id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
GHSA-x6f4-gvp6-p33w
The AMP for WP – Accelerated Mobile Pages plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'amppb_remove_saved_layout_data' function in all versions up to, and including, 1.0.93.1. This makes it possible for authenticated attackers, with contributor access and above, to delete arbitrary posts on the site.
[]
null
6.5
null
null
null
GHSA-fj4r-372v-jvm6
IBM Security Guardium Key Lifecycle Manager 3.0, 3.0.1, 4.0, 4.1, and 4.1.1 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 247597.
[]
null
9.8
null
null
null
CVE-2013-7408
F5 BIG-IP Analytics 11.x before 11.4.0 uses a predictable session cookie, which makes it easier for remote attackers to have unspecified impact by guessing the value.
[ "cpe:2.3:a:f5:big-ip_analytics:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:11.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:11.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:11.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:11.3.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-8wcq-mc5g-xcxh
A reflected XSS vulnerability on Ruckus ICX7450-48 devices allows remote attackers to inject arbitrary web script or HTML.
[]
null
null
6.1
null
null
GHSA-ww5r-g6pm-54rj
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Artbees SellKit allows Relative Path Traversal.This issue affects SellKit: from n/a through 1.8.1.
[]
null
6.5
null
null
null
CVE-2006-0456
The strnlen_user function in Linux kernel before 2.6.16 on IBM S/390 can return an incorrect value, which allows local users to cause a denial of service via unknown vectors.
[ "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.3:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.3:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.3:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.4:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.4:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.4:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.5:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.5:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.5:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.6:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.6:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.7:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.7:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
GHSA-8gh3-6693-hwj4
In the Linux kernel, the following vulnerability has been resolved:smb: client: fix use-after-free in crypt_message when using async cryptoThe CVE-2024-50047 fix removed asynchronous crypto handling from crypt_message(), assuming all crypto operations are synchronous. However, when hardware crypto accelerators are used, this can cause use-after-free crashes:crypt_message() // Allocate the creq buffer containing the req creq = smb2_get_aead_req(..., &req);Hardware crypto modules often implement async AEAD operations for performance. When crypto_aead_encrypt/decrypt() returns -EINPROGRESS, the operation completes asynchronously. Without crypto_wait_req(), the function immediately frees the request buffer, leading to crashes when the driver later accesses the freed memory.This results in a use-after-free condition when the hardware crypto driver later accesses the freed request structure, leading to kernel crashes with NULL pointer dereferences.The issue occurs because crypto_alloc_aead() with mask=0 doesn't guarantee synchronous operation. Even without CRYPTO_ALG_ASYNC in the mask, async implementations can be selected.Fix by restoring the async crypto handling:DECLARE_CRYPTO_WAIT(wait) for completion trackingaead_request_set_callback() for async completion notificationcrypto_wait_req() to wait for operation completionThis ensures the request buffer isn't freed until the crypto operation completes, whether synchronous or asynchronous, while preserving the CVE-2024-50047 fix.
[]
null
null
null
null
null
GHSA-f8g7-fg99-vggp
Some telnet clients allow remote telnet servers to request environment variables from the client that may contain sensitive information, or remote web servers to obtain the information via a telnet: URL.
[]
null
null
null
null
null
CVE-2014-9628
The MP4_ReadBox_String function in modules/demux/mp4/libmp4.c in VideoLAN VLC media player before 2.1.6 allows remote attackers to trigger an unintended zero-size malloc and conduct buffer overflow attacks, and consequently execute arbitrary code, via a box size of 7.
[ "cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
null
GHSA-6m4g-jhp3-f6r4
An incomplete filtering of one or more instances of special elements vulnerability [CWE-792] in the command line interpreter of FortiAP-W2 7.2.0 through 7.2.1, 7.0.3 through 7.0.5, 7.0.0 through 7.0.1, 6.4 all versions, 6.2 all versions, 6.0 all versions; FortiAP-C 5.4.0 through 5.4.4, 5.2 all versions; FortiAP 7.2.0 through 7.2.1, 7.0.0 through 7.0.5, 6.4 all versions, 6.0 all versions; FortiAP-U 7.0.0, 6.2.0 through 6.2.5, 6.0 all versions, 5.4 all versions may allow an authenticated attacker to read arbitrary files via specially crafted command arguments.
[]
null
5.5
null
null
null
GHSA-jmx9-mphw-fm82
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0913, CVE-2020-1000, CVE-2020-1027.
[]
null
null
null
null
null
CVE-2017-1000089
Builds in Jenkins are associated with an authentication that controls the permissions that the build has to interact with other elements in Jenkins. The Pipeline: Build Step Plugin did not check the build authentication it was running as and allowed triggering any other project in Jenkins.
[ "cpe:2.3:a:jenkins:pipeline\\:_build_step:*:*:*:*:*:jenkins:*:*" ]
null
null
5.3
5
null
GHSA-px36-5x6h-5x8g
The "WPO365 | LOGIN" WordPress plugin (up to and including version 15.3) by wpo365.com is vulnerable to a persistent Cross-Site Scripting (XSS) vulnerability (also known as Stored or Second-Order XSS). Persistent XSS vulnerabilities occur when the application stores and retrieves client supplied data without proper handling of dangerous content. This type of XSS vulnerability is exploited by submitting malicious script content to the application which is then retrieved and executed by other application users. The attacker could exploit this to conduct a range of attacks against users of the affected application such as session hijacking, account take over and accessing sensitive data. In this case, the XSS payload can be submitted by any anonymous user, the payload then renders and executes when a WordPress administrator authenticates and accesses the WordPress Dashboard. The injected payload can carry out actions on behalf of the administrator including adding other administrative users and changing application settings. This flaw could be exploited to ultimately provide full control of the affected system to the attacker.
[]
null
null
null
null
null
GHSA-8pqc-r2rx-5hhc
This issue was addressed by adding an additional prompt for user consent. This issue is fixed in macOS Sonoma 14.4. An app may be able to access user-sensitive data.
[]
null
5.5
null
null
null
CVE-2022-32253
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.1). Due to improper input validation, the OpenSSL certificate's password could be printed to a file reachable by an attacker.
[ "cpe:2.3:a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:*" ]
null
4.9
null
null
null
RHSA-2025:9327
Red Hat Security Advisory: libblockdev security update
libblockdev: LPE from allow_active to root in libblockdev via udisks
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7
null
null
null
CVE-2019-15272
Cisco Unified Communications Manager Security Bypass Vulnerability
A vulnerability in the web-based interface of Cisco Unified Communications Manager and Cisco Unified Communications Manager Session Management Edition (SME) could allow an unauthenticated, remote attacker to bypass security restrictions. The vulnerability is due to improper handling of malformed HTTP methods. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected system. A successful exploit could allow the attacker to gain unauthorized access to the system.
[ "cpe:2.3:a:cisco:unified_communications_manager:10.5\\(2.10000.5\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.10000.6\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:12.0\\(1.10000.10\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:12.5\\(1.10000.22\\):*:*:*:*:*:*:*" ]
null
null
6.5
null
null
cisco-sa-20180221-esc
Cisco Elastic Services Controller Service Portal Authentication Bypass Vulnerability
A vulnerability in the authentication functionality of the web-based service portal of Cisco Elastic Services Controller Software could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrator privileges on an affected system. The vulnerability is due to improper security restrictions that are imposed by the web-based service portal of the affected software. An attacker could exploit this vulnerability by submitting an empty password value to an affected portal when prompted to enter an administrative password for the portal. A successful exploit could allow the attacker to bypass authentication and gain administrator privileges for the web-based service portal of the affected software. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-esc ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-esc"]
[]
null
null
9.8
null
null
GHSA-pqrm-m74p-4cj9
A vulnerability in the Cisco IOS XE Software REST API could allow an authenticated, remote attacker to bypass API authorization checks and use the API to perform privileged actions on an affected device. The vulnerability is due to insufficient authorization checks for requests that are sent to the REST API of the affected software. An attacker could exploit this vulnerability by sending a malicious request to an affected device via the REST API. A successful exploit could allow the attacker to selectively bypass authorization checks for the REST API of the affected software and use the API to perform privileged actions on an affected device. Cisco Bug IDs: CSCuz56428.
[]
null
null
8.8
null
null
GHSA-9m8g-m8f5-r7v5
nappropriate authorization vulnerability in the SettingsProvider module.Successful exploitation of this vulnerability may cause features to perform abnormally.
[]
null
7.5
null
null
null
CVE-2021-4007
Rapid7 Insight Agent Privilege Escalation
Rapid7 Insight Agent, versions 3.0.1 to 3.1.2.34, suffer from a local privilege escalation due to an uncontrolled DLL search path. Specifically, when Insight Agent versions 3.0.1 to 3.1.2.34 start, the Python interpreter attempts to load python3.dll at "C:\DLLs\python3.dll," which normally is writable by locally authenticated users. Because of this, a malicious local user could use Insight Agent's startup conditions to elevate to SYSTEM privileges. This issue was fixed in Rapid7 Insight Agent 3.1.2.35. This vulnerability is a regression of CVE-2019-5629.
[ "cpe:2.3:a:rapid7:insight_agent:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
CVE-2018-7453
Infinite recursion in AcroForm::scanField in AcroForm.cc in xpdf 4.00 allows attackers to launch denial of service via a specific pdf file due to lack of loop checking, as demonstrated by pdftohtml.
[ "cpe:2.3:a:xpdfreader:xpdf:4.00:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
null
GHSA-v8v5-48x9-6r8p
A vulnerability, which was classified as problematic, has been found in GNU Binutils 2.45. Affected by this issue is the function bfd_elf_set_group_contents of the file bfd/elf.c. The manipulation leads to out-of-bounds write. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The name of the patch is 41461010eb7c79fee7a9d5f6209accdaac66cc6b. It is recommended to apply a patch to fix this issue.
[]
1.9
5.3
null
null
null
GHSA-2r7q-w9hc-4rq3
app\admin\controller\RouteController.php in ThinkCMF 5.0.190111 allows remote attackers to execute arbitrary PHP code by using vectors involving portal/List/index and list/:id to inject this code into data\conf\route.php, as demonstrated by a file_put_contents call.
[]
null
null
9.8
null
null
CVE-2023-32542
Out-of-bounds read vulnerability exists in TELLUS v4.0.15.0 and TELLUS Lite v4.0.15.0. Opening a specially crafted V8 file may lead to information disclosure and/or arbitrary code execution.
[ "cpe:2.3:a:fujielectric:tellus:4.0.15.0:*:*:*:*:*:*:*", "cpe:2.3:a:fujielectric:tellus_lite:4.0.15.0:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
CVE-2023-3165
SourceCodester Life Insurance Management System POST Parameter insertNominee.php cross site scripting
A vulnerability was found in SourceCodester Life Insurance Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file insertNominee.php of the component POST Parameter Handler. The manipulation of the argument nominee_id leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231109 was assigned to this vulnerability.
[ "cpe:2.3:a:life_insurance_management_system_project:life_insurance_management_system:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:janobe:life_insurance_management_system:1.0:*:*:*:*:*:*:*" ]
null
3.5
3.5
4
null
CVE-2016-8488
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-31625756.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
GHSA-c7vm-2cp2-gh5g
** UNSUPPORTED WHEN ASSIGNED ** Reflected XSS in Web Compliance Manager in Quest Policy Authority version 8.1.2.200 allows attackers to inject malicious code into the browser via a specially crafted link to the cConn.jsp file via the ur parameter. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
[]
null
6.1
null
null
null
CVE-2006-4338
unlzh.c in the LHZ component in gzip 1.3.5 allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted GZIP archive.
[ "cpe:2.3:a:gzip:gzip:1.3.5:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-jf6h-g8vv-jx4q
The Promontory chipset, as used in AMD Ryzen and Ryzen Pro platforms, has a backdoor in firmware, aka CHIMERA-FW.
[]
null
null
9
null
null
CVE-2022-1808
Execution with Unnecessary Privileges in polonel/trudesk
Execution with Unnecessary Privileges in GitHub repository polonel/trudesk prior to 1.2.3.
[ "cpe:2.3:a:trudesk_project:trudesk:*:*:*:*:*:*:*:*" ]
null
null
8.8
null
null
GHSA-47rf-cwjx-w5r6
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pascal Bajorat PB oEmbed HTML5 Audio – with Cache Support allows Stored XSS.This issue affects PB oEmbed HTML5 Audio – with Cache Support: from n/a through 2.6.
[]
null
6.5
null
null
null
RHSA-2002:181
Red Hat Security Advisory: mailman security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as" ]
null
null
null
null
null
CVE-2024-38632
vfio/pci: fix potential memory leak in vfio_intx_enable()
In the Linux kernel, the following vulnerability has been resolved: vfio/pci: fix potential memory leak in vfio_intx_enable() If vfio_irq_ctx_alloc() failed will lead to 'name' memory leak.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
CVE-2023-22273
ZDI-CAN-21307: Adobe RoboHelp Server OnPublishFile Directory Traversal Remote Code Execution Vulnerability
Adobe RoboHelp Server versions 11.4 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could lead to Remote Code Execution by an admin authenticated attacker. Exploitation of this issue does not require user interaction.
[ "cpe:2.3:a:adobe:robohelp:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:robohelp_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.2
null
null
null
CVE-2022-2528
In affected versions of Octopus Deploy it is possible to upload a package to built-in feed with insufficient permissions after re-indexing packages.
[ "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
GHSA-6645-5w8p-3ww5
Cross-site scripting (XSS) vulnerability in inc_header.php in EJ3 TOPo 2.2.178 allows remote attackers to inject arbitrary web script or HTML via the gTopNombre parameter.
[]
null
null
null
null
null
CVE-2023-26925
An information disclosure vulnerability exists in the Syslog functionality of D-LINK DIR-882 1.30. A specially crafted network request can lead to the disclosure of sensitive information.
[ "cpe:2.3:o:dlink:dir-882_firmware:1.30:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-882:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-3fv6-vw38-4m6q
A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit v4.4.0. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted TIFF file.
[]
null
6.5
null
null
null
ICSMA-18-156-01
Philips' IntelliVue Patient and Avalon Fetal Monitors
The vulnerability allows an unauthenticated attacker to access memory (write-what-where) from an attacker-chosen device address within the same subnet.CVE-2018-10597 has been assigned to this vulnerability. A CVSS v3 base score of 8.3 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H). The vulnerability allows an unauthenticated attacker to read memory from an attacker-chosen device address within the same subnet.CVE-2018-10599 has been assigned to this vulnerability. A CVSS v3 base score of 6.4 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L). The vulnerability exposes an echo service, in which an attacker-sent buffer to an attacker-chosen device address within the same subnet is copied to the stack with no boundary checks, hence resulting in stack overflow.CVE-2018-10601 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:H).
[]
null
null
8.2
null
null
GHSA-phj7-phjc-r9wg
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in EventPrime Events EventPrime.This issue affects EventPrime: from n/a through 4.0.4.5.
[]
null
4.7
null
null
null
CVE-2007-5640
The Nortel UNIStim IP Softphone 2050, IP Phone 1140E, and additional Nortel products from the IP Phone, Business Communications Manager (BCM), Mobile Voice Client, and other product lines, allow remote attackers to block calls and force re-registration via a resume message to the Signaling Server that has a spoofed source IP address for the phone. NOTE: the attack is more disruptive if a new spoofed resume message is sent after each re-registration.
[ "cpe:2.3:a:nortel:multimedia_communication_server_5100:*:*:*:*:*:*:*:*", "cpe:2.3:a:nortel:multimedia_communication_server_5200:*:*:*:*:*:*:*:*", "cpe:2.3:a:nortel:communications_server:1000e:*:*:*:*:*:*:*", "cpe:2.3:a:nortel:communications_server:1000m:*:*:*:*:*:*:*", "cpe:2.3:a:nortel:communications_server:1000s:*:*:*:*:*:*:*", "cpe:2.3:a:nortel:communications_server:2100:*:*:*:*:*:*:*", "cpe:2.3:h:nortel:ip_audio_conference_phone_2033:*:*:*:*:*:*:*:*", "cpe:2.3:h:nortel:ip_phone_1110:*:*:*:*:*:*:*:*", "cpe:2.3:h:nortel:ip_phone_1120e:*:*:*:*:*:*:*:*", "cpe:2.3:h:nortel:ip_phone_1140e:*:*:*:*:*:*:*:*", "cpe:2.3:h:nortel:ip_phone_1150e:*:*:*:*:*:*:*:*", "cpe:2.3:h:nortel:ip_phone_2001:*:*:*:*:*:*:*:*", "cpe:2.3:h:nortel:ip_phone_2002:*:*:*:*:*:*:*:*", "cpe:2.3:h:nortel:ip_phone_2004:*:*:*:*:*:*:*:*", "cpe:2.3:h:nortel:ip_phone_2007:*:*:*:*:*:*:*:*", "cpe:2.3:h:nortel:wlan_handset_2210:*:*:*:*:*:*:*:*", "cpe:2.3:h:nortel:wlan_handset_2211:*:*:*:*:*:*:*:*", "cpe:2.3:h:nortel:wlan_handset_2212:*:*:*:*:*:*:*:*", "cpe:2.3:h:nortel:wlan_handset_6120:*:*:*:*:*:*:*:*", "cpe:2.3:h:nortel:wlan_handset_6140:*:*:*:*:*:*:*:*", "cpe:2.3:a:nortel:business_communications_manager:50:*:*:*:*:*:*:*", "cpe:2.3:a:nortel:business_communications_manager:50a:*:*:*:*:*:*:*", "cpe:2.3:a:nortel:business_communications_manager:50e:*:*:*:*:*:*:*", "cpe:2.3:a:nortel:business_communications_manager:200:*:*:*:*:*:*:*", "cpe:2.3:a:nortel:business_communications_manager:400:*:*:*:*:*:*:*", "cpe:2.3:a:nortel:business_communications_manager:1000:*:*:*:*:*:*:*", "cpe:2.3:a:nortel:business_communications_manager:srg50:*:*:*:*:*:*:*", "cpe:2.3:a:nortel:business_communications_manager:srg200:*:*:*:*:*:*:*", "cpe:2.3:a:nortel:centrex_ip_client_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:nortel:centrex_ip_element_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:nortel:meridian_option_11c:*:*:*:*:*:*:*:*", "cpe:2.3:a:nortel:meridian_option_51c:*:*:*:*:*:*:*:*", "cpe:2.3:a:nortel:meridian_option_61c:*:*:*:*:*:*:*:*", "cpe:2.3:a:nortel:meridian_option_81c:*:*:*:*:*:*:*:*", "cpe:2.3:a:nortel:meridian_sl100:cs2100:*:*:*:*:*:*:*", "cpe:2.3:a:nortel:mobile_voice_client_2050:*:*:*:*:*:*:*:*" ]
null
null
null
7.1
null
RHSA-2024:1836
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: ext4: kernel bug in ext4_write_inline_data_end() kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb", "cpe:/o:redhat:rhel_eus:9.0::baseos" ]
null
7
null
null
null
GHSA-cxrm-27jm-x3jg
CoreCrypto in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3 allows attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via a crafted app.
[]
null
null
7.8
null
null
CVE-2016-10680
adamvr-geoip-lite is a light weight native JavaScript implementation of GeoIP API from MaxMind adamvr-geoip-lite downloads geoip resources over HTTP, which leaves it vulnerable to MITM attacks. This impacts the integrity and availability of this geoip data that may alter the decisions made by an application using this data.
[ "cpe:2.3:a:adamvr-geoip-lite_project:adamvr-geoip-lite:*:*:*:*:*:node.js:*:*" ]
null
8.1
null
6.8
null
CVE-2016-10937
IMAPFilter through 2.6.12 does not validate the hostname in an SSL certificate.
[ "cpe:2.3:a:imapfilter_project:imapfilter:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
RHEA-2019:3847
Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update
hw: Intel SGX information leak
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
6
null
null
GHSA-pgg2-jx97-c5m4
In Omron PLC CS series, all versions, Omron PLC CJ series, all versions, and Omron PLC NJ series, all versions, the software does not implement sufficient measures to prevent multiple failed authentication attempts within in a short time frame, making it more susceptible to brute force attacks.
[]
null
null
null
null
null
CVE-2023-1486
Lespeed WiseCleaner Wise Force Deleter IoControlCode WiseUnlock64.sys 0x220004 access control
A vulnerability classified as problematic was found in Lespeed WiseCleaner Wise Force Deleter 1.5.3.54. This vulnerability affects the function 0x220004 in the library WiseUnlock64.sys of the component IoControlCode Handler. The manipulation leads to improper access controls. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223372.
[ "cpe:2.3:a:wisecleaner:wise_force_deleter:1.5.3.54:*:*:*:*:*:*:*" ]
null
4.4
4.4
3.2
null
GHSA-gprv-rwf8-ph32
In Citrix XenMobile Server through 10.12 RP9, there is an Authenticated Command Injection vulnerability, leading to remote code execution with root privileges.
[]
null
8.8
null
null
null
CVE-2024-6554
Branda – White Label WordPress, Custom Login Page Customizer <= 3.4.18 - Unauthenticated Full Path Disclosure
The Branda – White Label WordPress, Custom Login Page Customizer plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 3.4.18. This is due the plugin utilizing composer without preventing direct access to the files. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.
[ "cpe:2.3:a:wpmudev:branda_white_label_wordpress_custom_login_page_customizer:3.4.18:*:*:*:*:*:*:*", "cpe:2.3:a:wpmudev:branda:*:*:*:*:*:wordpress:*:*" ]
null
5.3
null
null
null
GHSA-j7g5-m268-h27w
Reflected XSS in wordpress plugin simplified-content v1.0.0
[]
null
null
6.1
null
null
GHSA-45jm-w28x-87fw
When "set system ports console insecure" is enabled, root login is disallowed for Junos OS as expected. However, the root password can be changed using "set system root-authentication plain-text-password" on systems booted from an OAM (Operations, Administration, and Maintenance) volume, leading to a possible administrative bypass with physical access to the console. OAM volumes (e.g. flash drives) are typically instantiated as /dev/gpt/oam, or /oam for short. Password recovery, changing the root password from a console, should not have been allowed from an insecure console. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1F6-S12, 15.1R7-S3; 15.1X49 versions prior to 15.1X49-D160; 15.1X53 versions prior to 15.1X53-D236, 15.1X53-D496, 15.1X53-D68; 16.1 versions prior to 16.1R3-S10, 16.1R6-S6, 16.1R7-S3; 16.1X65 versions prior to 16.1X65-D49; 16.2 versions prior to 16.2R2-S8; 17.1 versions prior to 17.1R2-S10, 17.1R3; 17.2 versions prior to 17.2R1-S8, 17.2R3-S1; 17.3 versions prior to 17.3R3-S3; 17.4 versions prior to 17.4R1-S6, 17.4R2-S2; 18.1 versions prior to 18.1R2-S4, 18.1R3-S3; 18.2 versions prior to 18.2R2; 18.2X75 versions prior to 18.2X75-D40; 18.3 versions prior to 18.3R1-S2. This issue does not affect Junos OS releases prior to 15.1.
[]
null
6.8
null
null
null
CVE-2024-7553
Accessing Untrusted Directory May Allow Local Privilege Escalation
Incorrect validation of files loaded from a local untrusted directory may allow local privilege escalation if the underlying operating systems is Windows. This may result in the application executing arbitrary behaviour determined by the contents of untrusted files. This issue affects MongoDB Server v5.0 versions prior to 5.0.27, MongoDB Server v6.0 versions prior to 6.0.16, MongoDB Server v7.0 versions prior to 7.0.12, MongoDB Server v7.3 versions prior 7.3.3, MongoDB C Driver versions prior to 1.26.2 and MongoDB PHP Driver versions prior to 1.18.1. Required Configuration: Only environments with Windows as the underlying operating system is affected by this issue
[ "cpe:2.3:a:mongodb:mongodb:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.22:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.23:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.24:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.25:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:5.0.26:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:mongodb:7.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:c_driver:0.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.3.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.5.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.5.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.6:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.7:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.7.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.8:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.8.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.90.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.92.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.92.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.94.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.94.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.96.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.96.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.96.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.98.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:0.98.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.0.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.0.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.0:rc0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.6:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.7:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.8:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.9:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.10:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.1.11:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.2.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.2.0:beta:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.2.0:beta1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.2.0:rc0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.2.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.2.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.2.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.2.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.3.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.3.0:beta0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.3.0:rc0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.3.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.3.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.3.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.3.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.3.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.3.6:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.4.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.4.0:beta0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.4.0:beta1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.4.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.4.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.4.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.0:rc0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.0:rc1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.0:rc2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.0:rc3:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.0:rc4:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.0:rc6:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.5.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.6.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.6.0:rc0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.6.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.6.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.6.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.7.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.7.0:rc0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.7.0:rc1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.7.0:rc2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.8.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.8.0:rc0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.8.0:rc1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.8.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.8.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.9.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.9.0:rc0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.9.0:rc1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.9.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.9.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.9.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.9.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.9.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.10.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.10.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.10.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.10.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.11.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.12.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.13.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.13.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.14.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.14.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.15.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.15.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.15.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.15.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.16.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.16.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.16.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.0:beta:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.0:beta2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.0:rc0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.6:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.17.7:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.18.0:alpha:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.18.0:alpha2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.18.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.19.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.19.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.19.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.20.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.20.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.21.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.21.0:beta0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.21.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.21.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.22.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.22.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.22.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.23.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.23.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.23.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.23.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.23.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.23.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.24.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.24.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.24.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.24.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.24.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.25.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.25.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.25.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.25.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.25.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.26.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:c_driver:1.26.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.1.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.1.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.1.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.1.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.1.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.1.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.2.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.3.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.3.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.4.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.4.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.5.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.5.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.6.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.6.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.6.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:0.6.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.0.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.0.0:alpha1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.0.0:alpha2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.0.0:beta1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.0.0:beta2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.0.0:rc0:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.0.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.6:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.7:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.8:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.9:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.1.10:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.0:alpha1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.0:alpha2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.0:alpha3:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.6:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.7:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.8:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.9:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.10:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.2.11:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.3.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.3.0:beta1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.3.0:beta2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.3.0:rc1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.3.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.3.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.3.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.3.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.4.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.4.0:beta1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.4.0:rc1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.4.0:rc2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.4.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.4.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.4.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.4.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.5.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.5.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.5.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.5.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.5.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.5.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.6.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.6.0:alpha1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.6.0:alpha2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.6.0:alpha3:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.6.0:rc1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.6.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.7.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.7.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.7.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.7.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.7.4:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.7.5:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.8.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.8.0:beta1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.8.0:beta2:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.8.0:rc1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.8.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.8.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.9.0:-:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.9.0:rc1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.9.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.9.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.10.0:alpha1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.10.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.11.0:alpha1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.11.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.11.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.12.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.12.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.13.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.14.0:beta1:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.14.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.14.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.14.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.15.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.15.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.15.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.15.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.16.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.16.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.16.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.17.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.17.1:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.17.2:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.17.3:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:1.18.0:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:c_driver:*:*:*:*:*:mongodb:*:*", "cpe:2.3:a:mongodb:php_driver:*:*:*:*:*:mongodb:*:*" ]
null
7.3
null
null
null
GHSA-hx43-x8j5-92gq
Waybox Enel X web management application could be used to execute arbitrary OS commands and provide administrator’s privileges over the Waybox system.
[]
null
9.6
null
null
null
CVE-2017-11448
The ReadJPEGImage function in coders/jpeg.c in ImageMagick before 7.0.6-1 allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted file.
[ "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
null
CVE-2021-35325
A stack overflow in the checkLoginUser function of TOTOLINK A720R A720R_Firmware v4.1.5cu.470_B20200911 allows attackers to cause a denial of service (DOS).
[ "cpe:2.3:o:totolink:a720r_firmware:4.1.5cu.470_b20200911:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:a720r:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-2024-35303
A vulnerability has been identified in Tecnomatix Plant Simulation V2302 (All versions < V2302.0012), Tecnomatix Plant Simulation V2404 (All versions < V2404.0001). The affected applications contain a type confusion vulnerability while parsing specially crafted MODEL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-22958)
[]
7.3
7.8
null
null
null
CVE-2020-1405
An elevation of privilege vulnerability exists when Windows Mobile Device Management (MDM) Diagnostics improperly handles junctions, aka 'Windows Mobile Device Management Diagnostics Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1372.
[ "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
7.1
null
3.6
null
CVE-2024-44098
In lwis_device_event_states_clear_locked of lwis_event.c, there is a possible privilege escalation due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "cpe:2.3:h:google:pixel:*:*:*:*:*:*:*:*" ]
null
7.4
null
null
null
CVE-2017-0775
A denial of service vulnerability in the Android media framework (libstagefright). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-62673179.
[ "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*" ]
null
null
5.5
7.1
null
CVE-2015-0633
The Integrated Management Controller (IMC) in Cisco Unified Computing System (UCS) 1.4(7h) and earlier on C-Series servers allows remote attackers to bypass intended access restrictions by sending crafted DHCP response packets on the local network, aka Bug ID CSCuf52876.
[ "cpe:2.3:a:cisco:unified_computing_system:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:1.4\\(1c\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:1.4\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:1.4\\(3c\\)1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:1.4\\(3c\\)2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:1.4\\(3j\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:1.4\\(3k\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:1.4\\(3p\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:1.4\\(3p\\)5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:1.4\\(3s\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:1.4\\(4a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:1.4\\(4a\\)1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:1.4\\(5b\\)1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:1.4\\(5e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:1.4\\(5g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:1.4\\(5g\\)2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:1.4\\(5h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:1.4\\(5j\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:1.4\\(6c\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:1.4\\(6d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:1.4\\(7b\\)1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:1.4\\(7c\\)1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:1.4\\(7h\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c200_m1:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c200_m2:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c210_m2:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c22_m3:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c220_m3:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c220_m4:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c24_m3:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c240_m3:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c240_m4:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c250_m1:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c250_m2:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c260_m2:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c3160:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c420_m2:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c420_m3:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c460_m1:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c460_m2:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:c460_m4:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
GHSA-4vhh-rr3r-2p8j
Unrestricted file upload vulnerability in upload.php in BTS-GI Read excel 1.1 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
null
GHSA-v7f6-wfg6-2hv6
Improper access control vulnerability exists in the resident process of SKYSEA Client View versions from Ver.11.220 prior to Ver.19.2. If this vulnerability is exploited, an arbitrary process may be executed with SYSTEM privilege by a user who can log in to the PC where the product's Windows client is installed.
[]
null
6.3
null
null
null
GHSA-c45f-5wv2-5jrf
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCth24671.
[]
null
null
null
null
null
GHSA-4c9p-43pg-wq2f
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.1.10. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
[]
null
6
null
null
null
GHSA-p6f5-7r7f-h77r
fs/overlayfs/dir.c in the OverlayFS filesystem implementation in the Linux kernel before 4.6 does not properly verify the upper dentry before proceeding with unlink and rename system-call processing, which allows local users to cause a denial of service (system crash) via a rename system call that specifies a self-hardlink.
[]
null
null
5.5
null
null
CVE-2001-0738
LogLine function in klogd in sysklogd 1.3 in various Linux distributions allows an attacker to cause a denial of service (hang) by causing null bytes to be placed in log messages.
[ "cpe:2.3:a:immunix:immunix:6.2:*:*:*:*:*:*:*", "cpe:2.3:a:immunix:immunix:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:immunix:immunix:7.0_beta:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:1.3:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2015-5963
contrib.sessions.middleware.SessionMiddleware in Django 1.8.x before 1.8.4, 1.7.x before 1.7.10, 1.4.x before 1.4.22, and possibly other versions allows remote attackers to cause a denial of service (session store consumption or session record removal) via a large number of requests to contrib.auth.views.logout, which triggers the creation of an empty session record.
[ "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.4.13:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.4.14:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.4.17:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.4.19:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.4.20:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.4.21:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.7:beta4:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.7:rc1:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.7:rc2:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.7:rc3:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.7.8:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.7.9:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.8:beta1:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.8.3:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-mm48-9h4m-548r
An issue was discovered in L2 in Samsung Mobile Processor and Modem Exynos 2400 and Modem 5400. The lack of a length check leads to a Denial of Service via a malformed PDCP packet.
[]
null
7.5
null
null
null
CVE-2025-7319
IrfanView CADImage Plugin DWG File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
IrfanView CADImage Plugin DWG File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView CADImage Plugin. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DWG files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26413.
[]
null
null
7.8
null
null
CVE-2007-6763
SAS Drug Development (SDD) before 32DRG02 mishandles logout actions, which allows a user (who was previously logged in) to access resources by pressing a back or forward button in a web browser.
[ "cpe:2.3:a:sas:sas_drug_development:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.5
null
GHSA-3phh-7c92-55ph
IBM Tivoli Key Lifecycle Manager 2.5, 2.6, and 2.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 133640.
[]
null
null
6.1
null
null
RHSA-2024:4640
Red Hat Security Advisory: libndp security update
libndp: buffer overflow in route information length field
[ "cpe:/o:redhat:rhel_aus:8.2::baseos" ]
null
8.1
null
null
null
GHSA-c2f3-qm3g-qj54
TRENDnet TS-S402 has a backdoor to enable TELNET.
[]
null
7.5
null
null
null
CVE-2021-27092
Azure AD Web Sign-in Security Feature Bypass Vulnerability
Azure AD Web Sign-in Security Feature Bypass Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*" ]
null
6.8
null
null
null
CVE-2005-3452
Unspecified vulnerability in Web Cache in Oracle Application Server 1.0 up to 9.0.4.2 has unknown impact and attack vectors, as identified by Oracle Vuln# AS13.
[ "cpe:2.3:a:oracle:application_server:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:1.0.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:9.0.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:9.0.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:9.0.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:9.0.4.2:*:*:*:*:*:*:*" ]
null
null
null
10
null
RHSA-2013:1024
Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.3.3 security update
python-qpid: client does not validate qpid server TLS/SSL certificate
[ "cpe:/a:redhat:enterprise_mrg:2:computenode:el6", "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
null
GHSA-rjqr-gjm9-83m7
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear MDM9206, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 820, SD 820A, and SD 835, SMMU Access Control Policy was updated to block HLOS from accessing BLSP and BAM resources.
[]
null
null
9.8
null
null
CVE-2014-6873
The AMGC (aka com.amec.uae) application 6.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:amecuae:amgc:6:*:*:*:*:android:*:*" ]
null
null
null
5.4
null
CVE-2024-8863
aimhubio aim Text Explorer textbox.tsx dangerouslySetInnerHTML cross site scripting
A vulnerability, which was classified as problematic, was found in aimhubio aim up to 3.24. Affected is the function dangerouslySetInnerHTML of the file textbox.tsx of the component Text Explorer. The manipulation of the argument query leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:aimhubio:aim:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:aimstack:aim:*:*:*:*:*:*:*:*" ]
5.3
3.5
3.5
4
null
GHSA-fp56-x63h-8459
A vulnerability classified as critical was found in keerti1924 Online-Book-Store-Website 1.0. This vulnerability affects unknown code of the file /home.php of the component HTTP POST Request Handler. The manipulation of the argument product_name leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-256042 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
null
6.3
null
null
null
CVE-2024-37490
WordPress Bard theme <= 2.210 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in WP Royal Bard allows Cross Site Request Forgery.This issue affects Bard: from n/a through 2.210.
[]
null
4.3
null
null
null
CVE-2020-28283
Prototype pollution vulnerability in 'libnested' versions 0.0.0 through 1.5.0 allows an attacker to cause a denial of service and may lead to remote code execution.
[ "cpe:2.3:a:libnested_project:libnested:*:*:*:*:*:node.js:*:*" ]
null
9.8
null
7.5
null
GHSA-f8vf-rww8-933v
Multiple SQL injection vulnerabilities in Family Connections (aka FCMS) before 1.8.2 allow remote attackers to execute arbitrary SQL commands via the (1) letter parameter to addressbook.php, (2) id parameter to recipes.php, (3) year parameter to register.php, (4) poll_id parameter to home.php, and (5) email parameter to lostpw.php.
[]
null
null
null
null
null
GHSA-vj38-24vp-4p9m
Secure Computing SafeWord RemoteAccess 2.1 allows local users to obtain the UserCenter webportal password, database encryption keys, and signing keys by reading (1) base-64 encoded data in SERVERS\Web\Tomcat\usercenter\WEB-INF\login.conf and (2) plaintext data in SERVERS\Shared\signers.cfg. NOTE: the provenance of this information is unknown; the details are obtained from third party information.
[]
null
null
null
null
null
GHSA-m86v-3qv8-q72m
The Flash broker in Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, when Internet Explorer is used, allows attackers to perform a transition from Low Integrity to Medium Integrity via unspecified vectors.
[]
null
null
null
null
null
CVE-2021-3535
Rapid7 Nexpose is vulnerable to a non-persistent cross-site scripting vulnerability affecting the Security Console's Filtered Asset Search feature. A specific search criterion and operator combination in Filtered Asset Search could have allowed a user to pass code through the provided search field. This issue affects version 6.6.80 and prior, and is fixed in 6.6.81. If your Security Console currently falls on or within this affected version range, ensure that you update your Security Console to the latest version.
[ "cpe:2.3:a:rapid7:nexpose:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
null
GHSA-3qjh-r982-mhgp
Cross-Site Request Forgery (CSRF) vulnerability in rollbar Rollbar allows Cross Site Request Forgery. This issue affects Rollbar: from n/a through 2.7.1.
[]
null
5.4
null
null
null
GHSA-3c33-2j43-9jqp
An Improper Handling of Exceptional Conditions vulnerability in obs-service-go_modules of openSUSE Factory allows attackers that can influence the call to the service to delete files and directories on the system of the victim. This issue affects: SUSE openSUSE Factory obs-service-go_modules versions prior to 0.6.1.
[]
null
5.5
null
null
null
GHSA-j6pg-h597-gcx9
A host header injection vulnerability in MEANStore 1.0 allows attackers to obtain the password reset token via user interaction with a crafted password reset link. This allows attackers to arbitrarily reset other users' passwords and compromise their accounts.
[]
null
8.8
null
null
null
CVE-2025-25040
Failure to Properly Enforce Port ACLs on CPU generated packets in CX 9300 Switches
A vulnerability has been identified in the port ACL functionality of AOS-CX software running on the HPE Aruba Networking CX 9300 Switch Series only and affects: - AOS-CX 10.14.xxxx : All patches - AOS-CX 10.15.xxxx : 10.15.1000 and below The vulnerability is specific to traffic originated by the CX 9300 switch platform and could allow an attacker to bypass ACL rules applied to routed ports on egress. As a result, port ACLs are not correctly enforced, which could lead to unauthorized traffic flow and violations of security policies. Egress VLAN ACLs and Routed VLAN ACLs are not affected by this vulnerability.
[]
null
3.3
null
null
null
GHSA-35c5-28pg-2qg4
Symfony Authentication Bypass
An issue was discovered in the LDAP component in Symfony 2.8.x before 2.8.37, 3.3.x before 3.3.17, 3.4.x before 3.4.7, and 4.0.x before 4.0.7. It allows remote attackers to bypass authentication by logging in with a "null" password and valid username, which triggers an unauthenticated bind. **NOTE:** this issue exists because of an incomplete fix for CVE-2016-2403.
[]
null
null
9.8
null
null
ICSA-24-135-03
Johnson Controls Software House C●CURE 9000
Under certain circumstances the Microsoft Internet Information Server (IIS) used to host the C●CURE 9000 Web Server will log Microsoft Windows credential details within logs. There is no impact to non-web service interfaces C●CURE 9000 or prior versions.
[]
null
7.7
null
null
null
GHSA-73jf-w7j4-5h24
A stored cross-site scripting (XSS) vulnerability in Serosoft Solutions Pvt Ltd Academia Student Information System (SIS) EagleR v1.0.118 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the First Name parameter at /rest/staffResource/update.
[]
null
5.4
null
null
null
GHSA-9vgq-8h3w-xj2r
A Cross-Site Request Forgery (CSRF) vulnerability exists in kishan0725's Hospital Management System version 6.3.5. The vulnerability allows an attacker to craft a malicious HTML form that submits a request to delete a doctor record. By enticing an authenticated admin user to visit the specially crafted web page, the attacker can leverage the victim's browser to make unauthorized requests to the vulnerable endpoint, effectively allowing the attacker to perform actions on behalf of the admin without their consent.
[]
null
6.3
null
null
null
CVE-2018-18089
Multiple out of bounds read in igdkm64.sys in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an authenticated user to potentially enable information disclosure via local access.
[ "cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*", "cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*", "cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*", "cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*", "cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*", "cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*", "cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*", "cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*", "cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:windows:*:*", "cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:windows:*:*", "cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:windows:*:*", "cpe:2.3:a:intel:graphics_driver:15.40.38.4963:*:*:*:*:windows:*:*", "cpe:2.3:a:intel:graphics_driver:15.40.41.5058:*:*:*:*:windows:*:*", "cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:windows:*:*", "cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:windows:*:*", "cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:windows:*:*", "cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:windows:*:*", "cpe:2.3:a:intel:graphics_driver:24.20.100.6025:*:*:*:*:windows:*:*", "cpe:2.3:a:intel:graphics_driver:24.20.100.6094:*:*:*:*:windows:*:*", "cpe:2.3:a:intel:graphics_driver:24.20.100.6136:*:*:*:*:windows:*:*", "cpe:2.3:a:intel:graphics_driver:24.20.100.6194:*:*:*:*:windows:*:*", "cpe:2.3:a:intel:graphics_driver:24.20.100.6229:*:*:*:*:windows:*:*", "cpe:2.3:a:intel:graphics_driver:24.20.100.6286:*:*:*:*:windows:*:*" ]
null
null
5.5
2.1
null
CVE-2021-31858
DotNetNuke (DNN) 9.9.1 CMS is vulnerable to a Stored Cross-Site Scripting vulnerability in the user profile biography section which allows remote authenticated users to inject arbitrary code via a crafted payload.
[ "cpe:2.3:a:dnnsoftware:dotnetnuke:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
GHSA-hmqw-w898-xwx8
D-LINK DWL-6610 FW_v_4.3.0.8B003C was discovered to contain a stack overflow vulnerability in the function update_users.
[]
null
9.8
null
null
null
GHSA-vxrh-jfch-hqcf
Glewlwyd SSO server 2.x through 2.7.6 allows open redirection via redirect_uri.
[]
null
6.1
null
null
null