id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
listlengths
0
5.42k
CVE-2015-3071
Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allow attackers to bypass intended restrictions on JavaScript API execution via unspecified vectors, a different vulnerability than CVE-2015-3060, CVE-2015-3061, CVE-2015-3062, CVE-2015-3063, CVE-2015-3064, CVE-2015-3065, CVE-2015-3066, CVE-2015-3067, CVE-2015-3068, CVE-2015-3069, CVE-2015-3072, CVE-2015-3073, and CVE-2015-3074.
[ "cpe:2.3:a:adobe:acrobat_reader:10.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.10:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.10:*:*:*:*:*:*:*" ]
GHSA-h8pv-pv44-xcvw
An issue was discovered in Joomla! 2.5.0 through 3.9.22. A missing token check in the emailexport feature of com_privacy causes a CSRF vulnerability.
[]
GHSA-548m-r79g-5vj5
Multiple SQL injection vulnerabilities in Digital Hive 2.0 RC2 and earlier allow (1) remote attackers to execute arbitrary SQL commands via the selectskin parameter to an unspecified program, or (2) remote authenticated administrators to execute arbitrary SQL commands via the user_id parameter in the gestion_membre.php page to base.php.
[]
GHSA-gh3p-vvjc-82ww
Unspecified vulnerability in Gretech GOM Media Player before 2.1.37.5091 allows remote attackers to execute arbitrary code via a crafted AVI file.
[]
GHSA-jc9x-wh9f-2xf3
BMC Track-It! GetData Missing Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of BMC Track-It!. Authentication is required to exploit this vulnerability.The specific flaw exists within the GetData endpoint. The issue results from the lack of authorization prior to allowing access to functionality. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-14527.
[]
CVE-2023-27043
The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.
[ "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*" ]
GHSA-6762-g9pm-7488
Improper conditions check in BIOS firmware for 8th Generation Intel(R) Core(TM) Processors and Intel(R) Pentium(R) Silver Processor Series may allow an authenticated user to potentially enable information disclosure via local access.
[]
CVE-2005-0642
SQL injection vulnerability in the Query Designer for Computer Associates (CA) Unicenter Asset Management (UAM) 4.0 allows remote attackers to execute arbitrary SQL via an imported file.
[ "cpe:2.3:a:broadcom:unicenter_asset_management:4.0:*:*:*:*:*:*:*" ]
CVE-2014-10022
Apache Traffic Server before 5.1.2 allows remote attackers to cause a denial of service via unspecified vectors, related to internal buffer sizing.
[ "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*" ]
GHSA-v9c8-3f25-7jp2
XnView Classic for Windows Version 2.40 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to a "User Mode Write AV starting at ntdll_77400000!RtlFillMemoryUlong+0x0000000000000010."
[]
GHSA-gvqq-xg2j-r2p6
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.16. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. Note: This vulnerability applies to Windows hosts only. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
[]
CVE-2007-1018
PHP remote file inclusion vulnerability in tpl/header.php in VirtualSystem VS-News-System 1.2.1 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the newsordner parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:virtualsystem:vs-news-system:*:*:*:*:*:*:*:*" ]
GHSA-454x-wfc9-v689
Microsoft Excel in Office 2000 SP3, Office XP SP3, Office 2003 SP2, and Office 2004 for Mac allows remote attackers to execute arbitrary code via a Workspace with a certain index value that triggers memory corruption.
[]
GHSA-m5pr-wj64-pvm2
Multiple cross-site scripting (XSS) vulnerabilities in bsi.dll in Bank Soft Systems (BSS) RBS BS-Client. Private Client (aka RBS BS-Client. Retail Client) 2.5, 2.4, and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) DICTIONARY, (2) FILTERIDENT, (3) FROMSCHEME, (4) FromPoint, or (5) FName_0 parameter and a valid sid parameter value.
[]
CVE-2005-4076
Buffer overflow in Appfluent Technology Database IDS 2.0 allows local users to execute arbitrary code via a long APPFLUENT_HOME environment variable.
[ "cpe:2.3:a:appfluent_technology:database_ids:2.0:*:*:*:*:*:*:*" ]
CVE-2018-4955
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2006-3845
Stack-based buffer overflow in lzh.fmt in WinRAR 3.00 through 3.60 beta 6 allows remote attackers to execute arbitrary code via a long filename in a LHA archive.
[ "cpe:2.3:a:rarlab:winrar:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:rarlab:winrar:3.10:*:*:*:*:*:*:*", "cpe:2.3:a:rarlab:winrar:3.10_beta3:*:*:*:*:*:*:*", "cpe:2.3:a:rarlab:winrar:3.10_beta5:*:*:*:*:*:*:*", "cpe:2.3:a:rarlab:winrar:3.11:*:*:*:*:*:*:*", "cpe:2.3:a:rarlab:winrar:3.20:*:*:*:*:*:*:*", "cpe:2.3:a:rarlab:winrar:3.30:*:*:*:*:*:*:*", "cpe:2.3:a:rarlab:winrar:3.40:*:*:*:*:*:*:*", "cpe:2.3:a:rarlab:winrar:3.41:*:*:*:*:*:*:*", "cpe:2.3:a:rarlab:winrar:3.42:*:*:*:*:*:*:*", "cpe:2.3:a:rarlab:winrar:3.50:*:*:*:*:*:*:*", "cpe:2.3:a:rarlab:winrar:3.51:*:*:*:*:*:*:*", "cpe:2.3:a:rarlab:winrar:3.60_beta1:*:*:*:*:*:*:*", "cpe:2.3:a:rarlab:winrar:3.60_beta2:*:*:*:*:*:*:*", "cpe:2.3:a:rarlab:winrar:3.60_beta3:*:*:*:*:*:*:*", "cpe:2.3:a:rarlab:winrar:3.60_beta4:*:*:*:*:*:*:*", "cpe:2.3:a:rarlab:winrar:3.60_beta5:*:*:*:*:*:*:*", "cpe:2.3:a:rarlab:winrar:3.60_beta6:*:*:*:*:*:*:*" ]
GHSA-hqqv-9x3v-mp7w
Privilege Escalation Flaw in Elasticsearch
The fix for CVE-2020-7009 was found to be incomplete. Elasticsearch versions from 6.7.0 to 6.8.7 and 7.0.0 to 7.6.1 contain a privilege escalation flaw if an attacker is able to create API keys and also authentication tokens. An attacker who is able to generate an API key and an authentication token can perform a series of steps that result in an authentication token being generated with elevated privileges.
[]
CVE-2025-32397
An Heap-based Buffer Overflow in RT-Labs P-Net version 1.0.1 or earlier allows an attacker to induce a crash in IO devices that use the library by sending a malicious RPC packet.
[]
CVE-2021-33478
The TrustZone implementation in certain Broadcom MediaxChange firmware could allow an unauthenticated, physically proximate attacker to achieve arbitrary code execution in the TrustZone Trusted Execution Environment (TEE) of an affected device. This, for example, affects certain Cisco IP Phone and Wireless IP Phone products before 2021-07-07. Exploitation is possible only when the attacker can disassemble the device in order to control the voltage/current for chip pins.
[ "cpe:2.3:o:cisco:ip_phone_8800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8800_series_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8811_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8841_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8845_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8851_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8865_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_ip_phone_8821_firmware:*:*:*:*:*:*:*:*" ]
GHSA-v729-w778-vqwm
A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiPortal versions 7.2.4 through 7.2.0 and 7.0.0 through 7.2.8 may allow an authenticated attacker to view the SQL query being run server-side when submitting an HTTP request, via including special elements in said request.
[]
GHSA-fpv5-p692-m85v
Flatnuke 3 (aka FlatnuX) allows remote attackers to obtain administrative access via a myforum%00 cookie.
[]
CVE-2023-23448
Inclusion of Sensitive Information in Source Code in SICK FTMg AIR FLOW SENSOR with Partnumbers 1100214, 1100215, 1100216, 1120114, 1120116, 1122524, 1122526 allows a remote attacker to gain information about valid usernames via analysis of source code.
[ "cpe:2.3:o:sick:ftmg-esd20axx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:sick:ftmg-esd20axx:-:*:*:*:*:*:*:*", "cpe:2.3:o:sick:ftmg-esd25axx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:sick:ftmg-esd25axx:-:*:*:*:*:*:*:*", "cpe:2.3:o:sick:ftmg-esn40sxx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:sick:ftmg-esn40sxx:-:*:*:*:*:*:*:*", "cpe:2.3:o:sick:ftmg-esn50sxx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:sick:ftmg-esn50sxx:-:*:*:*:*:*:*:*", "cpe:2.3:o:sick:ftmg-esr50sxx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:sick:ftmg-esr50sxx:-:*:*:*:*:*:*:*", "cpe:2.3:o:sick:ftmg-esr40sxx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:sick:ftmg-esr40sxx:-:*:*:*:*:*:*:*", "cpe:2.3:o:sick:ftmg-esd15axx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:sick:ftmg-esd15axx:-:*:*:*:*:*:*:*" ]
GHSA-v8p8-xv2m-j2mw
Vulnerability in the Oracle Solaris component of Oracle Sun Systems Products Suite (subcomponent: Common Desktop Environment). The supported version that is affected is 10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
[]
GHSA-h369-f67q-2q4c
libpoppler.so in Poppler through 24.12.0 has an out-of-bounds read vulnerability within the JBIG2Bitmap::combine function in JBIG2Stream.cc.
[]
GHSA-9fwj-4m6v-3gj8
JetBrains TeamCity before 2021.2.3 was vulnerable to OS command injection in the Agent Push feature configuration.
[]
CVE-2024-1811
OpenText ArcSight Platform Remote Vulnerability
A potential vulnerability has been identified in OpenText ArcSight Platform. The vulnerability could be remotely exploited.
[ "cpe:2.3:a:opentext:arcsight_platform:*:*:*:*:*:*:*:*" ]
CVE-2003-0719
Buffer overflow in the Private Communications Transport (PCT) protocol implementation in the Microsoft SSL library, as used in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via PCT 1.0 handshake packets.
[ "cpe:2.3:a:microsoft:netmeeting:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*" ]
CVE-2014-6879
The Equifax Mobile (aka com.equifax) application 1.5 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:equifax:equifax_mobile:1.5:*:*:*:*:android:*:*" ]
GHSA-hcrr-5fhg-v2r7
Host Header Injection vulnerability in the HCL BigFix OSD Bare Metal Server version 311.12 or lower allows attacker to supply invalid input to cause the OSD Bare Metal Server to perform a redirect to an attacker-controlled domain.
[]
CVE-2020-36505
Delete All Comments Easily <= 1.3 - All Comments Deletion via CSRF
The Delete All Comments Easily WordPress plugin through 1.3 is lacking Cross-Site Request Forgery (CSRF) checks, which could result in an unauthenticated attacker making a logged in admin delete all comments from the blog.
[ "cpe:2.3:a:delete_all_comments_easily_project:delete_all_comments_easily:*:*:*:*:*:wordpress:*:*" ]
CVE-2021-37082
There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to motionhub crash.
[ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ]
CVE-2004-0675
Cross-site scripting (XSS) vulnerability in (1) cart32.exe or (2) c32web.exe in Cart32 shopping cart allows remote attackers to execute arbitrary web script via the cart32 parameter to a GetLatestBuilds command.
[ "cpe:2.3:a:mcmurtrey_whitaker_and_associates:cart32:2.5a:*:*:*:*:*:*:*", "cpe:2.3:a:mcmurtrey_whitaker_and_associates:cart32:2.6:*:*:*:*:*:*:*", "cpe:2.3:a:mcmurtrey_whitaker_and_associates:cart32:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mcmurtrey_whitaker_and_associates:cart32:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:mcmurtrey_whitaker_and_associates:cart32:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:mcmurtrey_whitaker_and_associates:cart32:3.5_build619:*:*:*:*:*:*:*", "cpe:2.3:a:mcmurtrey_whitaker_and_associates:cart32:3.5a:*:*:*:*:*:*:*", "cpe:2.3:a:mcmurtrey_whitaker_and_associates:cart32:3.5a_build710:*:*:*:*:*:*:*", "cpe:2.3:a:mcmurtrey_whitaker_and_associates:cart32:4.4:*:*:*:*:*:*:*", "cpe:2.3:a:mcmurtrey_whitaker_and_associates:cart32:5.0:*:*:*:*:*:*:*" ]
GHSA-42f2-88r2-4qhq
Integer overflow in the fread function in ext/standard/file.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large integer in the second argument.
[]
CVE-2014-4263
Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5, and JRockit R27.8.2 and R28.3.2, allows remote attackers to affect confidentiality and integrity via unknown vectors related to "Diffie-Hellman key agreement."
[ "cpe:2.3:a:oracle:jrockit:r27.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jrockit:r28.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update65:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update75:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update60:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update65:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update75:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update60:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.8.0:update5:*:*:*:*:*:*" ]
GHSA-vhpx-94rf-79c2
Magnolia CMS before 4.5.9 has multiple access bypass vulnerabilities
[]
CVE-2024-24014
A SQL injection vulnerability exists in Novel-Plus v4.3.0-RC1 and prior versions. An attacker can pass crafted offset, limit, and sort parameters to perform SQL injection via /novel/author/list
[ "cpe:2.3:a:xxyopen:novel-plus:*:*:*:*:*:*:*:*", "cpe:2.3:a:xxyopen:novel-plus:4.3.0:rc1:*:*:*:*:*:*" ]
CVE-2008-3555
Directory traversal vulnerability in index.php in (1) WSN Forum 4.1.43 and earlier, (2) Gallery 4.1.30 and earlier, (3) Knowledge Base (WSNKB) 4.1.36 and earlier, (4) Links 4.1.44 and earlier, and possibly (5) Classifieds before 4.1.30 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the TID parameter, as demonstrated by uploading a .jpg file containing PHP sequences.
[ "cpe:2.3:a:wsn:forum:*:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:gallery:*:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:knowledge_base:*:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.22:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.23:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.24:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.25:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.26:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.27:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.28:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.29:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.30:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.31:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.32:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.33:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.34:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.35:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.36:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.37:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.38:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.39:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.40:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.0.41:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.19:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.20:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.21:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.22:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.23:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.24:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.25:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.26:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.27:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.28:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.29:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.30:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.31:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.32:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.33:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.34:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.35:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.36:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.37:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.38:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.39:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.40:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.41:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.42:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.43:*:*:*:*:*:*:*", "cpe:2.3:a:wsn:links:4.1.44:*:*:*:*:*:*:*" ]
CVE-2018-3587
In a firmware memory dump feature in all Android releases from CAF using the Linux kernel (Android for MSM, Firefox OS for MSM, QRD Android), a Use After Free condition can occur.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
CVE-2020-5253
Privilege escalation in NetHack
NetHack before version 3.6.0 allowed malicious use of escaping of characters in the configuration file (usually .nethackrc) which could be exploited. This bug is patched in NetHack 3.6.0.
[ "cpe:2.3:a:nethack:nethack:*:*:*:*:*:*:*:*" ]
CVE-2024-4949
Use after free in V8 in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
[ "cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*" ]
CVE-2008-3180
Multiple cross-site scripting (XSS) vulnerabilities in upload/file/language_menu.php in ContentNow CMS 1.4.1 allow remote attackers to inject arbitrary web script or HTML via the (1) pageid parameter or (2) PATH_INFO.
[ "cpe:2.3:a:cwh_underground:contentnow_cms:1.4.1:*:*:*:*:*:*:*" ]
CVE-2015-5420
Unspecified vulnerability in HP KeyView before 10.23.0.1 and 10.24.x before 10.24.0.1 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-2880.
[ "cpe:2.3:a:hp:keyview:*:*:*:*:*:*:*:*" ]
CVE-2023-27938
An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in GarageBand for macOS 10.4.8. Parsing a maliciously crafted MIDI file may lead to an unexpected application termination or arbitrary code execution.
[ "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
GHSA-vh2w-j693-p426
The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem.
[]
CVE-2010-4854
SQL injection vulnerability in ajax/coupon.php in Zuitu 1.6, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the id parameter in a consume action.
[ "cpe:2.3:a:zuitu:zuitu:1.6:*:*:*:*:*:*:*" ]
CVE-2024-20790
Adobe Dimension Memory Corruption Out-of-Bounds-READ Vulnerability I, when parsing FBX file
Dimension versions 3.4.11 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*" ]
GHSA-p3jm-2hp8-qpgv
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in CRM Perks Contact Form Entries plugin <= 1.3.0 versions.
[]
GHSA-wp29-fg88-4r63
IBM Security Identity Governance and Intelligence 5.2.6 could allow an authenticated user to perform unauthorized commands due to hazardous input validation. IBM X-Force ID: 175335.
[]
CVE-2024-38635
soundwire: cadence: fix invalid PDI offset
In the Linux kernel, the following vulnerability has been resolved: soundwire: cadence: fix invalid PDI offset For some reason, we add an offset to the PDI, presumably to skip the PDI0 and PDI1 which are reserved for BPT. This code is however completely wrong and leads to an out-of-bounds access. We were just lucky so far since we used only a couple of PDIs and remained within the PDI array bounds. A Fixes: tag is not provided since there are no known platforms where the out-of-bounds would be accessed, and the initial code had problems as well. A follow-up patch completely removes this useless offset.
[]
CVE-2021-35221
ImportAlert Improper Access Control Tampering Vulnerability
Improper Access Control Tampering Vulnerability using ImportAlert function which can lead to a Remote Code Execution (RCE) from the Alerts Settings page.
[ "cpe:2.3:a:solarwinds:orion_platform:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
GHSA-3m35-gcc7-4v6r
Cross-site scripting (XSS) vulnerability in IBM Cognos Business Intelligence (BI) 8.4.1 before IF1, 10.1 before IF2, 10.1.1 before IF2, and 10.2 before IF1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
GHSA-3mv9-ggpf-rmx9
The SAM and LSAD protocol implementations in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 do not properly establish an RPC channel, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka "Windows SAM and LSAD Downgrade Vulnerability" or "BADLOCK."
[]
GHSA-8hf2-7cx6-vq27
A remote unauthenticated disclosure of information vulnerability in HPE Matrix Operating Environment version 7.6 LR1 was found.
[]
GHSA-cp56-rpr6-7673
An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.
[]
CVE-2018-5892
The Touch Pal application can collect user behavior data without awareness by the user in Snapdragon Mobile and Snapdragon Wear.
[ "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_427:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_435:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_high_med_2016_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_high_med_2016:-:*:*:*:*:*:*:*" ]
GHSA-pxj4-c79w-7wm3
A vulnerability classified as critical was found in DeShang DSMall up to 6.1.0. Affected by this vulnerability is an unknown functionality of the file application/home/controller/TaobaoExport.php of the component Image URL Handler. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250435.
[]
CVE-2020-35198
An issue was discovered in Wind River VxWorks 7. The memory allocator has a possible integer overflow in calculating a memory block's size to be allocated by calloc(). As a result, the actual memory allocated is smaller than the buffer size specified by the arguments, leading to memory corruption.
[ "cpe:2.3:o:windriver:vxworks:*:*:*:*:*:*:*:*", "cpe:2.3:o:windriver:vxworks:6.9.4.12:-:*:*:*:*:*:*", "cpe:2.3:o:windriver:vxworks:6.9.4.12:rolling_cumulative_patch_layer1:*:*:*:*:*:*", "cpe:2.3:o:windriver:vxworks:6.9.4.12:rolling_cumulative_patch_layer2:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_eagle:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_eagle:46.7.0:*:*:*:*:*:*:*" ]
CVE-2017-12105
An exploitable integer overflow exists in the way that the Blender open-source 3d creation suite v2.78c applies a particular object modifier to a Mesh. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use the file as a library in order to trigger this vulnerability.
[ "cpe:2.3:a:blender:blender:2.78c:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
CVE-2022-34133
Benjamin BALET Jorani v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Comment parameter at application/controllers/Leaves.php.
[ "cpe:2.3:a:jorani:jorani:1.0.0:*:*:*:*:*:*:*" ]
GHSA-wc99-j389-7h87
Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
[]
GHSA-34mx-7qhf-2323
In the Linux kernel, the following vulnerability has been resolved:ASoC: mt6359: Fix refcount leak bugIn mt6359_parse_dt() and mt6359_accdet_parse_dt(), we should call of_node_put() for the reference returned by of_get_child_by_name() which has increased the refcount.
[]
GHSA-23v9-8jvm-jh7q
The Visual Link Preview WordPress plugin before 2.2.3 does not enforce authorisation on several AJAX actions and has the CSRF nonce displayed for all authenticated users, allowing any authenticated user (such as subscriber) to call them and 1) Get and search through title and content of Draft post, 2) Get title of a password-protected post as well as 3) Upload an image from an URL
[]
CVE-2018-11828
When FW tries to get random mac address generated from new SW RNG and ADC values read are constant then DUT get struck in loop while trying to get random ADC samples in Snapdragon Mobile in version SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 650/52
[ "cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*" ]
GHSA-c947-vcqx-5wf7
BigFix Patch Download Plug-ins are affected by an insecure package which is susceptible to XML injection attacks. This allows an attacker to exploit this vulnerability by injecting malicious XML content, which can lead to various issues including denial of service and unauthorized access.
[]
CVE-2015-1697
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted Journal file, aka "Windows Journal Remote Code Execution Vulnerability," a different vulnerability than CVE-2015-1675, CVE-2015-1695, CVE-2015-1696, CVE-2015-1698, and CVE-2015-1699.
[ "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*" ]
GHSA-hvq9-frhw-562q
SQL injection vulnerability in events.php in WorkingOnWeb 2.0.1400 allows remote attackers to execute arbitrary SQL commands via the idevent parameter.
[]
GHSA-h4w3-ffw8-rr28
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound EELV Newsletter allows Reflected XSS. This issue affects EELV Newsletter: from n/a through 4.8.2.
[]
CVE-2021-2330
Vulnerability in the Core RDBMS component of Oracle Database Server. The supported version that is affected is 19c. Easily exploitable vulnerability allows low privileged attacker having Create Table privilege with network access via Oracle Net to compromise Core RDBMS. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Core RDBMS. CVSS 3.1 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).
[ "cpe:2.3:a:oracle:core_rdbms:19c:*:*:*:*:*:*:*" ]
CVE-2023-31466
An XSS issue was discovered in FSMLabs TimeKeeper 8.0.17. On the "Configuration -> Compliance -> Add a new compliance report" and "Configuration -> Timekeeper Configuration -> Add a new source there" screens, there are entry points to inject JavaScript code.
[ "cpe:2.3:a:fsmlabs:timekeeper:*:*:*:*:*:*:*:*" ]
CVE-2024-2505
GamiPress < 6.8.9 - Broken Access Control
The GamiPress WordPress plugin before 6.8.9's access control mechanism fails to properly restrict access to its settings, permitting Authors to manipulate requests and extend access to lower privileged users, like Subscribers, despite initial settings prohibiting such access. This vulnerability resembles broken access control, enabling unauthorized users to modify critical GamiPress WordPress plugin before 6.8.9 configurations.
[ "cpe:2.3:a:gamipress:gamipress:-:*:*:*:*:wordpress:*:*" ]
CVE-2025-42985
Open Redirect vulnerability in SAP BusinessObjects Content Administrator workbench
Due to insufficient sanitization in the SAP BusinessObjects Content Administrator Workbench, attackers could craft malicious URLs and execute scripts in a victim�s browser. This could potentially lead to the exposure or modification of web client data, resulting in low impact on confidentiality and integrity, with no impact on application availability.
[]
GHSA-699c-4r4c-vcqv
The verizon (aka com.wverizonwirelessbill) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
CVE-2024-21598
Junos OS and Junos OS Evolved: A malformed BGP tunnel encapsulation attribute will lead to an rpd crash
An Improper Validation of Syntactic Correctness of Input vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). If a BGP update is received over an established BGP session which contains a tunnel encapsulation attribute with a specifically malformed TLV, rpd will crash and restart. This issue affects Juniper Networks Junos OS: * 20.4 versions 20.4R1 and later versions earlier than 20.4R3-S9; * 21.2 versions earlier than 21.2R3-S7; * 21.3 versions earlier than 21.3R3-S5; * 21.4 versions earlier than 21.4R3-S5; * 22.1 versions earlier than 22.1R3-S4; * 22.2 versions earlier than 22.2R3-S3; * 22.3 versions earlier than 22.3R3-S1; * 22.4 versions earlier than 22.4R3; * 23.2 versions earlier than 23.2R1-S2, 23.2R2; Junos OS Evolved: * 20.4-EVO versions 20.4R1-EVO and later versions earlier than 20.4R3-S9-EVO; * 21.2-EVO versions earlier than 21.2R3-S7-EVO; * 21.3-EVO versions earlier than 21.3R3-S5-EVO; * 21.4-EVO versions earlier than 21.4R3-S5-EVO; * 22.1-EVO versions earlier than 22.1R3-S4-EVO; * 22.2-EVO versions earlier than 22.2R3-S3-EVO; * 22.3-EVO versions earlier than 22.3R3-S1-EVO; * 22.4-EVO versions earlier than 22.4R3-EVO; * 23.2-EVO versions earlier than 23.2R1-S2-EVO, 23.2R2-EVO; This issue does not affect Juniper Networks * Junos OS versions earlier than 20.4R1; * Junos OS Evolved versions earlier than 20.4R1-EVO. This is a related but separate issue than the one described in JSA79095.
[ "cpe:2.3:o:juniper_networks:junos_os:20.4:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:22.3:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:22.4:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:23.2:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.3:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:22.1:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:22.2:-:*:*:*:*:*:*" ]
CVE-2000-0173
Vulnerability in the EELS system in SCO UnixWare 7.1.x allows remote attackers to cause a denial of service.
[ "cpe:2.3:o:sco:unixware:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:sco:unixware:7.1.1:*:*:*:*:*:*:*" ]
GHSA-pxgg-fcwc-pc9f
Due to incorrect string termination, Squid cachemgr.cgi 4.0 through 4.7 may access unallocated memory. On systems with memory access protections, this can cause the CGI process to terminate unexpectedly, resulting in a denial of service for all clients using it.
[]
CVE-2015-1003
Directory traversal vulnerability in IniNet embeddedWebServer (aka eWebServer) before 2.02 allows remote attackers to read arbitrary files via a crafted pathname.
[ "cpe:2.3:a:ininet_solutions:scada_web_server:-:*:*:*:*:*:*:*" ]
CVE-2024-36623
moby through v25.0.3 has a Race Condition vulnerability in the streamformatter package which can be used to trigger multiple concurrent write operations resulting in data corruption or application crashes.
[]
CVE-2025-20175
A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition.&nbsp; This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system.
[]
GHSA-3mcr-5hjh-5f4c
Heap-based buffer overflow in Apple QuickTime on Mac OS 10.2.8 through 10.3.5 may allow remote attackers to execute arbitrary code via a certain BMP image.
[]
GHSA-23px-mw2p-46qm
Cosmos-SDK Cosmovisor component may be vulnerable to denial of service
**Component**: Cosmovisor **Criticality**: Medium **Affected Versions**: Cosmovisor < v1.0.0 (distributed with Cosmos-SDK < 0.46) **Affected Users**: Validators and Node operators utilizing unsupported versions of Cosmovisor **Impact**: DOS, potential RCE on node depending on configurationAn issue has been identified on unsupported versions of Cosmovisor which may result in a Denial of Service or Remote Code Execution path depending on configuration for a node or validator using the vulnerable version to manage their node.If a validator is utilizing an affected version of Cosmovisor with `DAEMON_ALLOW_DOWNLOAD_BINARIES` set to true, a non-default configuration, it may be possible for an attacker to trigger a Remote Code Execution path as well on the host. In this configuration it is recommended to immediately stop use of the `DAEMON_ALLOW_DOWNLOAD_BINARIES` feature, and then proceed with an upgrade of Cosmovisor.It is recommended that all validators utilizing unsupported versions of Cosmovisor to upgrade to the latest supported versions immediately. If you are utilizing a forked version of Cosmos-SDK, it is recommended to stop use of Cosmovisor until it is possible to update to a supported version of Cosmovisor, whether through your project’s fork, or directly compiled from the Cosmos-SDK. At the time of this advisory, the latest version of Cosmovisor is v1.5.0.Additionally, the Amulet team recommends that developers building chains powered by Cosmos-SDK share this advisory with validators and node operators to ensure this information is available to all impacted parties within their ecosystems.For more information about Cosmovisor, see https://docs.cosmos.network/main/tooling/cosmovisorThis issue was discovered by [Maxwell Dulin](https://maxwelldulin.com) and Nathan Kirkland, who reported it to the Cosmos Bug Bounty Program. If you believe you have found a bug in the Interchain Stack or would like to contribute to the program by reporting a bug, please see [https://hackerone.com/cosmos](https://hackerone.com/cosmos).How to tell if I am affected?Running the following command will output whether your cosmovisor version is vulnerable to this issue or not.Vulnerable to this issue:NOT vulnerable to this issue:A Note from Amulet on the Security Advisory ProcessIn the interest of timely resolution of this issue for validators and node operators, the Amulet team has chosen to use existing processes and resources for distributing security advisories within the Cosmos and Interchain Ecosystems. Stay tuned as we implement an improved, more robust security advisory distribution system that will provide equitable access to information about security issues in the Interchain Stack.
[]
CVE-2021-1307
Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution and Denial of Service Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.
[ "cpe:2.3:o:cisco:rv110w_firmware:1.0.3.55:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv110w:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv130_firmware:1.0.3.55:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv130:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv130w_firmware:1.0.3.55:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv130w:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv215w_firmware:1.0.3.55:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv215w:-:*:*:*:*:*:*:*" ]
CVE-2022-24620
Piwigo version 12.2.0 is vulnerable to stored cross-site scripting (XSS), which can lead to privilege escalation. In this way, admin can steal webmaster's cookies to get the webmaster's access.
[ "cpe:2.3:a:piwigo:piwigo:12.2.0:*:*:*:*:*:*:*" ]
GHSA-v34r-vj4r-38j6
Updatecli exposes Maven credentials in console output
SummaryPrivate maven repository credentials leaked in application logs in case of unsuccessful retrieval operation.DetailsDuring the execution of an updatecli pipeline which contains a `maven` source configured with basic auth credentials, the credentials are being leaked in the application execution logs in case of failure.Credentials are properly sanitized when the operation is successful but not when for whatever reason there is a failure in the maven repository .e.g. wrong coordinates provided, not existing artifact or version.PoCThe [documentation](https://www.updatecli.io/docs/plugins/resource/maven/) currently state to provide user credentials as basic auth inside the `repository` field. e.g.Logs are sanitized properly in case of a successful operation:but leaks credentials in case the GAV coordinates are wrong (misspelled package name or missing):ImpactUser credentials/token used to authenticate against a private maven repository can be leaked in clear-text in console or CI logs.
[]
CVE-2021-24967
Contact Form & Lead Form Elementor Builder < 1.6.4 - Unauthenticated Stored Cross-Site Scripting
The Contact Form & Lead Form Elementor Builder WordPress plugin before 1.6.4 does not sanitise and escape some lead values, which could allow unauthenticated users to perform Cross-Site Scripting attacks against logged in admin viewing the inserted Leads
[ "cpe:2.3:a:themehunk:contact_form_\\&_lead_form_elementor_builder:*:*:*:*:*:wordpress:*:*" ]
CVE-2023-24217
AgileBio Electronic Lab Notebook v4.234 was discovered to contain a local file inclusion vulnerability.
[ "cpe:2.3:a:agilebio:electronic_lab_notebook:4.234:*:*:*:*:*:*:*" ]
GHSA-r6j9-rwx4-qcj3
Kaseya VSA through 9.5.7 allows attackers to bypass the 2FA requirement.
[]
CVE-2017-14031
An Improper Access Control issue was discovered in Trihedral VTScada 11.3.03 and prior. A local, non-administrator user has privileges to read and write to the file system of the target machine.
[ "cpe:2.3:a:trihedral:vtscada:*:*:*:*:*:*:*:*" ]
CVE-2023-28627
OS Command Injection via GIT_PATH in pymedusa
pymedusa is an automatic video library manager for TV Shows. In versions prior 1.0.12 an attacker with access to the web interface can update the git executable path in /config/general/ > advanced settings with arbitrary OS commands. An attacker may exploit this vulnerability to take execute arbitrary OS commands as the user running the pymedusa program. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ "cpe:2.3:a:pymedusa:medusa:*:*:*:*:*:*:*:*" ]
CVE-2019-14923
EyesOfNetwork 5.1 allows Remote Command Execution via shell metacharacters in the module/tool_all/ host field.
[ "cpe:2.3:a:eyesofnetwork:eyesofnetwork:5.1-0:*:*:*:*:*:*:*" ]
GHSA-v6vg-vx8q-9jc8
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
[]
GHSA-m5jm-xq2c-v8cc
GNUBOARD5 5.3.1.9 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "board title contents" parameter, aka the adm/board_form_update.php bo_subject parameter.
[]
GHSA-mrg6-2353-5hvq
Server communication with a controller can lead to remote code execution using a specially crafted message from the controller. See Honeywell Security Notification for recommendations on upgrading and versioning.
[]
CVE-2006-2633
Absolute path traversal vulnerability in the copy action in index.php in Andrew Godwin ByteHoard 2.1 and earlier allows remote authenticated users to create or overwrite files in other users' directories by specifying the absolute path of the directory in the infolder parameter and simultaneously specifying the filename in the filepath parameter.
[ "cpe:2.3:a:andrew_godwin:bytehoard:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:andrew_godwin:bytehoard:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:andrew_godwin:bytehoard:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:andrew_godwin:bytehoard:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:andrew_godwin:bytehoard:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:andrew_godwin:bytehoard:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:andrew_godwin:bytehoard:2.0_beta1:*:*:*:*:*:*:*", "cpe:2.3:a:andrew_godwin:bytehoard:2.0_beta2:*:*:*:*:*:*:*", "cpe:2.3:a:andrew_godwin:bytehoard:2.1_alpha:*:*:*:*:*:*:*", "cpe:2.3:a:andrew_godwin:bytehoard:2.1_beta:*:*:*:*:*:*:*", "cpe:2.3:a:andrew_godwin:bytehoard:2.1_delta:*:*:*:*:*:*:*", "cpe:2.3:a:andrew_godwin:bytehoard:2.1_gamma:*:*:*:*:*:*:*" ]
CVE-2003-0531
Internet Explorer 5.01 SP3 through 6.0 SP1 allows remote attackers to access and execute script in the My Computer domain using the browser cache via crafted Content-Type and Content-Disposition headers, aka the "Browser Cache Script Execution in My Computer Zone" vulnerability.
[ "cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.5:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.5:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*" ]
CVE-2018-1553
IBM WebSphere Application Server Liberty prior to 18.0.0.2 could allow a remote attacker to obtain sensitive information, caused by mishandling of exceptions by the SAML Web SSO feature. IBM X-Force ID: 142890.
[ "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:liberty:*:*:*" ]
CVE-2023-47617
A post authentication command injection vulnerability exists when configuring the web group member of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
[ "cpe:2.3:o:tp-link:er7206_firmware:1.3.0:build_20230322_rel_70591:*:*:*:*:*:*", "cpe:2.3:h:tp-link:er7206:-:*:*:*:*:*:*:*" ]
GHSA-4q83-43xw-q63j
In Universal Forwarder for Windows versions below 9.4.2, 9.3.4, 9.2.6, and 9.1.9, a new installation of or an upgrade to an affected version can result in incorrect permissions assignment in the Universal Forwarder for Windows Installation directory (by default, C:\Program Files\SplunkUniversalForwarder). This lets non-administrator users on the machine access the directory and all its contents.
[]
CVE-2019-8392
An issue was discovered on D-Link DIR-823G devices with firmware 1.02B03. There is incorrect access control allowing remote attackers to enable Guest Wi-Fi via the SetWLanRadioSettings HNAP API to the web service provided by /bin/goahead.
[ "cpe:2.3:o:dlink:dir-823g_firmware:1.02b03:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-823g:-:*:*:*:*:*:*:*" ]
CVE-2024-34691
Missing Authorization check in SAP S/4HANA (Manage Incoming Payment Files)
Manage Incoming Payment Files (F1680) of SAP S/4HANA does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. As a result, it has high impact on integrity and no impact on the confidentiality and availability of the system.
[ "cpe:2.3:a:sap:s4hana:*:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s\\/4_hana:103:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s\\/4_hana:104:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s\\/4_hana:105:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s\\/4_hana:106:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s\\/4_hana:107:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s\\/4_hana:108:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s\\/4_hana:s4core_102:*:*:*:*:*:*:*" ]