id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
GHSA-7x23-63hm-q73v
In ExtremeControl before 25.5.12, a cross-site scripting (XSS) vulnerability was discovered in a login interface of the affected application. The issue stems from improper handling of user-supplied input within HTML attributes, allowing an attacker to inject script code that may execute in a user's browser under specific interaction conditions. Successful exploitation could lead to exposure of user data or unauthorized actions within the browser context.
[]
5.3
null
null
null
null
CVE-2025-3480
MedDream WEB DICOM Viewer Cleartext Transmission of Credentials Information Disclosure Vulnerability
MedDream WEB DICOM Viewer Cleartext Transmission of Credentials Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of MedDream WEB DICOM Viewer. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Web Portal. The issue results from the lack of encryption when transmitting credentials. An attacker can leverage this vulnerability to disclose transmitted credentials, leading to further compromise. Was ZDI-CAN-25842.
[]
null
null
5.3
null
null
CVE-2025-6414
PHPGurukul Art Gallery Management System changeimage2.php sql injection
A vulnerability classified as critical was found in PHPGurukul Art Gallery Management System 1.1. This vulnerability affects unknown code of the file /admin/changeimage2.php. The manipulation of the argument editid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
6.3
6.5
null
GHSA-fm76-hq97-h239
A vulnerability was found in SourceCodester Lost and Found Information System 1.0. It has been classified as critical. This affects an unknown part of the file admin/?page=categories/view_category of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The identifier VDB-228885 was assigned to this vulnerability.
[]
null
null
6.3
null
null
GHSA-6xhq-c535-qw5p
A BOLA vulnerability in GET, PUT, DELETE /settings/{settingName} allows a low privileged user to fetch, modify or delete the settings of any user (including admin). This results in unauthorized access and unauthorized data manipulation.
[]
null
9.9
null
null
null
GHSA-h93q-jv2p-c5p2
An issue was discovered on the D-Link DWR-932B router. qmiweb allows command injection with ` characters.
[]
null
9.8
null
null
null
GHSA-9f9w-6h4v-8h8v
The File Manager plugin for WordPress is vulnerable to authorization bypass due to a missing capability check in the /inc/root.php file in versions up to, and including, 3.0. This makes it possible for unauthenticated attackers to download arbitrary files from the server and upload arbitrary files that can be used for remote code execution.
[]
null
9.8
null
null
null
GHSA-q8fr-cg9c-26gr
Unspecified vulnerability in Adobe Connect Enterprise Server 6 allows remote attackers to read certain pages that are restricted to the administrator via unknown vectors.
[]
null
null
null
null
null
CVE-2018-6681
SB10244 - Network Security Management (NSM) - Abuse of Functionality vulnerability
Abuse of Functionality vulnerability in the web interface in McAfee Network Security Management (NSM) 9.1.7.11 and earlier allows authenticated users to allow arbitrary HTML code to be reflected in the response web page via appliance web interface.
[ "cpe:2.3:a:mcafee:network_security_manager:*:*:*:*:*:*:*:*" ]
null
null
5.5
null
null
GHSA-6xwf-7rfm-4gwc
TYPO3 Cross-Site Scripting in Filelist Module
It has been discovered that the output table listing in the “Files” backend module is vulnerable to cross-site scripting when a file extension contains malicious sequences.Access to the file system of the server - either directly or through synchronization - is required to exploit the vulnerability.
[]
null
6.1
null
null
null
GHSA-mc97-99j4-vm2v
Soft Serve Public Key Authentication Bypass Vulnerability when Keyboard-Interactive SSH Authentication is Enabled
ImpactA security vulnerability in Soft Serve could allow an unauthenticated, remote attacker to bypass public key authentication when keyboard-interactive SSH authentication is active, through the `allow-keyless` setting, and the public key requires additional client-side verification for example using FIDO2 or GPG. This is due to insufficient validation procedures of the public key step during SSH request handshake, granting unauthorized access if the keyboard-interaction mode is utilized. An attacker could exploit this vulnerability by presenting manipulated SSH requests using keyboard-interactive authentication mode. This could potentially result in unauthorized access to the Soft Serve.PatchesUsers should upgrade to the latest Soft Serve version `v0.6.2` to receive the patch for this issue.WorkaroundsTo workaround this vulnerability without upgrading, users can _temporarily_ disable Keyboard-Interactive SSH Authentication using the `allow-keyless` setting.Referenceshttps://github.com/charmbracelet/soft-serve/issues/389
[]
null
7.5
null
null
null
CVE-2022-3765
Cross-site Scripting (XSS) - Stored in thorsten/phpmyfaq
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.8.
[ "cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*" ]
null
null
8.2
null
null
CVE-2017-2584
arch/x86/kvm/emulate.c in the Linux kernel through 4.9.3 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
null
7.1
3.6
null
CVE-2025-24564
WordPress Contact Form With Shortcode plugin <= 4.2.5 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in aviplugins.com Contact Form With Shortcode allows Reflected XSS. This issue affects Contact Form With Shortcode: from n/a through 4.2.5.
[]
null
7.1
null
null
null
CVE-2022-24654
Authenticated stored cross-site scripting (XSS) vulnerability in "Field Server Address" field in INTELBRAS ATA 200 Firmware 74.19.10.21 allows attackers to inject JavaScript code through a crafted payload.
[ "cpe:2.3:o:intelbras:ata_200_firmware:74.19.10.21:*:*:*:*:*:*:*", "cpe:2.3:h:intelbras:ata_200:-:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
CVE-2001-0623
sendfiled, as included with Simple Asynchronous File Transfer (SAFT), on various Linux systems does not properly drop privileges when sending notification emails, which allows local attackers to gain privileges.
[ "cpe:2.3:a:sendfile:sendfile:*:*:*:*:*:*:*:*" ]
null
null
null
4.6
null
CVE-2015-7346
SQL injection vulnerability in ZCMS 1.1.
[ "cpe:2.3:a:zcms_project:zcms:1.1:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
CVE-2014-5655
The CM Browser - Fast & Secure (aka com.ksmobile.cb) application 5.0.50 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:cmcm:cm_browser_-_fast_\\&_secure:5.0.50:*:*:*:*:android:*:*" ]
null
null
null
5.4
null
GHSA-xv87-5fp5-4jrj
Directory traversal vulnerability in page.php in Elvin 1.2.0 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the id parameter.
[]
null
null
null
null
null
GHSA-vwxj-6m26-f948
Unspecified vulnerability in AppKit in Apple Mac OS X before 10.5 allows user-assisted remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted document file, as demonstrated by opening the document with TextEdit.
[]
null
null
null
null
null
CVE-2024-8578
TOTOLINK AC1200 T8 cstecgi.cgi setWiFiMeshName buffer overflow
A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.861_B20230220. It has been rated as critical. Affected by this issue is the function setWiFiMeshName of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument device_name leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:o:totolink:ac1200_t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*" ]
8.7
8.8
8.8
9
null
CVE-2017-10149
Vulnerability in the Primavera Unifier component of Oracle Primavera Products Suite (subcomponent: Platform). Supported versions that are affected are 9.13, 9.14, 10.1, 10.2, 15.1, 15.2, 16.1 and 16.2. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Primavera Unifier. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Primavera Unifier, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Primavera Unifier accessible data as well as unauthorized read access to a subset of Primavera Unifier accessible data. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:primavera_unifier:9.13:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:primavera_unifier:9.14:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:primavera_unifier:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:primavera_unifier:10.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:primavera_unifier:15.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:primavera_unifier:15.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:*" ]
null
null
4.8
4.9
null
GHSA-3r4h-xx4c-77cj
A path traversal issue in the API endpoint in M-Files Server before version 25.6.14925.0 allows an authenticated user to read files in the server.
[]
8.4
6.5
null
null
null
GHSA-ff4w-rgwj-fx2j
In all Qualcomm products with Android releases from CAF using the Linux kernel, an output buffer is accessed in one thread and can be potentially freed in another.
[]
null
null
7.8
null
null
CVE-2022-20643
Cisco Security Manager Cross-Site Scripting Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Security Manager could allow an unauthenticated, remote attacker to conduct cross-site scripting attacks against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
[ "cpe:2.3:a:cisco:security_manager:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
GHSA-x6rc-q735-q8qg
Certain blit values provided by the user were not properly constrained leading to a heap buffer overflow on some video drivers. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.
[]
null
null
null
null
null
CVE-2023-20157
Cisco Small Business Series Switches Buffer Overflow Vulnerabilities
Multiple vulnerabilities in the web-based user interface of certain Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code with root privileges on an affected device. These vulnerabilities are due to improper validation of requests that are sent to the web interface. For more information about these vulnerabilities, see the Details section of this advisory.
[ "cpe:2.3:o:cisco:250_series_smart_switches_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:350_series_managed_switches_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:350x_series_stackable_managed_switches_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:550x_series_stackable_managed_switches_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_250_series_smart_switches_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350_series_managed_switches_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:small_business_200_series_smart_switches_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:small_business_300_series_managed_switches_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:small_business_500_series_stackable_managed_switches_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_250-16p-2g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_250-16p-2g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_250-16t-2g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_250-16t-2g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_250-24fp-4g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_250-24fp-4g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_250-24fp-4x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_250-24fp-4x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_250-24p-4g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_250-24p-4g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_250-24p-4x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_250-24p-4x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_250-24pp-4g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_250-24pp-4g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_250-24t-4g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_250-24t-4g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_250-24t-4x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_250-24t-4x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_250-48p-4g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_250-48p-4g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_250-48p-4x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_250-48p-4x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_250-48pp-4g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_250-48pp-4g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_250-48t-4g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_250-48t-4g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_250-48t-4x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_250-48t-4x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_250-8fp-e-2g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_250-8fp-e-2g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_250-8p-e-2g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_250-8p-e-2g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_250-8pp-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_250-8pp-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_250-8pp-e-2g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_250-8pp-e-2g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_250-8t-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_250-8t-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_250-8t-e-2g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_250-8t-e-2g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-12np-4x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-12np-4x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-12xs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-12xs:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-12xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-12xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-16fp-2g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-16fp-2g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-16p-2g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-16p-2g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-16p-e-2g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-16p-e-2g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-16t-2g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-16t-2g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-16t-e-2g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-16t-e-2g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-16xts_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-16xts:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-24fp-4g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-24fp-4g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-24fp-4x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-24fp-4x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-24mgp-4x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-24mgp-4x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-24ngp-4x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-24ngp-4x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-24p-4g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-24p-4g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-24p-4x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-24p-4x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-24s-4g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-24s-4g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-24t-4g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-24t-4g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-24t-4x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-24t-4x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-24xs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-24xs:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-24xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-24xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-24xts_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-24xts:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-48fp-4g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-48fp-4g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-48fp-4x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-48fp-4x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-48ngp-4x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-48ngp-4x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-48p-4g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-48p-4g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-48p-4x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-48p-4x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-48t-4g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-48t-4g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-48t-4x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-48t-4x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-48xt-4x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-48xt-4x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-8fp-2g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-8fp-2g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-8fp-e-2g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-8fp-e-2g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-8mgp-2x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-8mgp-2x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-8mp-2x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-8mp-2x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-8p-2g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-8p-2g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-8p-e-2g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-8p-e-2g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-8s-e-2g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-8s-e-2g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-8t-e-2g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-8t-e-2g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_350-8xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_350-8xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf200-24_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf200-24fp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf200-24p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf200-48_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf200-48p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf200e-24_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf200e-24:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf200e-24p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf200e-24p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf200e-48_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf200e-48:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf200e-48p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf200e-48p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf200e48p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf200e48p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf250-08_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf250-08:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf250-08hp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf250-08hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf250-10p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf250-10p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf250-18_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf250-18:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf250-24_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf250-24p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf250-26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf250-26:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf250-26hp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf250-26hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf250-26p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf250-26p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf250-48_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf250-48hp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf250-50_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf250-50:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf250-50hp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf250-50hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf250-50p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf250-50p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf250x-24_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf250x-24:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf250x-24p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf250x-24p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf250x-48_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf250x-48:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf250x-48p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf250x-48p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf300-08_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf300-24_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf300-24mp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf300-24p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf300-24pp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf300-48_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf300-48p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf300-48pp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf302-08_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf302-08mpp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf302-08pp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf350-08_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf350-08:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf350-10_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf350-10:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf350-10mp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf350-10mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf350-10p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf350-10p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf350-10sfp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf350-10sfp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf350-20_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf350-20:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf350-24_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf350-24:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf350-24mp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf350-24mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf350-24p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf350-24p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf350-28_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf350-28:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf350-28mp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf350-28mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf350-28p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf350-28p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf350-28sfp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf350-28sfp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf350-48_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf350-48mp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf350-48p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf350-52_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf350-52:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf350-52mp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf350-52mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf350-52p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf350-52p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf350-8mp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf350-8mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf350-8pd_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf350-8pd:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf352-08_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf352-08:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf352-08mp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf352-08mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf352-08p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf352-08p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf355-10p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf355-10p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf500-18p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf500-18p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf500-24_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf500-24mp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf500-24mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf500-24p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf500-48_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf500-48mp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf500-48mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf500-48p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf550x-24_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf550x-24mp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf550x-24p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf550x-48_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf550x-48mp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf550x-48p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg200-08_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg200-08p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg200-10fp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg200-18_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg200-26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg200-26fp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg200-26p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg200-50_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg200-50fp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg200-50p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250-08_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250-08:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250-08hp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250-08hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250-10p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250-10p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250-18_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250-18:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250-24_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250-24:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250-24p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250-24p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250-26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250-26:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250-26hp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250-26hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250-26p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250-26p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250-48_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250-48:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250-48hp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250-48hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250-50_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250-50:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250-50hp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250-50hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250-50p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250-50p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250x-24_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250x-24:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250x-24p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250x-24p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250x-48_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250x-48:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg250x-48p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg250x-48p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-10_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-10mp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-10mpp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-10p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-10pp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-10sfp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-20_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-28_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-28mp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-28p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-28pp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-28sfp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-28sfp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-52_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-52mp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-52p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350-10_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350-10mp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350-10p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350-28_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350-28mp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350-28p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350x-12pmv_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350x-12pmv:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350x-24_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350x-24mp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350x-24p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350x-24pd_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350x-24pd:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350x-24pv_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350x-24pv:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350x-48_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350x-48mp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350x-48p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350x-48pv_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350x-48pv:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350x-8pmd_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350x-8pmd:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350xg-24f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350xg-24t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350xg-2f10_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg350xg-48t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg355-10mp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg355-10mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg355-10p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500-28_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500-28mpp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500-28p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500-28pp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500-28pp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500-52p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500-52pp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500-52pp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500x-24_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500x-24mpp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500x-24mpp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500x-24p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500x-48_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500x-48mp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500x-48mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500x-48mpp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500x-48mpp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500x-48p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500x24mpp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500x24mpp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500xg8f8t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500xg8f8t:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg550x-24_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg550x-24mp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg550x-24mpp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg550x-24p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg550x-48_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg550x-48mp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg550x-48p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg550x-48t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg550x-48t:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg550xg-24f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg550xg-24f:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg550xg-24t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg550xg-24t:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg550xg-48t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg550xg-48t:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg550xg-8f8t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg550xg-8f8t:-:*:*:*:*:*:*:*" ]
null
8.6
null
null
null
CVE-2017-14818
This vulnerability allows remote attackers to disclose sensitive on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JPEG2000 images embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-4982.
[ "cpe:2.3:a:foxitsoftware:foxit_reader:8.3.1.21155:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
null
GHSA-m294-4vh4-9qwg
Memory safety bugs present in Firefox 129, Firefox ESR 128.1, and Thunderbird 128.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 130 and Firefox ESR < 128.2.
[]
null
9.8
null
null
null
GHSA-rrjx-7fgp-4597
An issue was discovered in MediaWiki through 1.37.1. The CentralAuth extension mishandles a ttl issue for groups expiring in the future.
[]
null
9.8
null
null
null
CVE-2022-36763
Heap Buffer Overflow in Tcg2MeasureGptTable
EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.
[ "cpe:2.3:a:tianocore:edk2:*:*:*:*:*:*:*:*" ]
null
7
null
null
null
CVE-2002-2376
Cross-site scripting (XSS) vulnerability in E-Guest_sign.pl in E-Guest 1.1 allows remote attackers to inject arbitrary SSI directives, web script, and HTML via the (1) full name, (2) email, (3) homepage, and (4) location parameters. NOTE: this issue might overlap CVE-2005-1605.
[ "cpe:2.3:a:leung:e-guest:1.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2015-1834
A path traversal vulnerability was identified in the Cloud Foundry component Cloud Controller that affects cf-release versions prior to v208 and Pivotal Cloud Foundry Elastic Runtime versions prior to 1.4.2. Path traversal is the 'outbreak' of a given directory structure through relative file paths in the user input. It aims at accessing files and directories that are stored outside the web root folder, for disallowed reading or even executing arbitrary system commands. An attacker could use a certain parameter of the file path for instance to inject '../' sequences in order to navigate through the file system. In this particular case a remote authenticated attacker can exploit the identified vulnerability in order to upload arbitrary files to the server running a Cloud Controller instance - outside the isolated application container.
[ "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:*:*:*:*:*:*:*:*" ]
null
6.5
null
4
null
CVE-2018-7930
The Near Field Communication (NFC) module in Mate 9 Huawei mobile phones with the versions before MHA-L29B 8.0.0.366(C567) has an information leak vulnerability due to insufficient validation on data transfer requests. When an affected mobile phone sends files to an attacker's mobile phone using the NFC function, the attacker can obtain arbitrary files from the mobile phone, causing information leaks.
[ "cpe:2.3:o:huawei:mate_9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:mate_9:-:*:*:*:*:*:*:*" ]
null
null
5.7
2.9
null
CVE-2016-3863
Multiple stack-based buffer overflows in the AVCC reassembly implementation in Utils.cpp in libstagefright in MediaMuxer in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-09-01, and 7.0 before 2016-09-01 allow remote attackers to execute arbitrary code via a crafted media file, aka internal bug 29161888.
[ "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
null
CVE-2025-29883
File Station 5
An improper certificate validation vulnerability has been reported to affect File Station 5. If exploited, the vulnerability could allow remote attackers who have gained user access to compromise the security of the system. We have already fixed the vulnerability in the following versions: File Station 5 5.5.6.4791 and later and later
[]
8.3
null
null
null
null
GHSA-f95m-5x7w-c6wx
In Android before security patch level 2018-04-05 on Qualcomm Snapdragon Mobile MDM9640, MDM9645, MDM9650, MDM9655, SD 450, SD 625, SD 650/52, SD 810, SD 820, SD 835, while processing the IPv6 pdp address of the pdp context, a buffer overflow can occur.
[]
null
null
9.8
null
null
GHSA-wmrm-qmcx-9r68
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ABCApp Creator allows PHP Local File Inclusion.This issue affects ABCApp Creator: from n/a through 1.1.2.
[]
null
8.1
null
null
null
GHSA-qrm5-6xmw-6xcq
The Custom Post Type and Taxonomy GUI Manager WordPress plugin through 1.1 does not have CSRF, and is lacking sanitising as well as escaping in some parameters, allowing attackers to make a logged in admin put Stored Cross-Site Scripting payloads via CSRF
[]
null
4.8
null
null
null
PYSEC-2023-188
null
When deserializing untrusted or corrupted data, it is possible for a reader to consume memory beyond the allowed constraints and thus lead to out of memory on the system. This issue affects Java applications using Apache Avro Java SDK up to and including 1.11.2. Users should update to apache-avro version 1.11.3 which addresses this issue.
[]
null
7.5
null
null
null
GHSA-jc33-cg9p-57rj
sudo 1.6.0 through 1.6.3p7 does not properly clear the environment before calling the mail program, which could allow local users to gain root privileges by modifying environment variables and changing how the mail program is invoked.
[]
null
null
null
null
null
GHSA-69jq-qr7w-j7qh
FlowiseAI Flowise arbitrary file upload vulnerability
FlowiseAI Flowise v2.2.6 was discovered to contain an arbitrary file upload vulnerability in /api/v1/attachments.
[]
8.9
null
null
null
null
CVE-2023-40641
In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed
[ "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
CVE-2019-0220
A vulnerability was found in Apache HTTP Server 2.4.0 to 2.4.38. When the path component of a request URL contains multiple consecutive slashes ('/'), directives such as LocationMatch and RewriteRule must account for duplicates in regular expressions while other aspects of the servers processing will implicitly collapse them.
[ "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*" ]
null
null
5.3
5
null
CVE-2019-11049
mail() may release string with refcount==1 twice
In PHP versions 7.3.x below 7.3.13 and 7.4.0 on Windows, when supplying custom headers to mail() function, due to mistake introduced in commit 78f4b4a2dcf92ddbccea1bb95f8390a18ac3342e, if the header is supplied in lowercase, this can result in double-freeing certain memory locations.
[ "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:7.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:tenable:securitycenter:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
GHSA-7x65-3xvm-x7wq
Unchecked Return Value in GitHub repository gpac/gpac prior to 2.2.2.
[]
null
null
4.4
null
null
GHSA-5wc7-47m4-35qh
Multiple cross-site scripting (XSS) vulnerabilities in index.php in HB-NS 1.1.6 allow remote attackers to inject arbitrary web script or HTML via the (1) poster_name, (2) poster_email, (3) poster_homepage, or (4) message parameter.
[]
null
null
null
null
null
GHSA-x4q2-p9fr-44ff
A vulnerability was found in Talend Open Studio for MDM. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file org.talend.mdm.core/src/com/amalto/core/storage/SystemStorageWrapper.java. The manipulation leads to xml external entity reference. Upgrading to version 20221220_1938 is able to address this issue. The name of the patch is 95590db2ad6a582c371273ceab1a73ad6ed47853. It is recommended to upgrade the affected component. The identifier VDB-216997 was assigned to this vulnerability.
[]
null
4.3
null
null
null
CVE-2025-30205
kanidm-provision leaks provisioned admin credentials into the system log
kanidim-provision is a helper utility that uses kanidm's API to provision users, groups and oauth2 systems. Prior to version 1.2.0, a faulty function intrumentation in the (optional) kanidm patches provided by kandim-provision will cause the provisioned admin credentials to be leaked to the system log. This only impacts users which both use the provided patches and provision their `admin` or `idm_admin` account credentials this way. No other credentials are affected. Users should recompile kanidm with the newest patchset from tag `v1.2.0` or higher. As a workaround, the user can set the log level `KANIDM_LOG_LEVEL` to any level higher than `info`, for example `warn`.
[]
null
7.6
null
null
null
GHSA-wxwf-h485-h4x8
In Delinea PAM Secret Server 11.4, it is possible for an attacker (with Administrator access to the Secret Server machine) to read the following data from a memory dump: the decrypted master key, database credentials (when SQL Server Authentication is enabled), the encryption key of RabbitMQ queue messages, and session cookies.
[]
null
6.7
null
null
null
CVE-2011-4537
Multiple buffer overflows in 7-Technologies (7T) Interactive Graphical SCADA System (IGSS) 9.0.0.11355 and earlier allow remote attackers to execute arbitrary code or cause a denial of service via a crafted packet to TCP port (1) 12397 or (2) 12399.
[ "cpe:2.3:a:7t:igss:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-5vvg-7wfp-qh9p
The blockchain node in FISCO-BCOS V2.7.2 may have a bug when dealing with unformatted packet and lead to a crash. A malicious node can send a packet continuously. The packet is in an incorrect format and cannot be decoded by the node correctly. As a result, the node may consume the memory sustainably and crash. More details are shown at: https://github.com/FISCO-BCOS/FISCO-BCOS/issues/1951
[]
null
7.5
null
null
null
CVE-2025-31342
Galaxy Software Services Vitals ESP Forum Module - Unrestricted Upload of File with Dangerous Type
An unrestricted upload of file with dangerous type vulnerability in the upload file function of Galaxy Software Services Corporation Vitals ESP Forum Module through 1.3 version allows remote authenticated users to execute arbitrary system commands via a malicious file.
[]
9.3
null
null
null
null
GHSA-98gp-4cxp-48r2
Apple Type Services (ATS) in Apple OS X before 10.9.2 allows attackers to bypass the App Sandbox protection mechanism via crafted Mach messages that trigger memory corruption.
[]
null
null
null
null
null
GHSA-g8rg-m62r-h7gq
By default, dedicated folders of ZONEPOINT for Windows up to 2024.1 can be accessed by other users to misuse technical files and make them perform tasks with higher privileges. Configuration of ZONEPOINT has to be modified to prevent this vulnerability.
[]
null
7.8
null
null
null
CVE-2019-13737
Insufficient policy enforcement in autocomplete in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:x64:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:x86:*", "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:x64:*", "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:x86:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:x64:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:x86:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:x64:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:x86:*" ]
null
6.5
null
4.3
null
CVE-2021-1568
Cisco AnyConnect Secure Mobility Client for Windows Denial of Service Vulnerability
A vulnerability in Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected system. This vulnerability is due to uncontrolled memory allocation. An attacker could exploit this vulnerability by copying a crafted file to a specific folder on the system. A successful exploit could allow the attacker to crash the VPN Agent service when the affected application is launched, causing it to be unavailable to all users of the system. To exploit this vulnerability, the attacker must have valid credentials on a multiuser Windows system.
[ "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:*:*:*:*:*:windows:*:*" ]
null
5.5
null
null
null
GHSA-8hc3-wrhh-6crh
The server in Blackboard Academic Suite 7.x stores MD5 password hashes that are provided directly by clients, which makes it easier for remote attackers to access accounts via a modified client that skips the javascript/md5.js hash calculation, and instead sends an arbitrary MD5 string.
[]
null
null
null
null
null
CVE-2023-52195
WordPress Posts to Page Plugin <= 1.7 is vulnerable to Cross Site Scripting (XSS)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Posts to Page Kerry James allows Stored XSS.This issue affects Kerry James: from n/a through 1.7.
[ "cpe:2.3:a:kerryjames:posts_to_page:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
null
null
GHSA-52m7-gvgw-j355
Amzetta zPortal Windows zClient is affected by Integer Overflow. IOCTL Handler 0x22001B in the Amzetta zPortal Windows zClient <= v3.2.8180.148 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
[]
null
null
null
null
null
GHSA-5p9v-45c4-qx9w
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.
[]
null
8.8
null
null
null
CVE-2022-24765
Uncontrolled search for the Git directory in Git for Windows
Git for Windows is a fork of Git containing Windows-specific patches. This vulnerability affects users working on multi-user machines, where untrusted parties have write access to the same hard disk. Those untrusted parties could create the folder `C:\.git`, which would be picked up by Git operations run supposedly outside a repository while searching for a Git directory. Git would then respect any config in said Git directory. Git Bash users who set `GIT_PS1_SHOWDIRTYSTATE` are vulnerable as well. Users who installed posh-gitare vulnerable simply by starting a PowerShell. Users of IDEs such as Visual Studio are vulnerable: simply creating a new project would already read and respect the config specified in `C:\.git\config`. Users of the Microsoft fork of Git are vulnerable simply by starting a Git Bash. The problem has been patched in Git for Windows v2.35.2. Users unable to upgrade may create the folder `.git` on all drives where Git commands are run, and remove read/write access from those folders as a workaround. Alternatively, define or extend `GIT_CEILING_DIRECTORIES` to cover the _parent_ directory of the user profile, e.g. `C:\Users` if the user profile is located in `C:\Users\my-user-name`.
[ "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
6
null
null
null
GHSA-94r6-87q5-99jj
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0889, CVE-2020-0953, CVE-2020-0959, CVE-2020-0960, CVE-2020-0992, CVE-2020-0994, CVE-2020-0995, CVE-2020-0999, CVE-2020-1008.
[]
null
null
null
null
null
GHSA-64jp-4xjj-prcw
Multiple Server-Side Request Forgery (SSRF) vulnerabilities were identified in the significant-gravitas/autogpt repository, specifically in the GitHub Integration and Web Search blocks. These vulnerabilities affect version agpt-platform-beta-v0.1.1. The issues arise when block inputs are controlled by untrusted sources, leading to potential credential leakage, internal network scanning, and unauthorized access to internal services, APIs, or data stores. The affected blocks include GithubListPullRequestsBlock, GithubReadPullRequestBlock, GithubAssignPRReviewerBlock, GithubListPRReviewersBlock, GithubUnassignPRReviewerBlock, GithubCommentBlock, GithubMakeIssueBlock, GithubReadIssueBlock, GithubListIssuesBlock, GithubAddLabelBlock, GithubRemoveLabelBlock, GithubListBranchesBlock, and ExtractWebsiteContentBlock.
[]
null
null
6.5
null
null
CVE-2011-3823
Yamamah 1.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by themes/default/index.php and certain other files.
[ "cpe:2.3:a:yamamah:yamamah:1.0:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-wqj8-465w-mxwg
SQL injection vulnerability in lpro.php in Free Links Directory Script (FLDS) 1.2a allows remote attackers to execute arbitrary SQL commands via the id parameter.
[]
null
null
null
null
null
GHSA-4gc8-g785-gxxw
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Pepro Dev. Group PeproDev Ultimate Invoice.This issue affects PeproDev Ultimate Invoice: from n/a through 1.9.7.
[]
null
5.3
null
null
null
CVE-2024-13926
WP-Syntax <= 1.2 - Author+ Potential ReDoS
The WP-Syntax WordPress plugin through 1.2 does not properly handle input, allowing an attacker to create a post containing a large number of tags, thereby exploiting a catastrophic backtracking issue in the regular expression processing to cause a DoS.
[]
null
7.5
null
null
null
CVE-2021-43298
The code that performs password matching when using 'Basic' HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver's response time until the unauthorized (401) response.
[ "cpe:2.3:a:embedthis:goahead:*:*:*:*:*:*:*:*" ]
null
9.8
null
5
null
CVE-2018-4423
A logic issue was addressed with improved validation. This issue affected versions prior to macOS Mojave 10.14.1.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
null
CVE-2021-26987
Element Plug-in for vCenter Server incorporates SpringBoot Framework. SpringBoot Framework versions prior to 1.3.2 are susceptible to a vulnerability which when successfully exploited could lead to Remote Code Execution. All versions of Element Plug-in for vCenter Server, Management Services versions prior to 2.17.56 and Management Node versions through 12.2 contain vulnerable versions of SpringBoot Framework.
[ "cpe:2.3:a:vmware:spring_boot:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:element_plug-in_for_vcenter_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:management_services_for_element_software_and_netapp_hci:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-j325-h69m-f57c
Buffer Overflow vulnerability in NAS devices. QTS allows attackers to run arbitrary code. This issue affects: QNAP Systems Inc. QTS version 4.2.6 and prior versions on build 20180711; version 4.3.3 and prior versions on build 20180725; version 4.3.4 and prior versions on build 20180710.
[]
null
null
9.8
null
null
CVE-2017-17511
KildClient 3.1.0 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL, related to prefs.c and worldgui.c.
[ "cpe:2.3:a:kildclient:kildclient:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
CVE-2005-2185
eRoom does not set an expiration for Cookies, which allows remote attackers to capture cookies and conduct replay attacks.
[ "cpe:2.3:a:emc:eroom:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:emc:eroom:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:emc:eroom:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:emc:eroom:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:emc:eroom:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:emc:eroom:6.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:emc:eroom:6.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:emc:eroom:6.0.7:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2011-0525
Batavi before 1.0 has CSRF.
[ "cpe:2.3:a:batavi:batavi:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
null
GHSA-96rp-9wxg-vm42
Rejected reason: Not used
[]
null
null
null
null
null
RHSA-2010:0963
Red Hat Security Advisory: JBoss Enterprise Application Platform 5.1.0 security update
JBoss Remoting Denial-Of-Service
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5.1" ]
null
null
null
null
null
CVE-2022-38398
Server-Side Request Forgery Information Disclosure Vulnerability
Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache XML Graphics allows an attacker to load a url thru the jar protocol. This issue affects Apache XML Graphics Batik 1.14.
[ "cpe:2.3:a:apache:batik:1.14:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
5.3
null
null
null
CVE-2018-9565
In readBytes of xltdecwbxml.c, there is a possible out of bounds read due to an integer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-16680558.
[ "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
GHSA-hpf8-fq4j-xr48
SQL injection vulnerability in hava_post.php in Havalite CMS 1.1.0 and earlier allows remote attackers to execute arbitrary SQL commands via the postId parameter.
[]
null
null
null
null
null
RHSA-2017:1445
Red Hat Security Advisory: python-django security update
python-django: Open redirect and possible XSS attack via user-supplied numeric redirect URLs
[ "cpe:/a:redhat:openstack:6::el7" ]
null
null
6.1
null
null
GHSA-66h6-4ppg-82p8
Removed group members were able to use the To-Do functionality to retrieve updated information on confidential epics starting in GitLab EE 13.2 before 13.6.2.
[]
null
null
null
null
null
GHSA-4h9c-v5vg-5m6m
Access to restricted PHP code by dynamic static class access in smarty
ImpactTemplate authors could run restricted static php methods.PatchesPlease upgrade to 3.1.40 or higher.ReferencesSee the [documentation on Smarty security features](https://www.smarty.net/docs/en/advanced.features.tpl#advanced.features.security) on the static_classes access filter.For more informationIf you have any questions or comments about this advisory please open an issue in [the Smarty repo](https://github.com/smarty-php/smarty)
[]
null
8.8
null
null
null
GHSA-f8r4-mf27-rf7m
Finance.js vulnerable to DoS via the IRR function’s depth parameter
Finance.js v4.1.0 contains a Denial of Service (DoS) vulnerability via the IRR function’s depth parameter. Improper handling of the recursion/iteration limit can lead to excessive CPU usage, causing application stalls or crashes.
[]
null
7.5
null
null
null
GHSA-8fw4-xh83-3j6q
Cross-Site Scripting in diagram-js
Versions of `diagram-js` prior to 3.3.1 (for 3.x) and 2.6.2 (for 2.x) are vulnerable to Cross-Site Scripting. The package fails to escape output of user-controlled input in `search-pad`, allowing attackers to execute arbitrary JavaScript.RecommendationIf you are using diagram-js 3.x, upgrade to version 3.3.1. If you are using diagram-js 2.x, upgrade to version 2.6.2.
[]
null
null
null
null
null
CVE-2024-20841
Improper Handling of Insufficient Privileges in Samsung Account prior to version 14.8.00.3 allows local attackers to access data.
[]
null
5.1
null
null
null
CVE-2024-12188
1000 Projects Library Management System stu.php sql injection
A vulnerability was found in 1000 Projects Library Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /brains/stu.php. The manipulation of the argument useri leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:1000projects:library_management_system:1.0:*:*:*:*:*:*:*" ]
6.9
7.3
7.3
7.5
null
CVE-2024-34982
An arbitrary file upload vulnerability in the component /include/file.php of lylme_spage v1.9.5 allows attackers to execute arbitrary code via uploading a crafted file.
[ "cpe:2.3:a:lylme:lylme_spage:1.9.5:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2018-1154
In SecurityCenter versions prior to 5.7.0, a username enumeration issue could allow an unauthenticated attacker to automate the discovery of username aliases via brute force, ultimately facilitating unauthorized access. Server response output has been unified to correct this issue.
[ "cpe:2.3:a:tenable:securitycenter:*:*:*:*:*:*:*:*" ]
null
null
8.8
3.3
null
GHSA-75rf-h4vm-w82h
StrangeBee TheHive 5.2.0 to 5.2.8 is vulnerable to Cross Site Scripting (XSS) in the case reporting functionality. This feature allows an attacker to insert malicious JavaScript code inside the template or its variables, that will be executed in the context of the TheHive application when the HTML report is opened.
[]
null
5.4
null
null
null
GHSA-3v56-q6r6-4gcw
Insecure Inherited Permissions in neoan3-apps/template
ImpactVersions prior 1.1.1 have allowed for passing in closures directly into the template engine. As a result values that are callable are executed by the template engine. The issue arises if a value has the same name as a method or function in scope and can therefore be executed either by mistake or maliciously.In theory all users of the package are affected as long as they either deal with direct user input or database values. A multi-step attack on is therefore plausible.PatchesVersion 1.1.1 has addressed this vulnerability.WorkaroundsUnfortunately only working with hardcoded values is safe in prior versions. As this likely defeats the purpose of a template engine, please upgrade.ReferencesAs a possible exploit is relatively easy to achieve, I will not share steps to reproduce the issue for now.For more informationIf you have any questions or comments about this advisory:Open an issue in [our repo](https://github.com/sroehrl/neoan3-template)
[]
null
7.5
null
null
null
CVE-2020-28575
A heap-based buffer overflow privilege escalation vulnerability in Trend Micro ServerProtect for Linux 3.0 may allow an attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute high-privileged code on the target in order to exploit this vulnerability.
[ "cpe:2.3:a:trendmicro:serverprotect:3.0:*:*:*:*:linux:*:*" ]
null
6.7
null
4.6
null
CVE-2022-25786
GateManager debug interface is included in production builds
Unprotected Alternate Channel vulnerability in debug console of GateManager allows system administrator to obtain sensitive information. This issue affects: GateManager all versions prior to 9.7.
[ "cpe:2.3:a:secomea:gatemanager:*:*:*:*:*:*:*:*" ]
null
4.9
null
null
null
CVE-2024-57069
A prototype pollution in the lib function of expand-object v0.4.2 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload.
[]
null
7.5
null
null
null
CVE-2007-1287
A regression error in the phpinfo function in PHP 4.4.3 to 4.4.6, and PHP 6.0 in CVS, allows remote attackers to conduct cross-site scripting (XSS) attacks via GET, POST, or COOKIE array values, which are not escaped in the phpinfo output, as originally fixed for CVE-2005-3388.
[ "cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:6.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2012-1222
Stack-based buffer overflow in RabidHamster R2/Extreme 1.65 and earlier allows remote authenticated users to execute arbitrary code via a long string to TCP port 23.
[ "cpe:2.3:a:rabidhamster:r2\\/extreme:*:*:*:*:*:*:*:*", "cpe:2.3:a:rabidhamster:r2\\/extreme:1.51:*:*:*:*:*:*:*" ]
null
null
null
8.5
null
CVE-2015-6075
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6068, CVE-2015-6072, CVE-2015-6073, CVE-2015-6077, CVE-2015-6079, CVE-2015-6080, and CVE-2015-6082.
[ "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-q37w-9m74-wmpg
Multiple cross-site scripting (XSS) vulnerabilities in Michael Salzer Guestbox 0.6, and other versions before 0.8, allow remote attackers to inject arbitrary web script or HTML via (1) HTML tags that follow a "http://" string, which bypasses a regular expression check, and (2) other unspecified attack vectors.
[]
null
null
null
null
null
RHSA-2022:7482
Red Hat Security Advisory: qt5 security, bug fix, and enhancement update
qt: QProcess could execute a binary from the current working directory when not found in the PATH
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.8
null
null
null
CVE-2021-47153
i2c: i801: Don't generate an interrupt on bus reset
In the Linux kernel, the following vulnerability has been resolved: i2c: i801: Don't generate an interrupt on bus reset Now that the i2c-i801 driver supports interrupts, setting the KILL bit in a attempt to recover from a timed out transaction triggers an interrupt. Unfortunately, the interrupt handler (i801_isr) is not prepared for this situation and will try to process the interrupt as if it was signaling the end of a successful transaction. In the case of a block transaction, this can result in an out-of-range memory access. This condition was reproduced several times by syzbot: https://syzkaller.appspot.com/bug?extid=ed71512d469895b5b34e https://syzkaller.appspot.com/bug?extid=8c8dedc0ba9e03f6c79e https://syzkaller.appspot.com/bug?extid=c8ff0b6d6c73d81b610e https://syzkaller.appspot.com/bug?extid=33f6c360821c399d69eb https://syzkaller.appspot.com/bug?extid=be15dc0b1933f04b043a https://syzkaller.appspot.com/bug?extid=b4d3fd1dfd53e90afd79 So disable interrupts while trying to reset the bus. Interrupts will be enabled again for the following transaction.
[]
null
6
null
null
null