id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
|---|---|---|---|---|---|---|---|---|
GHSA-7x23-63hm-q73v
|
In ExtremeControl before 25.5.12, a cross-site scripting (XSS) vulnerability was discovered in a login interface of the affected application. The issue stems from improper handling of user-supplied input within HTML attributes, allowing an attacker to inject script code that may execute in a user's browser under specific interaction conditions. Successful exploitation could lead to exposure of user data or unauthorized actions within the browser context.
|
[] | 5.3
| null | null | null | null |
|
CVE-2025-3480
|
MedDream WEB DICOM Viewer Cleartext Transmission of Credentials Information Disclosure Vulnerability
|
MedDream WEB DICOM Viewer Cleartext Transmission of Credentials Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of MedDream WEB DICOM Viewer. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the Web Portal. The issue results from the lack of encryption when transmitting credentials. An attacker can leverage this vulnerability to disclose transmitted credentials, leading to further compromise. Was ZDI-CAN-25842.
|
[] | null | null | 5.3
| null | null |
CVE-2025-6414
|
PHPGurukul Art Gallery Management System changeimage2.php sql injection
|
A vulnerability classified as critical was found in PHPGurukul Art Gallery Management System 1.1. This vulnerability affects unknown code of the file /admin/changeimage2.php. The manipulation of the argument editid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3
| 6.3
| 6.3
| 6.5
| null |
GHSA-fm76-hq97-h239
|
A vulnerability was found in SourceCodester Lost and Found Information System 1.0. It has been classified as critical. This affects an unknown part of the file admin/?page=categories/view_category of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The identifier VDB-228885 was assigned to this vulnerability.
|
[] | null | null | 6.3
| null | null |
|
GHSA-6xhq-c535-qw5p
|
A BOLA vulnerability in GET, PUT, DELETE /settings/{settingName} allows a low privileged user to fetch, modify or delete the settings of any user (including admin). This results in unauthorized access and unauthorized data manipulation.
|
[] | null | 9.9
| null | null | null |
|
GHSA-h93q-jv2p-c5p2
|
An issue was discovered on the D-Link DWR-932B router. qmiweb allows command injection with ` characters.
|
[] | null | 9.8
| null | null | null |
|
GHSA-9f9w-6h4v-8h8v
|
The File Manager plugin for WordPress is vulnerable to authorization bypass due to a missing capability check in the /inc/root.php file in versions up to, and including, 3.0. This makes it possible for unauthenticated attackers to download arbitrary files from the server and upload arbitrary files that can be used for remote code execution.
|
[] | null | 9.8
| null | null | null |
|
GHSA-q8fr-cg9c-26gr
|
Unspecified vulnerability in Adobe Connect Enterprise Server 6 allows remote attackers to read certain pages that are restricted to the administrator via unknown vectors.
|
[] | null | null | null | null | null |
|
CVE-2018-6681
|
SB10244 - Network Security Management (NSM) - Abuse of Functionality vulnerability
|
Abuse of Functionality vulnerability in the web interface in McAfee Network Security Management (NSM) 9.1.7.11 and earlier allows authenticated users to allow arbitrary HTML code to be reflected in the response web page via appliance web interface.
|
[
"cpe:2.3:a:mcafee:network_security_manager:*:*:*:*:*:*:*:*"
] | null | null | 5.5
| null | null |
GHSA-6xwf-7rfm-4gwc
|
TYPO3 Cross-Site Scripting in Filelist Module
|
It has been discovered that the output table listing in the “Files” backend module is vulnerable to cross-site scripting when a file extension contains malicious sequences.Access to the file system of the server - either directly or through synchronization - is required to exploit the vulnerability.
|
[] | null | 6.1
| null | null | null |
GHSA-mc97-99j4-vm2v
|
Soft Serve Public Key Authentication Bypass Vulnerability when Keyboard-Interactive SSH Authentication is Enabled
|
ImpactA security vulnerability in Soft Serve could allow an unauthenticated, remote attacker to bypass public key authentication when keyboard-interactive SSH authentication is active, through the `allow-keyless` setting, and the public key requires additional client-side verification for example using FIDO2 or GPG. This is due to insufficient validation procedures of the public key step during SSH request handshake, granting unauthorized access if the keyboard-interaction mode is utilized. An attacker could exploit this vulnerability by presenting manipulated SSH requests using keyboard-interactive authentication mode. This could potentially result in unauthorized access to the Soft Serve.PatchesUsers should upgrade to the latest Soft Serve version `v0.6.2` to receive the patch for this issue.WorkaroundsTo workaround this vulnerability without upgrading, users can _temporarily_ disable Keyboard-Interactive SSH Authentication using the `allow-keyless` setting.Referenceshttps://github.com/charmbracelet/soft-serve/issues/389
|
[] | null | 7.5
| null | null | null |
CVE-2022-3765
|
Cross-site Scripting (XSS) - Stored in thorsten/phpmyfaq
|
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.8.
|
[
"cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*"
] | null | null | 8.2
| null | null |
CVE-2017-2584
|
arch/x86/kvm/emulate.c in the Linux kernel through 4.9.3 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | 7.1
| 3.6
| null |
|
CVE-2025-24564
|
WordPress Contact Form With Shortcode plugin <= 4.2.5 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in aviplugins.com Contact Form With Shortcode allows Reflected XSS. This issue affects Contact Form With Shortcode: from n/a through 4.2.5.
|
[] | null | 7.1
| null | null | null |
CVE-2022-24654
|
Authenticated stored cross-site scripting (XSS) vulnerability in "Field Server Address" field in INTELBRAS ATA 200 Firmware 74.19.10.21 allows attackers to inject JavaScript code through a crafted payload.
|
[
"cpe:2.3:o:intelbras:ata_200_firmware:74.19.10.21:*:*:*:*:*:*:*",
"cpe:2.3:h:intelbras:ata_200:-:*:*:*:*:*:*:*"
] | null | 5.4
| null | null | null |
|
CVE-2001-0623
|
sendfiled, as included with Simple Asynchronous File Transfer (SAFT), on various Linux systems does not properly drop privileges when sending notification emails, which allows local attackers to gain privileges.
|
[
"cpe:2.3:a:sendfile:sendfile:*:*:*:*:*:*:*:*"
] | null | null | null | 4.6
| null |
|
CVE-2015-7346
|
SQL injection vulnerability in ZCMS 1.1.
|
[
"cpe:2.3:a:zcms_project:zcms:1.1:*:*:*:*:*:*:*"
] | null | null | 9.8
| 7.5
| null |
|
CVE-2014-5655
|
The CM Browser - Fast & Secure (aka com.ksmobile.cb) application 5.0.50 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:cmcm:cm_browser_-_fast_\\&_secure:5.0.50:*:*:*:*:android:*:*"
] | null | null | null | 5.4
| null |
|
GHSA-xv87-5fp5-4jrj
|
Directory traversal vulnerability in page.php in Elvin 1.2.0 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the id parameter.
|
[] | null | null | null | null | null |
|
GHSA-vwxj-6m26-f948
|
Unspecified vulnerability in AppKit in Apple Mac OS X before 10.5 allows user-assisted remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted document file, as demonstrated by opening the document with TextEdit.
|
[] | null | null | null | null | null |
|
CVE-2024-8578
|
TOTOLINK AC1200 T8 cstecgi.cgi setWiFiMeshName buffer overflow
|
A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.861_B20230220. It has been rated as critical. Affected by this issue is the function setWiFiMeshName of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument device_name leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:o:totolink:ac1200_t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*"
] | 8.7
| 8.8
| 8.8
| 9
| null |
CVE-2017-10149
|
Vulnerability in the Primavera Unifier component of Oracle Primavera Products Suite (subcomponent: Platform). Supported versions that are affected are 9.13, 9.14, 10.1, 10.2, 15.1, 15.2, 16.1 and 16.2. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Primavera Unifier. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Primavera Unifier, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Primavera Unifier accessible data as well as unauthorized read access to a subset of Primavera Unifier accessible data. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N).
|
[
"cpe:2.3:a:oracle:primavera_unifier:9.13:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_unifier:9.14:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_unifier:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_unifier:10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_unifier:15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_unifier:15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:*"
] | null | null | 4.8
| 4.9
| null |
|
GHSA-3r4h-xx4c-77cj
|
A path traversal issue in the API endpoint in M-Files Server before version 25.6.14925.0 allows an authenticated user to read files in the server.
|
[] | 8.4
| 6.5
| null | null | null |
|
GHSA-ff4w-rgwj-fx2j
|
In all Qualcomm products with Android releases from CAF using the Linux kernel, an output buffer is accessed in one thread and can be potentially freed in another.
|
[] | null | null | 7.8
| null | null |
|
CVE-2022-20643
|
Cisco Security Manager Cross-Site Scripting Vulnerabilities
|
Multiple vulnerabilities in the web-based management interface of Cisco Security Manager could allow an unauthenticated, remote attacker to conduct cross-site scripting attacks against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
|
[
"cpe:2.3:a:cisco:security_manager:*:*:*:*:*:*:*:*"
] | null | 6.1
| null | null | null |
GHSA-x6rc-q735-q8qg
|
Certain blit values provided by the user were not properly constrained leading to a heap buffer overflow on some video drivers. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.
|
[] | null | null | null | null | null |
|
CVE-2023-20157
|
Cisco Small Business Series Switches Buffer Overflow Vulnerabilities
|
Multiple vulnerabilities in the web-based user interface of certain Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code with root privileges on an affected device. These vulnerabilities are due to improper validation of requests that are sent to the web interface. For more information about these vulnerabilities, see the Details section of this advisory.
|
[
"cpe:2.3:o:cisco:250_series_smart_switches_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:350_series_managed_switches_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:350x_series_stackable_managed_switches_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:550x_series_stackable_managed_switches_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250_series_smart_switches_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350_series_managed_switches_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:small_business_200_series_smart_switches_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:small_business_300_series_managed_switches_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:small_business_500_series_stackable_managed_switches_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-16p-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-16p-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-16t-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-16t-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-24fp-4g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-24fp-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-24fp-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-24fp-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-24p-4g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-24p-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-24p-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-24p-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-24pp-4g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-24pp-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-24t-4g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-24t-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-24t-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-24t-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-48p-4g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-48p-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-48p-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-48p-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-48pp-4g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-48pp-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-48t-4g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-48t-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-48t-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-48t-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-8fp-e-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-8fp-e-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-8p-e-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-8p-e-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-8pp-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-8pp-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-8pp-e-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-8pp-e-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-8t-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-8t-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_250-8t-e-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_250-8t-e-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-12np-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-12np-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-12xs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-12xs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-12xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-12xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-16fp-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-16fp-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-16p-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-16p-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-16p-e-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-16p-e-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-16t-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-16t-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-16t-e-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-16t-e-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-16xts_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-16xts:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-24fp-4g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-24fp-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-24fp-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-24fp-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-24mgp-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-24mgp-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-24ngp-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-24ngp-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-24p-4g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-24p-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-24p-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-24p-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-24s-4g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-24s-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-24t-4g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-24t-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-24t-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-24t-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-24xs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-24xs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-24xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-24xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-24xts_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-24xts:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-48fp-4g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-48fp-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-48fp-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-48fp-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-48ngp-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-48ngp-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-48p-4g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-48p-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-48p-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-48p-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-48t-4g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-48t-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-48t-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-48t-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-48xt-4x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-48xt-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-8fp-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-8fp-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-8fp-e-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-8fp-e-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-8mgp-2x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-8mgp-2x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-8mp-2x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-8mp-2x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-8p-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-8p-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-8p-e-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-8p-e-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-8s-e-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-8s-e-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-8t-e-2g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-8t-e-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_350-8xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_350-8xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200-24fp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200-24p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200-48_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200-48p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200e-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200e-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200e-24p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200e-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200e-48_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200e-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200e-48p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200e-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200e48p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200e48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-08_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-08:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-08hp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-08hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-10p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-10p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-18_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-18:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-24p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-26_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-26:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-26hp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-26hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-26p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-26p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-48_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-48hp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-50_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-50hp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-50hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-50p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-50p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250x-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250x-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250x-24p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250x-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250x-48_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250x-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250x-48p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250x-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-08_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-24mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-24p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-24pp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-48_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-48p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-48pp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf302-08_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf302-08mpp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf302-08pp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-08_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-08:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-10_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-10mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-10mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-10p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-10p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-10sfp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-10sfp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-24mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-24mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-24p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-28_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-28:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-28mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-28mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-28p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-28p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-28sfp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-28sfp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-48_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-48mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-48p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-52_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-52:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-52mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-52mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-52p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-52p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-8mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-8mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-8pd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-8pd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf352-08_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf352-08:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf352-08mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf352-08mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf352-08p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf352-08p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf355-10p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf355-10p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf500-18p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf500-18p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf500-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf500-24mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf500-24mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf500-24p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf500-48_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf500-48mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf500-48mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf500-48p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf550x-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf550x-24mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf550x-24p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf550x-48_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf550x-48mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf550x-48p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-08_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-08p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-10fp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-18_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-26_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-26fp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-26p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-50_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-50fp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-50p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-08_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-08:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-08hp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-08hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-10p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-10p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-18_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-18:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-24p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-26_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-26:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-26hp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-26hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-26p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-26p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-48_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-48hp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-48hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-50_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-50hp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-50hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-50p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-50p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250x-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250x-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250x-24p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250x-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250x-48_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250x-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250x-48p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250x-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-10_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-10mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-10mpp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-10p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-10pp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-10sfp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-28_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-28mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-28p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-28pp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-28sfp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-28sfp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-52_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-52mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-52p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350-10_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350-10mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350-10p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350-28_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350-28mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350-28p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350x-12pmv_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350x-12pmv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350x-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350x-24mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350x-24p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350x-24pd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350x-24pd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350x-24pv_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350x-24pv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350x-48_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350x-48mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350x-48p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350x-48pv_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350x-48pv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350x-8pmd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350x-8pmd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350xg-24f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350xg-24t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350xg-2f10_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350xg-48t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg355-10mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg355-10mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg355-10p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500-28_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500-28mpp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500-28p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500-28pp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500-28pp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500-52p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500-52pp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500-52pp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500x-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500x-24mpp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500x-24mpp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500x-24p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500x-48_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500x-48mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500x-48mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500x-48mpp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500x-48mpp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500x-48p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500x24mpp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500x24mpp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500xg-8f8t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500xg8f8t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500xg8f8t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550x-24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550x-24mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550x-24mpp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550x-24p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550x-48_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550x-48mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550x-48p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550x-48t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550x-48t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550xg-24f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550xg-24f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550xg-24t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550xg-24t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550xg-48t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550xg-48t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550xg-8f8t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550xg-8f8t:-:*:*:*:*:*:*:*"
] | null | 8.6
| null | null | null |
CVE-2017-14818
|
This vulnerability allows remote attackers to disclose sensitive on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JPEG2000 images embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-4982.
|
[
"cpe:2.3:a:foxitsoftware:foxit_reader:8.3.1.21155:*:*:*:*:*:*:*"
] | null | null | 6.5
| 4.3
| null |
|
GHSA-m294-4vh4-9qwg
|
Memory safety bugs present in Firefox 129, Firefox ESR 128.1, and Thunderbird 128.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 130 and Firefox ESR < 128.2.
|
[] | null | 9.8
| null | null | null |
|
GHSA-rrjx-7fgp-4597
|
An issue was discovered in MediaWiki through 1.37.1. The CentralAuth extension mishandles a ttl issue for groups expiring in the future.
|
[] | null | 9.8
| null | null | null |
|
CVE-2022-36763
|
Heap Buffer Overflow in Tcg2MeasureGptTable
|
EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.
|
[
"cpe:2.3:a:tianocore:edk2:*:*:*:*:*:*:*:*"
] | null | 7
| null | null | null |
CVE-2002-2376
|
Cross-site scripting (XSS) vulnerability in E-Guest_sign.pl in E-Guest 1.1 allows remote attackers to inject arbitrary SSI directives, web script, and HTML via the (1) full name, (2) email, (3) homepage, and (4) location parameters. NOTE: this issue might overlap CVE-2005-1605.
|
[
"cpe:2.3:a:leung:e-guest:1.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
CVE-2015-1834
|
A path traversal vulnerability was identified in the Cloud Foundry component Cloud Controller that affects cf-release versions prior to v208 and Pivotal Cloud Foundry Elastic Runtime versions prior to 1.4.2. Path traversal is the 'outbreak' of a given directory structure through relative file paths in the user input. It aims at accessing files and directories that are stored outside the web root folder, for disallowed reading or even executing arbitrary system commands. An attacker could use a certain parameter of the file path for instance to inject '../' sequences in order to navigate through the file system. In this particular case a remote authenticated attacker can exploit the identified vulnerability in order to upload arbitrary files to the server running a Cloud Controller instance - outside the isolated application container.
|
[
"cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*",
"cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:*:*:*:*:*:*:*:*"
] | null | 6.5
| null | 4
| null |
|
CVE-2018-7930
|
The Near Field Communication (NFC) module in Mate 9 Huawei mobile phones with the versions before MHA-L29B 8.0.0.366(C567) has an information leak vulnerability due to insufficient validation on data transfer requests. When an affected mobile phone sends files to an attacker's mobile phone using the NFC function, the attacker can obtain arbitrary files from the mobile phone, causing information leaks.
|
[
"cpe:2.3:o:huawei:mate_9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:mate_9:-:*:*:*:*:*:*:*"
] | null | null | 5.7
| 2.9
| null |
|
CVE-2016-3863
|
Multiple stack-based buffer overflows in the AVCC reassembly implementation in Utils.cpp in libstagefright in MediaMuxer in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-09-01, and 7.0 before 2016-09-01 allow remote attackers to execute arbitrary code via a crafted media file, aka internal bug 29161888.
|
[
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*"
] | null | null | 7.8
| 6.8
| null |
|
CVE-2025-29883
|
File Station 5
|
An improper certificate validation vulnerability has been reported to affect File Station 5. If exploited, the vulnerability could allow remote attackers who have gained user access to compromise the security of the system.
We have already fixed the vulnerability in the following versions:
File Station 5 5.5.6.4791 and later
and later
|
[] | 8.3
| null | null | null | null |
GHSA-f95m-5x7w-c6wx
|
In Android before security patch level 2018-04-05 on Qualcomm Snapdragon Mobile MDM9640, MDM9645, MDM9650, MDM9655, SD 450, SD 625, SD 650/52, SD 810, SD 820, SD 835, while processing the IPv6 pdp address of the pdp context, a buffer overflow can occur.
|
[] | null | null | 9.8
| null | null |
|
GHSA-wmrm-qmcx-9r68
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ABCApp Creator allows PHP Local File Inclusion.This issue affects ABCApp Creator: from n/a through 1.1.2.
|
[] | null | 8.1
| null | null | null |
|
GHSA-qrm5-6xmw-6xcq
|
The Custom Post Type and Taxonomy GUI Manager WordPress plugin through 1.1 does not have CSRF, and is lacking sanitising as well as escaping in some parameters, allowing attackers to make a logged in admin put Stored Cross-Site Scripting payloads via CSRF
|
[] | null | 4.8
| null | null | null |
|
PYSEC-2023-188
| null |
When deserializing untrusted or corrupted data, it is possible for a reader to consume memory beyond the allowed constraints and thus lead to out of memory on the system.
This issue affects Java applications using Apache Avro Java SDK up to and including 1.11.2. Users should update to apache-avro version 1.11.3 which addresses this issue.
|
[] | null | 7.5
| null | null | null |
GHSA-jc33-cg9p-57rj
|
sudo 1.6.0 through 1.6.3p7 does not properly clear the environment before calling the mail program, which could allow local users to gain root privileges by modifying environment variables and changing how the mail program is invoked.
|
[] | null | null | null | null | null |
|
GHSA-69jq-qr7w-j7qh
|
FlowiseAI Flowise arbitrary file upload vulnerability
|
FlowiseAI Flowise v2.2.6 was discovered to contain an arbitrary file upload vulnerability in /api/v1/attachments.
|
[] | 8.9
| null | null | null | null |
CVE-2023-40641
|
In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed
|
[
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*"
] | null | 5.5
| null | null | null |
|
CVE-2019-0220
|
A vulnerability was found in Apache HTTP Server 2.4.0 to 2.4.38. When the path component of a request URL contains multiple consecutive slashes ('/'), directives such as LocationMatch and RewriteRule must account for duplicates in regular expressions while other aspects of the servers processing will implicitly collapse them.
|
[
"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"
] | null | null | 5.3
| 5
| null |
|
CVE-2019-11049
|
mail() may release string with refcount==1 twice
|
In PHP versions 7.3.x below 7.3.13 and 7.4.0 on Windows, when supplying custom headers to mail() function, due to mistake introduced in commit 78f4b4a2dcf92ddbccea1bb95f8390a18ac3342e, if the header is supplied in lowercase, this can result in double-freeing certain memory locations.
|
[
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tenable:securitycenter:*:*:*:*:*:*:*:*"
] | null | 6.5
| null | null | null |
GHSA-7x65-3xvm-x7wq
|
Unchecked Return Value in GitHub repository gpac/gpac prior to 2.2.2.
|
[] | null | null | 4.4
| null | null |
|
GHSA-5wc7-47m4-35qh
|
Multiple cross-site scripting (XSS) vulnerabilities in index.php in HB-NS 1.1.6 allow remote attackers to inject arbitrary web script or HTML via the (1) poster_name, (2) poster_email, (3) poster_homepage, or (4) message parameter.
|
[] | null | null | null | null | null |
|
GHSA-x4q2-p9fr-44ff
|
A vulnerability was found in Talend Open Studio for MDM. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file org.talend.mdm.core/src/com/amalto/core/storage/SystemStorageWrapper.java. The manipulation leads to xml external entity reference. Upgrading to version 20221220_1938 is able to address this issue. The name of the patch is 95590db2ad6a582c371273ceab1a73ad6ed47853. It is recommended to upgrade the affected component. The identifier VDB-216997 was assigned to this vulnerability.
|
[] | null | 4.3
| null | null | null |
|
CVE-2025-30205
|
kanidm-provision leaks provisioned admin credentials into the system log
|
kanidim-provision is a helper utility that uses kanidm's API to provision users, groups and oauth2 systems. Prior to version 1.2.0, a faulty function intrumentation in the (optional) kanidm patches provided by kandim-provision will cause the provisioned admin credentials to be leaked to the system log. This only impacts users which both use the provided patches and provision their `admin` or `idm_admin` account credentials this way. No other credentials are affected. Users should recompile kanidm with the newest patchset from tag `v1.2.0` or higher. As a workaround, the user can set the log level `KANIDM_LOG_LEVEL` to any level higher than `info`, for example `warn`.
|
[] | null | 7.6
| null | null | null |
GHSA-wxwf-h485-h4x8
|
In Delinea PAM Secret Server 11.4, it is possible for an attacker (with Administrator access to the Secret Server machine) to read the following data from a memory dump: the decrypted master key, database credentials (when SQL Server Authentication is enabled), the encryption key of RabbitMQ queue messages, and session cookies.
|
[] | null | 6.7
| null | null | null |
|
CVE-2011-4537
|
Multiple buffer overflows in 7-Technologies (7T) Interactive Graphical SCADA System (IGSS) 9.0.0.11355 and earlier allow remote attackers to execute arbitrary code or cause a denial of service via a crafted packet to TCP port (1) 12397 or (2) 12399.
|
[
"cpe:2.3:a:7t:igss:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
GHSA-5vvg-7wfp-qh9p
|
The blockchain node in FISCO-BCOS V2.7.2 may have a bug when dealing with unformatted packet and lead to a crash. A malicious node can send a packet continuously. The packet is in an incorrect format and cannot be decoded by the node correctly. As a result, the node may consume the memory sustainably and crash. More details are shown at: https://github.com/FISCO-BCOS/FISCO-BCOS/issues/1951
|
[] | null | 7.5
| null | null | null |
|
CVE-2025-31342
|
Galaxy Software Services Vitals ESP Forum Module - Unrestricted Upload of File with Dangerous Type
|
An unrestricted upload of file with dangerous type vulnerability in the upload file function of Galaxy Software Services Corporation Vitals ESP Forum Module through 1.3 version allows remote authenticated users to execute arbitrary system commands via a malicious file.
|
[] | 9.3
| null | null | null | null |
GHSA-98gp-4cxp-48r2
|
Apple Type Services (ATS) in Apple OS X before 10.9.2 allows attackers to bypass the App Sandbox protection mechanism via crafted Mach messages that trigger memory corruption.
|
[] | null | null | null | null | null |
|
GHSA-g8rg-m62r-h7gq
|
By default, dedicated folders of ZONEPOINT for Windows up to 2024.1 can be accessed by other users to misuse technical files and make them perform tasks with higher privileges. Configuration of ZONEPOINT has to be modified to prevent this vulnerability.
|
[] | null | 7.8
| null | null | null |
|
CVE-2019-13737
|
Insufficient policy enforcement in autocomplete in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:x64:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:x86:*",
"cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:x64:*",
"cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:x86:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:x64:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:x86:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:x64:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:x86:*"
] | null | 6.5
| null | 4.3
| null |
|
CVE-2021-1568
|
Cisco AnyConnect Secure Mobility Client for Windows Denial of Service Vulnerability
|
A vulnerability in Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected system. This vulnerability is due to uncontrolled memory allocation. An attacker could exploit this vulnerability by copying a crafted file to a specific folder on the system. A successful exploit could allow the attacker to crash the VPN Agent service when the affected application is launched, causing it to be unavailable to all users of the system. To exploit this vulnerability, the attacker must have valid credentials on a multiuser Windows system.
|
[
"cpe:2.3:a:cisco:anyconnect_secure_mobility_client:*:*:*:*:*:windows:*:*"
] | null | 5.5
| null | null | null |
GHSA-8hc3-wrhh-6crh
|
The server in Blackboard Academic Suite 7.x stores MD5 password hashes that are provided directly by clients, which makes it easier for remote attackers to access accounts via a modified client that skips the javascript/md5.js hash calculation, and instead sends an arbitrary MD5 string.
|
[] | null | null | null | null | null |
|
CVE-2023-52195
|
WordPress Posts to Page Plugin <= 1.7 is vulnerable to Cross Site Scripting (XSS)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Posts to Page Kerry James allows Stored XSS.This issue affects Kerry James: from n/a through 1.7.
|
[
"cpe:2.3:a:kerryjames:posts_to_page:*:*:*:*:*:wordpress:*:*"
] | null | 6.5
| null | null | null |
GHSA-52m7-gvgw-j355
|
Amzetta zPortal Windows zClient is affected by Integer Overflow. IOCTL Handler 0x22001B in the Amzetta zPortal Windows zClient <= v3.2.8180.148 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
|
[] | null | null | null | null | null |
|
GHSA-5p9v-45c4-qx9w
|
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.
|
[] | null | 8.8
| null | null | null |
|
CVE-2022-24765
|
Uncontrolled search for the Git directory in Git for Windows
|
Git for Windows is a fork of Git containing Windows-specific patches. This vulnerability affects users working on multi-user machines, where untrusted parties have write access to the same hard disk. Those untrusted parties could create the folder `C:\.git`, which would be picked up by Git operations run supposedly outside a repository while searching for a Git directory. Git would then respect any config in said Git directory. Git Bash users who set `GIT_PS1_SHOWDIRTYSTATE` are vulnerable as well. Users who installed posh-gitare vulnerable simply by starting a PowerShell. Users of IDEs such as Visual Studio are vulnerable: simply creating a new project would already read and respect the config specified in `C:\.git\config`. Users of the Microsoft fork of Git are vulnerable simply by starting a Git Bash. The problem has been patched in Git for Windows v2.35.2. Users unable to upgrade may create the folder `.git` on all drives where Git commands are run, and remove read/write access from those folders as a workaround. Alternatively, define or extend `GIT_CEILING_DIRECTORIES` to cover the _parent_ directory of the user profile, e.g. `C:\Users` if the user profile is located in `C:\Users\my-user-name`.
|
[
"cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 6
| null | null | null |
GHSA-94r6-87q5-99jj
|
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0889, CVE-2020-0953, CVE-2020-0959, CVE-2020-0960, CVE-2020-0992, CVE-2020-0994, CVE-2020-0995, CVE-2020-0999, CVE-2020-1008.
|
[] | null | null | null | null | null |
|
GHSA-64jp-4xjj-prcw
|
Multiple Server-Side Request Forgery (SSRF) vulnerabilities were identified in the significant-gravitas/autogpt repository, specifically in the GitHub Integration and Web Search blocks. These vulnerabilities affect version agpt-platform-beta-v0.1.1. The issues arise when block inputs are controlled by untrusted sources, leading to potential credential leakage, internal network scanning, and unauthorized access to internal services, APIs, or data stores. The affected blocks include GithubListPullRequestsBlock, GithubReadPullRequestBlock, GithubAssignPRReviewerBlock, GithubListPRReviewersBlock, GithubUnassignPRReviewerBlock, GithubCommentBlock, GithubMakeIssueBlock, GithubReadIssueBlock, GithubListIssuesBlock, GithubAddLabelBlock, GithubRemoveLabelBlock, GithubListBranchesBlock, and ExtractWebsiteContentBlock.
|
[] | null | null | 6.5
| null | null |
|
CVE-2011-3823
|
Yamamah 1.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by themes/default/index.php and certain other files.
|
[
"cpe:2.3:a:yamamah:yamamah:1.0:*:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
GHSA-wqj8-465w-mxwg
|
SQL injection vulnerability in lpro.php in Free Links Directory Script (FLDS) 1.2a allows remote attackers to execute arbitrary SQL commands via the id parameter.
|
[] | null | null | null | null | null |
|
GHSA-4gc8-g785-gxxw
|
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Pepro Dev. Group PeproDev Ultimate Invoice.This issue affects PeproDev Ultimate Invoice: from n/a through 1.9.7.
|
[] | null | 5.3
| null | null | null |
|
CVE-2024-13926
|
WP-Syntax <= 1.2 - Author+ Potential ReDoS
|
The WP-Syntax WordPress plugin through 1.2 does not properly handle input, allowing an attacker to create a post containing a large number of tags, thereby exploiting a catastrophic backtracking issue in the regular expression processing to cause a DoS.
|
[] | null | 7.5
| null | null | null |
CVE-2021-43298
|
The code that performs password matching when using 'Basic' HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver's response time until the unauthorized (401) response.
|
[
"cpe:2.3:a:embedthis:goahead:*:*:*:*:*:*:*:*"
] | null | 9.8
| null | 5
| null |
|
CVE-2018-4423
|
A logic issue was addressed with improved validation. This issue affected versions prior to macOS Mojave 10.14.1.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 7.8
| 6.8
| null |
|
CVE-2021-26987
|
Element Plug-in for vCenter Server incorporates SpringBoot Framework. SpringBoot Framework versions prior to 1.3.2 are susceptible to a vulnerability which when successfully exploited could lead to Remote Code Execution. All versions of Element Plug-in for vCenter Server, Management Services versions prior to 2.17.56 and Management Node versions through 12.2 contain vulnerable versions of SpringBoot Framework.
|
[
"cpe:2.3:a:vmware:spring_boot:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:element_plug-in_for_vcenter_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:management_services_for_element_software_and_netapp_hci:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:*:*:*:*:*:*:*:*"
] | null | 9.8
| null | 7.5
| null |
|
GHSA-j325-h69m-f57c
|
Buffer Overflow vulnerability in NAS devices. QTS allows attackers to run arbitrary code. This issue affects: QNAP Systems Inc. QTS version 4.2.6 and prior versions on build 20180711; version 4.3.3 and prior versions on build 20180725; version 4.3.4 and prior versions on build 20180710.
|
[] | null | null | 9.8
| null | null |
|
CVE-2017-17511
|
KildClient 3.1.0 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL, related to prefs.c and worldgui.c.
|
[
"cpe:2.3:a:kildclient:kildclient:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | null | 8.8
| 6.8
| null |
|
CVE-2005-2185
|
eRoom does not set an expiration for Cookies, which allows remote attackers to capture cookies and conduct replay attacks.
|
[
"cpe:2.3:a:emc:eroom:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:eroom:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:eroom:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:eroom:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:eroom:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:eroom:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:eroom:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:eroom:6.0.7:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
CVE-2011-0525
|
Batavi before 1.0 has CSRF.
|
[
"cpe:2.3:a:batavi:batavi:*:*:*:*:*:*:*:*"
] | null | 8.8
| null | 6.8
| null |
|
GHSA-96rp-9wxg-vm42
|
Rejected reason: Not used
|
[] | null | null | null | null | null |
|
RHSA-2010:0963
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 5.1.0 security update
|
JBoss Remoting Denial-Of-Service
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:5.1"
] | null | null | null | null | null |
CVE-2022-38398
|
Server-Side Request Forgery Information Disclosure Vulnerability
|
Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache XML Graphics allows an attacker to load a url thru the jar protocol. This issue affects Apache XML Graphics Batik 1.14.
|
[
"cpe:2.3:a:apache:batik:1.14:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 5.3
| null | null | null |
CVE-2018-9565
|
In readBytes of xltdecwbxml.c, there is a possible out of bounds read due to an integer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-16680558.
|
[
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*"
] | null | 7.5
| null | 5
| null |
|
GHSA-hpf8-fq4j-xr48
|
SQL injection vulnerability in hava_post.php in Havalite CMS 1.1.0 and earlier allows remote attackers to execute arbitrary SQL commands via the postId parameter.
|
[] | null | null | null | null | null |
|
RHSA-2017:1445
|
Red Hat Security Advisory: python-django security update
|
python-django: Open redirect and possible XSS attack via user-supplied numeric redirect URLs
|
[
"cpe:/a:redhat:openstack:6::el7"
] | null | null | 6.1
| null | null |
GHSA-66h6-4ppg-82p8
|
Removed group members were able to use the To-Do functionality to retrieve updated information on confidential epics starting in GitLab EE 13.2 before 13.6.2.
|
[] | null | null | null | null | null |
|
GHSA-4h9c-v5vg-5m6m
|
Access to restricted PHP code by dynamic static class access in smarty
|
ImpactTemplate authors could run restricted static php methods.PatchesPlease upgrade to 3.1.40 or higher.ReferencesSee the [documentation on Smarty security features](https://www.smarty.net/docs/en/advanced.features.tpl#advanced.features.security) on the static_classes access filter.For more informationIf you have any questions or comments about this advisory please open an issue in [the Smarty repo](https://github.com/smarty-php/smarty)
|
[] | null | 8.8
| null | null | null |
GHSA-f8r4-mf27-rf7m
|
Finance.js vulnerable to DoS via the IRR function’s depth parameter
|
Finance.js v4.1.0 contains a Denial of Service (DoS) vulnerability via the IRR function’s depth parameter. Improper handling of the recursion/iteration limit can lead to excessive CPU usage, causing application stalls or crashes.
|
[] | null | 7.5
| null | null | null |
GHSA-8fw4-xh83-3j6q
|
Cross-Site Scripting in diagram-js
|
Versions of `diagram-js` prior to 3.3.1 (for 3.x) and 2.6.2 (for 2.x) are vulnerable to Cross-Site Scripting. The package fails to escape output of user-controlled input in `search-pad`, allowing attackers to execute arbitrary JavaScript.RecommendationIf you are using diagram-js 3.x, upgrade to version 3.3.1.
If you are using diagram-js 2.x, upgrade to version 2.6.2.
|
[] | null | null | null | null | null |
CVE-2024-20841
|
Improper Handling of Insufficient Privileges in Samsung Account prior to version 14.8.00.3 allows local attackers to access data.
|
[] | null | 5.1
| null | null | null |
|
CVE-2024-12188
|
1000 Projects Library Management System stu.php sql injection
|
A vulnerability was found in 1000 Projects Library Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /brains/stu.php. The manipulation of the argument useri leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:1000projects:library_management_system:1.0:*:*:*:*:*:*:*"
] | 6.9
| 7.3
| 7.3
| 7.5
| null |
CVE-2024-34982
|
An arbitrary file upload vulnerability in the component /include/file.php of lylme_spage v1.9.5 allows attackers to execute arbitrary code via uploading a crafted file.
|
[
"cpe:2.3:a:lylme:lylme_spage:1.9.5:*:*:*:*:*:*:*"
] | null | 9.8
| null | null | null |
|
CVE-2018-1154
|
In SecurityCenter versions prior to 5.7.0, a username enumeration issue could allow an unauthenticated attacker to automate the discovery of username aliases via brute force, ultimately facilitating unauthorized access. Server response output has been unified to correct this issue.
|
[
"cpe:2.3:a:tenable:securitycenter:*:*:*:*:*:*:*:*"
] | null | null | 8.8
| 3.3
| null |
|
GHSA-75rf-h4vm-w82h
|
StrangeBee TheHive 5.2.0 to 5.2.8 is vulnerable to Cross Site Scripting (XSS) in the case reporting functionality. This feature allows an attacker to insert malicious JavaScript code inside the template or its variables, that will be executed in the context of the TheHive application when the HTML report is opened.
|
[] | null | 5.4
| null | null | null |
|
GHSA-3v56-q6r6-4gcw
|
Insecure Inherited Permissions in neoan3-apps/template
|
ImpactVersions prior 1.1.1 have allowed for passing in closures directly into the template engine. As a result values that are callable are executed by the template engine. The issue arises if a value has the same name as a method or function in scope and can therefore be executed either by mistake or maliciously.In theory all users of the package are affected as long as they either deal with direct user input or database values. A multi-step attack on is therefore plausible.PatchesVersion 1.1.1 has addressed this vulnerability.WorkaroundsUnfortunately only working with hardcoded values is safe in prior versions. As this likely defeats the purpose of a template engine, please upgrade.ReferencesAs a possible exploit is relatively easy to achieve, I will not share steps to reproduce the issue for now.For more informationIf you have any questions or comments about this advisory:Open an issue in [our repo](https://github.com/sroehrl/neoan3-template)
|
[] | null | 7.5
| null | null | null |
CVE-2020-28575
|
A heap-based buffer overflow privilege escalation vulnerability in Trend Micro ServerProtect for Linux 3.0 may allow an attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute high-privileged code on the target in order to exploit this vulnerability.
|
[
"cpe:2.3:a:trendmicro:serverprotect:3.0:*:*:*:*:linux:*:*"
] | null | 6.7
| null | 4.6
| null |
|
CVE-2022-25786
|
GateManager debug interface is included in production builds
|
Unprotected Alternate Channel vulnerability in debug console of GateManager allows system administrator to obtain sensitive information. This issue affects: GateManager all versions prior to 9.7.
|
[
"cpe:2.3:a:secomea:gatemanager:*:*:*:*:*:*:*:*"
] | null | 4.9
| null | null | null |
CVE-2024-57069
|
A prototype pollution in the lib function of expand-object v0.4.2 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload.
|
[] | null | 7.5
| null | null | null |
|
CVE-2007-1287
|
A regression error in the phpinfo function in PHP 4.4.3 to 4.4.6, and PHP 6.0 in CVS, allows remote attackers to conduct cross-site scripting (XSS) attacks via GET, POST, or COOKIE array values, which are not escaped in the phpinfo output, as originally fixed for CVE-2005-3388.
|
[
"cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:6.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
CVE-2012-1222
|
Stack-based buffer overflow in RabidHamster R2/Extreme 1.65 and earlier allows remote authenticated users to execute arbitrary code via a long string to TCP port 23.
|
[
"cpe:2.3:a:rabidhamster:r2\\/extreme:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rabidhamster:r2\\/extreme:1.51:*:*:*:*:*:*:*"
] | null | null | null | 8.5
| null |
|
CVE-2015-6075
|
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6068, CVE-2015-6072, CVE-2015-6073, CVE-2015-6077, CVE-2015-6079, CVE-2015-6080, and CVE-2015-6082.
|
[
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] | null | null | null | 9.3
| null |
|
GHSA-q37w-9m74-wmpg
|
Multiple cross-site scripting (XSS) vulnerabilities in Michael Salzer Guestbox 0.6, and other versions before 0.8, allow remote attackers to inject arbitrary web script or HTML via (1) HTML tags that follow a "http://" string, which bypasses a regular expression check, and (2) other unspecified attack vectors.
|
[] | null | null | null | null | null |
|
RHSA-2022:7482
|
Red Hat Security Advisory: qt5 security, bug fix, and enhancement update
|
qt: QProcess could execute a binary from the current working directory when not found in the PATH
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.8
| null | null | null |
CVE-2021-47153
|
i2c: i801: Don't generate an interrupt on bus reset
|
In the Linux kernel, the following vulnerability has been resolved:
i2c: i801: Don't generate an interrupt on bus reset
Now that the i2c-i801 driver supports interrupts, setting the KILL bit
in a attempt to recover from a timed out transaction triggers an
interrupt. Unfortunately, the interrupt handler (i801_isr) is not
prepared for this situation and will try to process the interrupt as
if it was signaling the end of a successful transaction. In the case
of a block transaction, this can result in an out-of-range memory
access.
This condition was reproduced several times by syzbot:
https://syzkaller.appspot.com/bug?extid=ed71512d469895b5b34e
https://syzkaller.appspot.com/bug?extid=8c8dedc0ba9e03f6c79e
https://syzkaller.appspot.com/bug?extid=c8ff0b6d6c73d81b610e
https://syzkaller.appspot.com/bug?extid=33f6c360821c399d69eb
https://syzkaller.appspot.com/bug?extid=be15dc0b1933f04b043a
https://syzkaller.appspot.com/bug?extid=b4d3fd1dfd53e90afd79
So disable interrupts while trying to reset the bus. Interrupts will
be enabled again for the following transaction.
|
[] | null | 6
| null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.