:auracms:auracms:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:auracms:auracms:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:auracms:auracms:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:auracms:auracms:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:auracms:auracms:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:auracms:auracms:1.6_beta:*:*:*:*:*:*:*", "cpe:2.3:a:auracms:auracms:1.61:*:*:*:*:*:*:*", "cpe:2.3:a:auracms:auracms:1.62:*:*:*:*:*:*:*", "cpe:2.3:a:auracms:auracms:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:auracms:auracms:2.1:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
GHSA-m6m9-gr85-79vm
Pimcore Cross-site Scripting (XSS) in name field of Custom Reports
ImpactThis vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites.PatchesUpdate to version 10.5.21 or apply this patch manually: https://github.com/pimcore/pimcore/commit/c36ef54ce33f7b5e74b7b0ab9eabfed47c018fc7.patchWorkaroundsApply patches manually: https://github.com/pimcore/pimcore/commit/c36ef54ce33f7b5e74b7b0ab9eabfed47c018fc7.patchReferenceshttps://huntr.dev/bounties/1a5e6c65-2c5e-4617-9411-5b47a7e743a6/
[]
null
null
null
null
null
CVE-2017-12236
A vulnerability in the implementation of the Locator/ID Separation Protocol (LISP) in Cisco IOS XE 3.2 through 16.5 could allow an unauthenticated, remote attacker using an x tunnel router to bypass authentication checks performed when registering an Endpoint Identifier (EID) to a Routing Locator (RLOC) in the map server/map resolver (MS/MR). The vulnerability is due to a logic error introduced via a code regression for the affected software. An attacker could exploit this vulnerability by sending specific valid map-registration requests, which will be accepted by the MS/MR even if the authentication keys do not match, to the affected software. A successful exploit could allow the attacker to inject invalid mappings of EIDs to RLOCs in the MS/MR of the affected software. This vulnerability affects Cisco devices that are configured with LISP acting as an IPv4 or IPv6 map server. This vulnerability affects Cisco IOS XE Software release trains 3.9E and Everest 16.4. Cisco Bug IDs: CSCvc18008.
[ "cpe:2.3:o:cisco:ios_xe:3.2.0ja:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.5.1c:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
CVE-2016-4717
The File Bookmark component in Apple OS X before 10.12 mishandles scoped-bookmark file descriptors, which allows attackers to cause a denial of service via a crafted app.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
null
3.3
5
null
CVE-2024-48579
SQL Injection vulnerability in Best House rental management system project in php v.1.0 allows a remote attacker to execute arbitrary code via the username parameter of the login request.
[ "cpe:2.3:a:php:best_house_rental_management_system:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-xp6r-5ghh-6w2m
Directory traversal vulnerability in editconfig_gedcom.php for phpGedView 2.65.1 and earlier allows remote attackers to read arbitrary files or execute arbitrary PHP programs on the server via .. (dot dot) sequences in the gedcom_config parameter.
[]
null
null
null
null
null
GHSA-92pp-5g9w-8mgr
CSV Injection vulnerability in Sesami Cash Point & Transport Optimizer (CPTO) version 6.3.8.6 (#718), allows remote attackers to obtain sensitive information via the Delivery Name field.
[]
null
7.5
null
null
null
GHSA-hj9w-rhc7-6m8g
An issue was discovered in Adobe Experience Manager 6.3, 6.2, 6.1, 6.0. Sensitive tokens are included in http GET requests under certain circumstances.
[]
null
null
7.5
null
null
GHSA-fm7m-qq3h-62vp
Readymade PHP Classified Script 3.3 has SQL Injection via the /categories subctid or mctid parameter.
[]
null
null
9.8
null
null
GHSA-9jg7-rcr6-x7vx
Avahi before 0.6.10 allows local users to cause a denial of service (mDNS/DNS-SD service disconnect) via unspecified mDNS name conflicts.
[]
null
null
null
null
null
CVE-2013-0870
The 'vp3_decode_frame' function in FFmpeg 1.1.4 moves threads check out of header packet type check.
[ "cpe:2.3:a:ffmpeg:ffmpeg:1.1.4:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
RHSA-2023:4520
Red Hat Security Advisory: python-requests security update
python-requests: Unintended leak of Proxy-Authorization header
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.1
null
null
null
GHSA-hxvh-x39f-f92f
Multiple heap-based buffer overflows in the ApiThread function in the firewall service (aka TmPfw.exe) in Trend Micro Network Security Component (NSC) modules, as used in Trend Micro OfficeScan 8.0 SP1 Patch 1 and Internet Security 2007 and 2008 17.0.1224, allow remote attackers to execute arbitrary code via a packet with a small value in an unspecified size field.
[]
null
null
null
null
null
CVE-2022-43162
Online Diagnostic Lab Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /tests/view_test.php.
[ "cpe:2.3:a:online_diagnostic_lab_management_system_project:online_diagnostic_lab_management_system:1.0:*:*:*:*:*:*:*" ]
null
7.2
null
null
null