id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-x6f4-gvp6-p33w
|
The AMP for WP – Accelerated Mobile Pages plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'amppb_remove_saved_layout_data' function in all versions up to, and including, 1.0.93.1. This makes it possible for authenticated attackers, with contributor access and above, to delete arbitrary posts on the site.
|
[] | null | 6.5 | null | null | null |
|
GHSA-fj4r-372v-jvm6
|
IBM Security Guardium Key Lifecycle Manager 3.0, 3.0.1, 4.0, 4.1, and 4.1.1 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 247597.
|
[] | null | 9.8 | null | null | null |
|
CVE-2013-7408
|
F5 BIG-IP Analytics 11.x before 11.4.0 uses a predictable session cookie, which makes it easier for remote attackers to have unspecified impact by guessing the value.
|
[
"cpe:2.3:a:f5:big-ip_analytics:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.3.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-8wcq-mc5g-xcxh
|
A reflected XSS vulnerability on Ruckus ICX7450-48 devices allows remote attackers to inject arbitrary web script or HTML.
|
[] | null | null | 6.1 | null | null |
|
GHSA-ww5r-g6pm-54rj
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Artbees SellKit allows Relative Path Traversal.This issue affects SellKit: from n/a through 1.8.1.
|
[] | null | 6.5 | null | null | null |
|
CVE-2006-0456
|
The strnlen_user function in Linux kernel before 2.6.16 on IBM S/390 can return an incorrect value, which allows local users to cause a denial of service via unknown vectors.
|
[
"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.3:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.3:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.3:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.4:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.4:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.4:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.5:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.5:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.5:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.6:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.6:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.7:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.7:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
GHSA-8gh3-6693-hwj4
|
In the Linux kernel, the following vulnerability has been resolved:smb: client: fix use-after-free in crypt_message when using async cryptoThe CVE-2024-50047 fix removed asynchronous crypto handling from
crypt_message(), assuming all crypto operations are synchronous.
However, when hardware crypto accelerators are used, this can cause
use-after-free crashes:crypt_message()
// Allocate the creq buffer containing the req
creq = smb2_get_aead_req(..., &req);Hardware crypto modules often implement async AEAD operations for
performance. When crypto_aead_encrypt/decrypt() returns -EINPROGRESS,
the operation completes asynchronously. Without crypto_wait_req(),
the function immediately frees the request buffer, leading to crashes
when the driver later accesses the freed memory.This results in a use-after-free condition when the hardware crypto
driver later accesses the freed request structure, leading to kernel
crashes with NULL pointer dereferences.The issue occurs because crypto_alloc_aead() with mask=0 doesn't
guarantee synchronous operation. Even without CRYPTO_ALG_ASYNC in
the mask, async implementations can be selected.Fix by restoring the async crypto handling:DECLARE_CRYPTO_WAIT(wait) for completion trackingaead_request_set_callback() for async completion notificationcrypto_wait_req() to wait for operation completionThis ensures the request buffer isn't freed until the crypto operation
completes, whether synchronous or asynchronous, while preserving the
CVE-2024-50047 fix.
|
[] | null | null | null | null | null |
|
GHSA-f8g7-fg99-vggp
|
Some telnet clients allow remote telnet servers to request environment variables from the client that may contain sensitive information, or remote web servers to obtain the information via a telnet: URL.
|
[] | null | null | null | null | null |
|
CVE-2014-9628
|
The MP4_ReadBox_String function in modules/demux/mp4/libmp4.c in VideoLAN VLC media player before 2.1.6 allows remote attackers to trigger an unintended zero-size malloc and conduct buffer overflow attacks, and consequently execute arbitrary code, via a box size of 7.
|
[
"cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
GHSA-6m4g-jhp3-f6r4
|
An incomplete filtering of one or more instances of special elements vulnerability [CWE-792] in the command line interpreter of FortiAP-W2 7.2.0 through 7.2.1, 7.0.3 through 7.0.5, 7.0.0 through 7.0.1, 6.4 all versions, 6.2 all versions, 6.0 all versions; FortiAP-C 5.4.0 through 5.4.4, 5.2 all versions; FortiAP 7.2.0 through 7.2.1, 7.0.0 through 7.0.5, 6.4 all versions, 6.0 all versions; FortiAP-U 7.0.0, 6.2.0 through 6.2.5, 6.0 all versions, 5.4 all versions may allow an authenticated attacker to read arbitrary files via specially crafted command arguments.
|
[] | null | 5.5 | null | null | null |
|
GHSA-jmx9-mphw-fm82
|
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0913, CVE-2020-1000, CVE-2020-1027.
|
[] | null | null | null | null | null |
|
CVE-2017-1000089
|
Builds in Jenkins are associated with an authentication that controls the permissions that the build has to interact with other elements in Jenkins. The Pipeline: Build Step Plugin did not check the build authentication it was running as and allowed triggering any other project in Jenkins.
|
[
"cpe:2.3:a:jenkins:pipeline\\:_build_step:*:*:*:*:*:jenkins:*:*"
] | null | null | 5.3 | 5 | null |
|
GHSA-px36-5x6h-5x8g
|
The "WPO365 | LOGIN" WordPress plugin (up to and including version 15.3) by wpo365.com is vulnerable to a persistent Cross-Site Scripting (XSS) vulnerability (also known as Stored or Second-Order XSS). Persistent XSS vulnerabilities occur when the application stores and retrieves client supplied data without proper handling of dangerous content. This type of XSS vulnerability is exploited by submitting malicious script content to the application which is then retrieved and executed by other application users. The attacker could exploit this to conduct a range of attacks against users of the affected application such as session hijacking, account take over and accessing sensitive data. In this case, the XSS payload can be submitted by any anonymous user, the payload then renders and executes when a WordPress administrator authenticates and accesses the WordPress Dashboard. The injected payload can carry out actions on behalf of the administrator including adding other administrative users and changing application settings. This flaw could be exploited to ultimately provide full control of the affected system to the attacker.
|
[] | null | null | null | null | null |
|
GHSA-8pqc-r2rx-5hhc
|
This issue was addressed by adding an additional prompt for user consent. This issue is fixed in macOS Sonoma 14.4. An app may be able to access user-sensitive data.
|
[] | null | 5.5 | null | null | null |
|
CVE-2022-32253
|
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.1). Due to improper input validation, the OpenSSL certificate's password could be printed to a file reachable by an attacker.
|
[
"cpe:2.3:a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:*"
] | null | 4.9 | null | null | null |
|
RHSA-2025:9327
|
Red Hat Security Advisory: libblockdev security update
|
libblockdev: LPE from allow_active to root in libblockdev via udisks
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7 | null | null | null |
CVE-2019-15272
|
Cisco Unified Communications Manager Security Bypass Vulnerability
|
A vulnerability in the web-based interface of Cisco Unified Communications Manager and Cisco Unified Communications Manager Session Management Edition (SME) could allow an unauthenticated, remote attacker to bypass security restrictions. The vulnerability is due to improper handling of malformed HTTP methods. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected system. A successful exploit could allow the attacker to gain unauthorized access to the system.
|
[
"cpe:2.3:a:cisco:unified_communications_manager:10.5\\(2.10000.5\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.10000.6\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:12.0\\(1.10000.10\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:12.5\\(1.10000.22\\):*:*:*:*:*:*:*"
] | null | null | 6.5 | null | null |
cisco-sa-20180221-esc
|
Cisco Elastic Services Controller Service Portal Authentication Bypass Vulnerability
|
A vulnerability in the authentication functionality of the web-based service portal of Cisco Elastic Services Controller Software could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrator privileges on an affected system.
The vulnerability is due to improper security restrictions that are imposed by the web-based service portal of the affected software. An attacker could exploit this vulnerability by submitting an empty password value to an affected portal when prompted to enter an administrative password for the portal. A successful exploit could allow the attacker to bypass authentication and gain administrator privileges for the web-based service portal of the affected software.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-esc ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-esc"]
|
[] | null | null | 9.8 | null | null |
GHSA-pqrm-m74p-4cj9
|
A vulnerability in the Cisco IOS XE Software REST API could allow an authenticated, remote attacker to bypass API authorization checks and use the API to perform privileged actions on an affected device. The vulnerability is due to insufficient authorization checks for requests that are sent to the REST API of the affected software. An attacker could exploit this vulnerability by sending a malicious request to an affected device via the REST API. A successful exploit could allow the attacker to selectively bypass authorization checks for the REST API of the affected software and use the API to perform privileged actions on an affected device. Cisco Bug IDs: CSCuz56428.
|
[] | null | null | 8.8 | null | null |
|
GHSA-9m8g-m8f5-r7v5
|
nappropriate authorization vulnerability in the SettingsProvider module.Successful exploitation of this vulnerability may cause features to perform abnormally.
|
[] | null | 7.5 | null | null | null |
|
CVE-2021-4007
|
Rapid7 Insight Agent Privilege Escalation
|
Rapid7 Insight Agent, versions 3.0.1 to 3.1.2.34, suffer from a local privilege escalation due to an uncontrolled DLL search path. Specifically, when Insight Agent versions 3.0.1 to 3.1.2.34 start, the Python interpreter attempts to load python3.dll at "C:\DLLs\python3.dll," which normally is writable by locally authenticated users. Because of this, a malicious local user could use Insight Agent's startup conditions to elevate to SYSTEM privileges. This issue was fixed in Rapid7 Insight Agent 3.1.2.35. This vulnerability is a regression of CVE-2019-5629.
|
[
"cpe:2.3:a:rapid7:insight_agent:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
CVE-2018-7453
|
Infinite recursion in AcroForm::scanField in AcroForm.cc in xpdf 4.00 allows attackers to launch denial of service via a specific pdf file due to lack of loop checking, as demonstrated by pdftohtml.
|
[
"cpe:2.3:a:xpdfreader:xpdf:4.00:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
GHSA-v8v5-48x9-6r8p
|
A vulnerability, which was classified as problematic, has been found in GNU Binutils 2.45. Affected by this issue is the function bfd_elf_set_group_contents of the file bfd/elf.c. The manipulation leads to out-of-bounds write. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The name of the patch is 41461010eb7c79fee7a9d5f6209accdaac66cc6b. It is recommended to apply a patch to fix this issue.
|
[] | 1.9 | 5.3 | null | null | null |
|
GHSA-2r7q-w9hc-4rq3
|
app\admin\controller\RouteController.php in ThinkCMF 5.0.190111 allows remote attackers to execute arbitrary PHP code by using vectors involving portal/List/index and list/:id to inject this code into data\conf\route.php, as demonstrated by a file_put_contents call.
|
[] | null | null | 9.8 | null | null |
|
CVE-2023-32542
|
Out-of-bounds read vulnerability exists in TELLUS v4.0.15.0 and TELLUS Lite v4.0.15.0. Opening a specially crafted V8 file may lead to information disclosure and/or arbitrary code execution.
|
[
"cpe:2.3:a:fujielectric:tellus:4.0.15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fujielectric:tellus_lite:4.0.15.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
CVE-2023-3165
|
SourceCodester Life Insurance Management System POST Parameter insertNominee.php cross site scripting
|
A vulnerability was found in SourceCodester Life Insurance Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file insertNominee.php of the component POST Parameter Handler. The manipulation of the argument nominee_id leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231109 was assigned to this vulnerability.
|
[
"cpe:2.3:a:life_insurance_management_system_project:life_insurance_management_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:janobe:life_insurance_management_system:1.0:*:*:*:*:*:*:*"
] | null | 3.5 | 3.5 | 4 | null |
CVE-2016-8488
|
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-31625756.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
GHSA-c7vm-2cp2-gh5g
|
** UNSUPPORTED WHEN ASSIGNED ** Reflected XSS in Web Compliance Manager in Quest Policy Authority version 8.1.2.200 allows attackers to inject malicious code into the browser via a specially crafted link to the cConn.jsp file via the ur parameter. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
[] | null | 6.1 | null | null | null |
|
CVE-2006-4338
|
unlzh.c in the LHZ component in gzip 1.3.5 allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted GZIP archive.
|
[
"cpe:2.3:a:gzip:gzip:1.3.5:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-jf6h-g8vv-jx4q
|
The Promontory chipset, as used in AMD Ryzen and Ryzen Pro platforms, has a backdoor in firmware, aka CHIMERA-FW.
|
[] | null | null | 9 | null | null |
|
CVE-2022-1808
|
Execution with Unnecessary Privileges in polonel/trudesk
|
Execution with Unnecessary Privileges in GitHub repository polonel/trudesk prior to 1.2.3.
|
[
"cpe:2.3:a:trudesk_project:trudesk:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | null | null |
GHSA-47rf-cwjx-w5r6
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pascal Bajorat PB oEmbed HTML5 Audio – with Cache Support allows Stored XSS.This issue affects PB oEmbed HTML5 Audio – with Cache Support: from n/a through 2.6.
|
[] | null | 6.5 | null | null | null |
|
RHSA-2002:181
|
Red Hat Security Advisory: mailman security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as"
] | null | null | null | null | null |
CVE-2024-38632
|
vfio/pci: fix potential memory leak in vfio_intx_enable()
|
In the Linux kernel, the following vulnerability has been resolved:
vfio/pci: fix potential memory leak in vfio_intx_enable()
If vfio_irq_ctx_alloc() failed will lead to 'name' memory leak.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
CVE-2023-22273
|
ZDI-CAN-21307: Adobe RoboHelp Server OnPublishFile Directory Traversal Remote Code Execution Vulnerability
|
Adobe RoboHelp Server versions 11.4 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could lead to Remote Code Execution by an admin authenticated attacker. Exploitation of this issue does not require user interaction.
|
[
"cpe:2.3:a:adobe:robohelp:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:robohelp_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
CVE-2022-2528
|
In affected versions of Octopus Deploy it is possible to upload a package to built-in feed with insufficient permissions after re-indexing packages.
|
[
"cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-6645-5w8p-3ww5
|
Cross-site scripting (XSS) vulnerability in inc_header.php in EJ3 TOPo 2.2.178 allows remote attackers to inject arbitrary web script or HTML via the gTopNombre parameter.
|
[] | null | null | null | null | null |
|
CVE-2023-26925
|
An information disclosure vulnerability exists in the Syslog functionality of D-LINK DIR-882 1.30. A specially crafted network request can lead to the disclosure of sensitive information.
|
[
"cpe:2.3:o:dlink:dir-882_firmware:1.30:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-882:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-3fv6-vw38-4m6q
|
A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit v4.4.0. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted TIFF file.
|
[] | null | 6.5 | null | null | null |
|
ICSMA-18-156-01
|
Philips' IntelliVue Patient and Avalon Fetal Monitors
|
The vulnerability allows an unauthenticated attacker to access memory (write-what-where) from an attacker-chosen device address within the same subnet.CVE-2018-10597 has been assigned to this vulnerability. A CVSS v3 base score of 8.3 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H). The vulnerability allows an unauthenticated attacker to read memory from an attacker-chosen device address within the same subnet.CVE-2018-10599 has been assigned to this vulnerability. A CVSS v3 base score of 6.4 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L). The vulnerability exposes an echo service, in which an attacker-sent buffer to an attacker-chosen device address within the same subnet is copied to the stack with no boundary checks, hence resulting in stack overflow.CVE-2018-10601 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:H).
|
[] | null | null | 8.2 | null | null |
GHSA-phj7-phjc-r9wg
|
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in EventPrime Events EventPrime.This issue affects EventPrime: from n/a through 4.0.4.5.
|
[] | null | 4.7 | null | null | null |
|
CVE-2007-5640
|
The Nortel UNIStim IP Softphone 2050, IP Phone 1140E, and additional Nortel products from the IP Phone, Business Communications Manager (BCM), Mobile Voice Client, and other product lines, allow remote attackers to block calls and force re-registration via a resume message to the Signaling Server that has a spoofed source IP address for the phone. NOTE: the attack is more disruptive if a new spoofed resume message is sent after each re-registration.
|
[
"cpe:2.3:a:nortel:multimedia_communication_server_5100:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nortel:multimedia_communication_server_5200:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nortel:communications_server:1000e:*:*:*:*:*:*:*",
"cpe:2.3:a:nortel:communications_server:1000m:*:*:*:*:*:*:*",
"cpe:2.3:a:nortel:communications_server:1000s:*:*:*:*:*:*:*",
"cpe:2.3:a:nortel:communications_server:2100:*:*:*:*:*:*:*",
"cpe:2.3:h:nortel:ip_audio_conference_phone_2033:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nortel:ip_phone_1110:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nortel:ip_phone_1120e:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nortel:ip_phone_1140e:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nortel:ip_phone_1150e:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nortel:ip_phone_2001:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nortel:ip_phone_2002:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nortel:ip_phone_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nortel:ip_phone_2007:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nortel:wlan_handset_2210:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nortel:wlan_handset_2211:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nortel:wlan_handset_2212:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nortel:wlan_handset_6120:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nortel:wlan_handset_6140:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nortel:business_communications_manager:50:*:*:*:*:*:*:*",
"cpe:2.3:a:nortel:business_communications_manager:50a:*:*:*:*:*:*:*",
"cpe:2.3:a:nortel:business_communications_manager:50e:*:*:*:*:*:*:*",
"cpe:2.3:a:nortel:business_communications_manager:200:*:*:*:*:*:*:*",
"cpe:2.3:a:nortel:business_communications_manager:400:*:*:*:*:*:*:*",
"cpe:2.3:a:nortel:business_communications_manager:1000:*:*:*:*:*:*:*",
"cpe:2.3:a:nortel:business_communications_manager:srg50:*:*:*:*:*:*:*",
"cpe:2.3:a:nortel:business_communications_manager:srg200:*:*:*:*:*:*:*",
"cpe:2.3:a:nortel:centrex_ip_client_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nortel:centrex_ip_element_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nortel:meridian_option_11c:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nortel:meridian_option_51c:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nortel:meridian_option_61c:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nortel:meridian_option_81c:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nortel:meridian_sl100:cs2100:*:*:*:*:*:*:*",
"cpe:2.3:a:nortel:mobile_voice_client_2050:*:*:*:*:*:*:*:*"
] | null | null | null | 7.1 | null |
|
RHSA-2024:1836
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: ext4: kernel bug in ext4_write_inline_data_end() kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7 | null | null | null |
GHSA-cxrm-27jm-x3jg
|
CoreCrypto in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3 allows attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via a crafted app.
|
[] | null | null | 7.8 | null | null |
|
CVE-2016-10680
|
adamvr-geoip-lite is a light weight native JavaScript implementation of GeoIP API from MaxMind adamvr-geoip-lite downloads geoip resources over HTTP, which leaves it vulnerable to MITM attacks. This impacts the integrity and availability of this geoip data that may alter the decisions made by an application using this data.
|
[
"cpe:2.3:a:adamvr-geoip-lite_project:adamvr-geoip-lite:*:*:*:*:*:node.js:*:*"
] | null | 8.1 | null | 6.8 | null |
|
CVE-2016-10937
|
IMAPFilter through 2.6.12 does not validate the hostname in an SSL certificate.
|
[
"cpe:2.3:a:imapfilter_project:imapfilter:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
RHEA-2019:3847
|
Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update
|
hw: Intel SGX information leak
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 6 | null | null |
GHSA-pgg2-jx97-c5m4
|
In Omron PLC CS series, all versions, Omron PLC CJ series, all versions, and Omron PLC NJ series, all versions, the software does not implement sufficient measures to prevent multiple failed authentication attempts within in a short time frame, making it more susceptible to brute force attacks.
|
[] | null | null | null | null | null |
|
CVE-2023-1486
|
Lespeed WiseCleaner Wise Force Deleter IoControlCode WiseUnlock64.sys 0x220004 access control
|
A vulnerability classified as problematic was found in Lespeed WiseCleaner Wise Force Deleter 1.5.3.54. This vulnerability affects the function 0x220004 in the library WiseUnlock64.sys of the component IoControlCode Handler. The manipulation leads to improper access controls. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223372.
|
[
"cpe:2.3:a:wisecleaner:wise_force_deleter:1.5.3.54:*:*:*:*:*:*:*"
] | null | 4.4 | 4.4 | 3.2 | null |
GHSA-gprv-rwf8-ph32
|
In Citrix XenMobile Server through 10.12 RP9, there is an Authenticated Command Injection vulnerability, leading to remote code execution with root privileges.
|
[] | null | 8.8 | null | null | null |
|
CVE-2024-6554
|
Branda – White Label WordPress, Custom Login Page Customizer <= 3.4.18 - Unauthenticated Full Path Disclosure
|
The Branda – White Label WordPress, Custom Login Page Customizer plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 3.4.18. This is due the plugin utilizing composer without preventing direct access to the files. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.
|
[
"cpe:2.3:a:wpmudev:branda_white_label_wordpress_custom_login_page_customizer:3.4.18:*:*:*:*:*:*:*",
"cpe:2.3:a:wpmudev:branda:*:*:*:*:*:wordpress:*:*"
] | null | 5.3 | null | null | null |
GHSA-j7g5-m268-h27w
|
Reflected XSS in wordpress plugin simplified-content v1.0.0
|
[] | null | null | 6.1 | null | null |
|
GHSA-45jm-w28x-87fw
|
When "set system ports console insecure" is enabled, root login is disallowed for Junos OS as expected. However, the root password can be changed using "set system root-authentication plain-text-password" on systems booted from an OAM (Operations, Administration, and Maintenance) volume, leading to a possible administrative bypass with physical access to the console. OAM volumes (e.g. flash drives) are typically instantiated as /dev/gpt/oam, or /oam for short. Password recovery, changing the root password from a console, should not have been allowed from an insecure console. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1F6-S12, 15.1R7-S3; 15.1X49 versions prior to 15.1X49-D160; 15.1X53 versions prior to 15.1X53-D236, 15.1X53-D496, 15.1X53-D68; 16.1 versions prior to 16.1R3-S10, 16.1R6-S6, 16.1R7-S3; 16.1X65 versions prior to 16.1X65-D49; 16.2 versions prior to 16.2R2-S8; 17.1 versions prior to 17.1R2-S10, 17.1R3; 17.2 versions prior to 17.2R1-S8, 17.2R3-S1; 17.3 versions prior to 17.3R3-S3; 17.4 versions prior to 17.4R1-S6, 17.4R2-S2; 18.1 versions prior to 18.1R2-S4, 18.1R3-S3; 18.2 versions prior to 18.2R2; 18.2X75 versions prior to 18.2X75-D40; 18.3 versions prior to 18.3R1-S2. This issue does not affect Junos OS releases prior to 15.1.
|
[] | null | 6.8 | null | null | null |
|
CVE-2024-7553
|
Accessing Untrusted Directory May Allow Local Privilege Escalation
|
Incorrect validation of files loaded from a local untrusted directory may allow local privilege escalation if the underlying operating systems is Windows. This may result in the application executing arbitrary behaviour determined by the contents of untrusted files. This issue affects MongoDB Server v5.0 versions prior to 5.0.27, MongoDB Server v6.0 versions prior to 6.0.16, MongoDB Server v7.0 versions prior to 7.0.12, MongoDB Server v7.3 versions prior 7.3.3, MongoDB C Driver versions prior to 1.26.2 and MongoDB PHP Driver versions prior to 1.18.1.
Required Configuration:
Only environments with Windows as the underlying operating system is affected by this issue
|
[
"cpe:2.3:a:mongodb:mongodb:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:c_driver:0.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:0.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:0.3:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:0.3.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:0.4:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:0.5:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:0.5.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:0.5.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:0.6:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:0.7:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:0.7.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:0.8:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:0.8.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:0.90.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:0.92.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:0.92.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:0.94.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:0.94.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:0.96.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:0.96.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:0.96.4:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:0.98.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:0.98.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.0.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.0.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.1.0:-:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.1.0:rc0:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.1.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.1.4:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.1.5:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.1.6:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.1.7:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.1.8:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.1.9:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.1.10:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.1.11:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.2.0:-:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.2.0:beta:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.2.0:beta1:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.2.0:rc0:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.2.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.2.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.2.3:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.2.4:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.3.0:-:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.3.0:beta0:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.3.0:rc0:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.3.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.3.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.3.3:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.3.4:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.3.5:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.3.6:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.4.0:-:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.4.0:beta0:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.4.0:beta1:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.4.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.4.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.4.3:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.5.0:-:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.5.0:rc0:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.5.0:rc1:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.5.0:rc2:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.5.0:rc3:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.5.0:rc4:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.5.0:rc6:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.5.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.5.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.5.3:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.5.4:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.5.5:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.6.0:-:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.6.0:rc0:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.6.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.6.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.6.3:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.7.0:-:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.7.0:rc0:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.7.0:rc1:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.7.0:rc2:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.8.0:-:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.8.0:rc0:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.8.0:rc1:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.8.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.8.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.9.0:-:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.9.0:rc0:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.9.0:rc1:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.9.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.9.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.9.3:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.9.4:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.9.5:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.10.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.10.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.10.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.10.3:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.11.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.12.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.13.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.13.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.14.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.14.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.15.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.15.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.15.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.15.3:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.16.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.16.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.16.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.17.0:-:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.17.0:beta:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.17.0:beta2:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.17.0:rc0:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.17.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.17.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.17.3:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.17.4:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.17.5:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.17.6:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.17.7:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.18.0:alpha:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.18.0:alpha2:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.18.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.19.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.19.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.19.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.20.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.20.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.21.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.21.0:beta0:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.21.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.21.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.22.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.22.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.22.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.23.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.23.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.23.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.23.3:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.23.4:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.23.5:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.24.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.24.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.24.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.24.3:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.24.4:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.25.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.25.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.25.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.25.3:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.25.4:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.26.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:c_driver:1.26.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:0.1.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:0.1.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:0.1.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:0.1.3:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:0.1.4:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:0.1.5:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:0.2.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:0.3.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:0.3.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:0.4.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:0.4.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:0.5.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:0.5.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:0.6.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:0.6.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:0.6.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:0.6.3:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.0.0:-:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.0.0:alpha1:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.0.0:alpha2:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.0.0:beta1:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.0.0:beta2:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.0.0:rc0:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.0.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.1.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.1.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.1.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.1.3:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.1.4:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.1.5:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.1.6:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.1.7:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.1.8:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.1.9:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.1.10:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.2.0:-:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.2.0:alpha1:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.2.0:alpha2:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.2.0:alpha3:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.2.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.2.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.2.3:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.2.4:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.2.5:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.2.6:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.2.7:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.2.8:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.2.9:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.2.10:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.2.11:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.3.0:-:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.3.0:beta1:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.3.0:beta2:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.3.0:rc1:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.3.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.3.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.3.3:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.3.4:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.4.0:-:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.4.0:beta1:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.4.0:rc1:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.4.0:rc2:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.4.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.4.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.4.3:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.4.4:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.5.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.5.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.5.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.5.3:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.5.4:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.5.5:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.6.0:-:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.6.0:alpha1:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.6.0:alpha2:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.6.0:alpha3:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.6.0:rc1:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.6.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.7.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.7.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.7.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.7.3:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.7.4:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.7.5:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.8.0:-:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.8.0:beta1:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.8.0:beta2:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.8.0:rc1:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.8.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.8.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.9.0:-:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.9.0:rc1:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.9.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.9.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.10.0:alpha1:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.10.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.11.0:alpha1:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.11.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.11.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.12.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.12.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.13.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.14.0:beta1:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.14.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.14.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.14.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.15.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.15.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.15.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.15.3:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.16.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.16.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.16.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.17.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.17.1:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.17.2:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.17.3:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:1.18.0:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:c_driver:*:*:*:*:*:mongodb:*:*",
"cpe:2.3:a:mongodb:php_driver:*:*:*:*:*:mongodb:*:*"
] | null | 7.3 | null | null | null |
GHSA-hx43-x8j5-92gq
|
Waybox Enel X web management application could be used to execute arbitrary OS commands and provide administrator’s privileges over the Waybox system.
|
[] | null | 9.6 | null | null | null |
|
CVE-2017-11448
|
The ReadJPEGImage function in coders/jpeg.c in ImageMagick before 7.0.6-1 allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted file.
|
[
"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
CVE-2021-35325
|
A stack overflow in the checkLoginUser function of TOTOLINK A720R A720R_Firmware v4.1.5cu.470_B20200911 allows attackers to cause a denial of service (DOS).
|
[
"cpe:2.3:o:totolink:a720r_firmware:4.1.5cu.470_b20200911:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:a720r:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2024-35303
|
A vulnerability has been identified in Tecnomatix Plant Simulation V2302 (All versions < V2302.0012), Tecnomatix Plant Simulation V2404 (All versions < V2404.0001). The affected applications contain a type confusion vulnerability while parsing specially crafted MODEL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-22958)
|
[] | 7.3 | 7.8 | null | null | null |
|
CVE-2020-1405
|
An elevation of privilege vulnerability exists when Windows Mobile Device Management (MDM) Diagnostics improperly handles junctions, aka 'Windows Mobile Device Management Diagnostics Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1372.
|
[
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 7.1 | null | 3.6 | null |
|
CVE-2024-44098
|
In lwis_device_event_states_clear_locked of lwis_event.c, there is a possible privilege escalation due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel:*:*:*:*:*:*:*:*"
] | null | 7.4 | null | null | null |
|
CVE-2017-0775
|
A denial of service vulnerability in the Android media framework (libstagefright). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-62673179.
|
[
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*"
] | null | null | 5.5 | 7.1 | null |
|
CVE-2015-0633
|
The Integrated Management Controller (IMC) in Cisco Unified Computing System (UCS) 1.4(7h) and earlier on C-Series servers allows remote attackers to bypass intended access restrictions by sending crafted DHCP response packets on the local network, aka Bug ID CSCuf52876.
|
[
"cpe:2.3:a:cisco:unified_computing_system:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(1c\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(3c\\)1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(3c\\)2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(3j\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(3k\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(3p\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(3p\\)5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(3s\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(4a\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(4a\\)1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(5b\\)1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(5e\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(5g\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(5g\\)2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(5h\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(5j\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(6c\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(6d\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(7b\\)1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(7c\\)1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(7h\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c200_m1:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c200_m2:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c210_m2:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c22_m3:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c220_m3:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c220_m4:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c24_m3:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c240_m3:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c240_m4:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c250_m1:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c250_m2:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c260_m2:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c3160:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c420_m2:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c420_m3:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c460_m1:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c460_m2:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c460_m4:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-4vhh-rr3r-2p8j
|
Unrestricted file upload vulnerability in upload.php in BTS-GI Read excel 1.1 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
GHSA-v7f6-wfg6-2hv6
|
Improper access control vulnerability exists in the resident process of SKYSEA Client View versions from Ver.11.220 prior to Ver.19.2. If this vulnerability is exploited, an arbitrary process may be executed with SYSTEM privilege by a user who can log in to the PC where the product's Windows client is installed.
|
[] | null | 6.3 | null | null | null |
|
GHSA-c45f-5wv2-5jrf
|
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCth24671.
|
[] | null | null | null | null | null |
|
GHSA-4c9p-43pg-wq2f
|
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.1.10. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
|
[] | null | 6 | null | null | null |
|
GHSA-p6f5-7r7f-h77r
|
fs/overlayfs/dir.c in the OverlayFS filesystem implementation in the Linux kernel before 4.6 does not properly verify the upper dentry before proceeding with unlink and rename system-call processing, which allows local users to cause a denial of service (system crash) via a rename system call that specifies a self-hardlink.
|
[] | null | null | 5.5 | null | null |
|
CVE-2001-0738
|
LogLine function in klogd in sysklogd 1.3 in various Linux distributions allows an attacker to cause a denial of service (hang) by causing null bytes to be placed in log messages.
|
[
"cpe:2.3:a:immunix:immunix:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:immunix:immunix:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:immunix:immunix:7.0_beta:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2015-5963
|
contrib.sessions.middleware.SessionMiddleware in Django 1.8.x before 1.8.4, 1.7.x before 1.7.10, 1.4.x before 1.4.22, and possibly other versions allows remote attackers to cause a denial of service (session store consumption or session record removal) via a large number of requests to contrib.auth.views.logout, which triggers the creation of an empty session record.
|
[
"cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.4.17:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.4.19:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.4.20:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.4.21:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.7:beta4:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.7:rc1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.7:rc2:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.7:rc3:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.8:beta1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-mm48-9h4m-548r
|
An issue was discovered in L2 in Samsung Mobile Processor and Modem Exynos 2400 and Modem 5400. The lack of a length check leads to a Denial of Service via a malformed PDCP packet.
|
[] | null | 7.5 | null | null | null |
|
CVE-2025-7319
|
IrfanView CADImage Plugin DWG File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
|
IrfanView CADImage Plugin DWG File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView CADImage Plugin. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of DWG files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26413.
|
[] | null | null | 7.8 | null | null |
CVE-2007-6763
|
SAS Drug Development (SDD) before 32DRG02 mishandles logout actions, which allows a user (who was previously logged in) to access resources by pressing a back or forward button in a web browser.
|
[
"cpe:2.3:a:sas:sas_drug_development:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 | null |
|
GHSA-3phh-7c92-55ph
|
IBM Tivoli Key Lifecycle Manager 2.5, 2.6, and 2.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 133640.
|
[] | null | null | 6.1 | null | null |
|
RHSA-2024:4640
|
Red Hat Security Advisory: libndp security update
|
libndp: buffer overflow in route information length field
|
[
"cpe:/o:redhat:rhel_aus:8.2::baseos"
] | null | 8.1 | null | null | null |
GHSA-c2f3-qm3g-qj54
|
TRENDnet TS-S402 has a backdoor to enable TELNET.
|
[] | null | 7.5 | null | null | null |
|
CVE-2021-27092
|
Azure AD Web Sign-in Security Feature Bypass Vulnerability
|
Azure AD Web Sign-in Security Feature Bypass Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | null | null |
CVE-2005-3452
|
Unspecified vulnerability in Web Cache in Oracle Application Server 1.0 up to 9.0.4.2 has unknown impact and attack vectors, as identified by Oracle Vuln# AS13.
|
[
"cpe:2.3:a:oracle:application_server:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:1.0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:9.0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:9.0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:9.0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:9.0.4.2:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
RHSA-2013:1024
|
Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.3.3 security update
|
python-qpid: client does not validate qpid server TLS/SSL certificate
|
[
"cpe:/a:redhat:enterprise_mrg:2:computenode:el6",
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null | null |
GHSA-rjqr-gjm9-83m7
|
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear MDM9206, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 820, SD 820A, and SD 835, SMMU Access Control Policy was updated to block HLOS from accessing BLSP and BAM resources.
|
[] | null | null | 9.8 | null | null |
|
CVE-2014-6873
|
The AMGC (aka com.amec.uae) application 6.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:amecuae:amgc:6:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
CVE-2024-8863
|
aimhubio aim Text Explorer textbox.tsx dangerouslySetInnerHTML cross site scripting
|
A vulnerability, which was classified as problematic, was found in aimhubio aim up to 3.24. Affected is the function dangerouslySetInnerHTML of the file textbox.tsx of the component Text Explorer. The manipulation of the argument query leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:aimhubio:aim:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:aimstack:aim:*:*:*:*:*:*:*:*"
] | 5.3 | 3.5 | 3.5 | 4 | null |
GHSA-fp56-x63h-8459
|
A vulnerability classified as critical was found in keerti1924 Online-Book-Store-Website 1.0. This vulnerability affects unknown code of the file /home.php of the component HTTP POST Request Handler. The manipulation of the argument product_name leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-256042 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | null | 6.3 | null | null | null |
|
CVE-2024-37490
|
WordPress Bard theme <= 2.210 - Cross Site Request Forgery (CSRF) vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in WP Royal Bard allows Cross Site Request Forgery.This issue affects Bard: from n/a through 2.210.
|
[] | null | 4.3 | null | null | null |
CVE-2020-28283
|
Prototype pollution vulnerability in 'libnested' versions 0.0.0 through 1.5.0 allows an attacker to cause a denial of service and may lead to remote code execution.
|
[
"cpe:2.3:a:libnested_project:libnested:*:*:*:*:*:node.js:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-f8vf-rww8-933v
|
Multiple SQL injection vulnerabilities in Family Connections (aka FCMS) before 1.8.2 allow remote attackers to execute arbitrary SQL commands via the (1) letter parameter to addressbook.php, (2) id parameter to recipes.php, (3) year parameter to register.php, (4) poll_id parameter to home.php, and (5) email parameter to lostpw.php.
|
[] | null | null | null | null | null |
|
GHSA-vj38-24vp-4p9m
|
Secure Computing SafeWord RemoteAccess 2.1 allows local users to obtain the UserCenter webportal password, database encryption keys, and signing keys by reading (1) base-64 encoded data in SERVERS\Web\Tomcat\usercenter\WEB-INF\login.conf and (2) plaintext data in SERVERS\Shared\signers.cfg. NOTE: the provenance of this information is unknown; the details are obtained from third party information.
|
[] | null | null | null | null | null |
|
GHSA-m86v-3qv8-q72m
|
The Flash broker in Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, when Internet Explorer is used, allows attackers to perform a transition from Low Integrity to Medium Integrity via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2021-3535
|
Rapid7 Nexpose is vulnerable to a non-persistent cross-site scripting vulnerability affecting the Security Console's Filtered Asset Search feature. A specific search criterion and operator combination in Filtered Asset Search could have allowed a user to pass code through the provided search field. This issue affects version 6.6.80 and prior, and is fixed in 6.6.81. If your Security Console currently falls on or within this affected version range, ensure that you update your Security Console to the latest version.
|
[
"cpe:2.3:a:rapid7:nexpose:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
|
GHSA-3qjh-r982-mhgp
|
Cross-Site Request Forgery (CSRF) vulnerability in rollbar Rollbar allows Cross Site Request Forgery. This issue affects Rollbar: from n/a through 2.7.1.
|
[] | null | 5.4 | null | null | null |
|
GHSA-3c33-2j43-9jqp
|
An Improper Handling of Exceptional Conditions vulnerability in obs-service-go_modules of openSUSE Factory allows attackers that can influence the call to the service to delete files and directories on the system of the victim. This issue affects: SUSE openSUSE Factory obs-service-go_modules versions prior to 0.6.1.
|
[] | null | 5.5 | null | null | null |
|
GHSA-j6pg-h597-gcx9
|
A host header injection vulnerability in MEANStore 1.0 allows attackers to obtain the password reset token via user interaction with a crafted password reset link. This allows attackers to arbitrarily reset other users' passwords and compromise their accounts.
|
[] | null | 8.8 | null | null | null |
|
CVE-2025-25040
|
Failure to Properly Enforce Port ACLs on CPU generated packets in CX 9300 Switches
|
A vulnerability has been identified in the port ACL functionality of AOS-CX software running on the HPE Aruba Networking CX 9300 Switch Series only and affects:
- AOS-CX 10.14.xxxx : All patches
- AOS-CX 10.15.xxxx : 10.15.1000 and below
The vulnerability is specific to traffic originated by the CX 9300 switch platform and could allow an attacker to bypass ACL rules applied to routed ports on egress. As a result, port ACLs are not correctly enforced, which could lead to unauthorized traffic flow and violations of security policies. Egress VLAN ACLs and Routed VLAN ACLs are not affected by this vulnerability.
|
[] | null | 3.3 | null | null | null |
GHSA-35c5-28pg-2qg4
|
Symfony Authentication Bypass
|
An issue was discovered in the LDAP component in Symfony 2.8.x before 2.8.37, 3.3.x before 3.3.17, 3.4.x before 3.4.7, and 4.0.x before 4.0.7. It allows remote attackers to bypass authentication by logging in with a "null" password and valid username, which triggers an unauthenticated bind. **NOTE:** this issue exists because of an incomplete fix for CVE-2016-2403.
|
[] | null | null | 9.8 | null | null |
ICSA-24-135-03
|
Johnson Controls Software House C●CURE 9000
|
Under certain circumstances the Microsoft Internet Information Server (IIS) used to host the C●CURE 9000 Web Server will log Microsoft Windows credential details within logs. There is no impact to non-web service interfaces C●CURE 9000 or prior versions.
|
[] | null | 7.7 | null | null | null |
GHSA-73jf-w7j4-5h24
|
A stored cross-site scripting (XSS) vulnerability in Serosoft Solutions Pvt Ltd Academia Student Information System (SIS) EagleR v1.0.118 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the First Name parameter at /rest/staffResource/update.
|
[] | null | 5.4 | null | null | null |
|
GHSA-9vgq-8h3w-xj2r
|
A Cross-Site Request Forgery (CSRF) vulnerability exists in kishan0725's Hospital Management System version 6.3.5. The vulnerability allows an attacker to craft a malicious HTML form that submits a request to delete a doctor record. By enticing an authenticated admin user to visit the specially crafted web page, the attacker can leverage the victim's browser to make unauthorized requests to the vulnerable endpoint, effectively allowing the attacker to perform actions on behalf of the admin without their consent.
|
[] | null | 6.3 | null | null | null |
|
CVE-2018-18089
|
Multiple out of bounds read in igdkm64.sys in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an authenticated user to potentially enable information disclosure via local access.
|
[
"cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.40.38.4963:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.40.41.5058:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:24.20.100.6025:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:24.20.100.6094:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:24.20.100.6136:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:24.20.100.6194:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:24.20.100.6229:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:24.20.100.6286:*:*:*:*:windows:*:*"
] | null | null | 5.5 | 2.1 | null |
|
CVE-2021-31858
|
DotNetNuke (DNN) 9.9.1 CMS is vulnerable to a Stored Cross-Site Scripting vulnerability in the user profile biography section which allows remote authenticated users to inject arbitrary code via a crafted payload.
|
[
"cpe:2.3:a:dnnsoftware:dotnetnuke:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
|
GHSA-hmqw-w898-xwx8
|
D-LINK DWL-6610 FW_v_4.3.0.8B003C was discovered to contain a stack overflow vulnerability in the function update_users.
|
[] | null | 9.8 | null | null | null |
|
GHSA-vxrh-jfch-hqcf
|
Glewlwyd SSO server 2.x through 2.7.6 allows open redirection via redirect_uri.
|
[] | null | 6.1 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.