id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
GHSA-5xf9-3v63-ww6f
Uncontrolled Resource Consumption in Apache CXF
Apache CXF before 2.6.14 and 2.7.x before 2.7.11 allows remote attackers to cause a denial of service (/tmp disk consumption) via a large invalid SOAP message.
[]
null
null
null
null
null
CVE-2023-52227
WordPress MailerLite – WooCommerce integration plugin <= 2.0.8 - Broken Access Control vulnerability
Missing Authorization vulnerability in MailerLite MailerLite – WooCommerce integration.This issue affects MailerLite – WooCommerce integration: from n/a through 2.0.8.
[]
null
4.3
null
null
null
CVE-2023-51691
WordPress wpDiscuz Plugin <= 7.6.12 is vulnerable to Cross Site Scripting (XSS)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in gVectors Team Comments – wpDiscuz allows Stored XSS.This issue affects Comments – wpDiscuz: from n/a through 7.6.12.
[ "cpe:2.3:a:gvectors:wpdiscuz:*:*:*:*:*:wordpress:*:*" ]
null
5.9
null
null
null
CVE-2024-46480
An NTLM hash leak in Venki Supravizio BPM up to 18.0.1 allows authenticated attackers with Application Administrator access to escalate privileges on the underlying host system.
[]
null
8.4
null
null
null
CVE-2016-10943
The zx-csv-upload plugin 1 for WordPress has SQL injection via the id parameter.
[ "cpe:2.3:a:zx-csv-upload_project:zx-csv-upload:1.0:*:*:*:*:wordpress:*:*" ]
null
7.2
null
6.5
null
GHSA-vgrw-7cvw-pwgx
A vulnerability was found in PyTorch 2.6.0. It has been rated as critical. Affected by this issue is the function torch.nn.utils.rnn.unpack_sequence. The manipulation leads to memory corruption. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
[]
4.8
5.3
null
null
null
GHSA-r34r-8rcg-frg4
An XSS issue was discovered in the SocialProfile extension in MediaWiki through 1.36. Within several gift-related special pages, a privileged user with the awardmanage right could inject arbitrary HTML and JavaScript within various gift-related data fields. The attack could easily propagate across many pages for many users.
[]
null
null
null
null
null
CVE-2022-23850
xhtml_translate_entity in xhtml.c in epub2txt (aka epub2txt2) through 2.02 allows a stack-based buffer overflow via a crafted EPUB document.
[ "cpe:2.3:a:epub2txt_project:epub2txt:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
null
GHSA-939c-m67r-x459
Cross-site scripting (XSS) vulnerability in Blackcat CMS 1.2 allows remote authenticated users to inject arbitrary web script or HTML via the map_language parameter to backend/pages/lang_settings.php.
[]
null
null
5.4
null
null
GHSA-hwjp-953c-q8wq
Unspecified vulnerability on the HP ProCurve 1800-24G switch with software PB.03.02 and earlier, and the ProCurve 1800-8G switch with software PA.03.02 and earlier, when SNMP is enabled, allows remote attackers to obtain sensitive information via unknown vectors.
[]
null
null
null
null
null
CVE-2016-7970
Buffer overflow in the calc_coeff function in libass/ass_blur.c in libass before 0.13.4 allows remote attackers to cause a denial of service via unspecified vectors.
[ "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*", "cpe:2.3:a:libass_project:libass:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
GHSA-239j-jjxf-wwcj
Cross-site scripting (XSS) vulnerability in cgi-bin/bgplg in the web interface for the BGPD daemon in OpenBSD 4.1 allows remote attackers to inject arbitrary web script or HTML via the cmd parameter.
[]
null
null
null
null
null
CVE-2025-7263
IrfanView CADImage Plugin CGM File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
IrfanView CADImage Plugin CGM File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView CADImage Plugin. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of CGM files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26170.
[]
null
null
7.8
null
null
GHSA-rphm-82wp-ppfq
Multiple "buffer management errors" in OpenSSH before 3.7.1 may allow attackers to cause a denial of service or execute arbitrary code using (1) buffer_init in buffer.c, (2) buffer_free in buffer.c, or (3) a separate function in channels.c, a different vulnerability than CVE-2003-0693.
[]
null
null
null
null
null
CVE-2012-0478
The texImage2D implementation in the WebGL subsystem in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 does not properly restrict JSVAL_TO_OBJECT casts, which might allow remote attackers to execute arbitrary code via a crafted web page.
[ "cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:8.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:9.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:9.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:10.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:10.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird_esr:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird_esr:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird_esr:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird_esr:10.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:*:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.3:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.3:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.3:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.4:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.4:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.4:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.5:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.5:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.5:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.5:beta4:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.6:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.6:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.6:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.6:beta4:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.7:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.7:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.7:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.7:beta4:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.7:beta5:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.8:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.8:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.8:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.8:beta4:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.8:beta5:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.8:beta6:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.9:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.9:beta2:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-grfg-rxx4-pppc
Cross-Site Request Forgery (CSRF) vulnerability in Pixelative, Mohsin Rafique AMP WP – Google AMP For WordPress plugin <= 1.5.15 versions.
[]
null
5.4
null
null
null
CVE-2025-3862
Contest Gallery <= 26.0.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via id Parameter
Contest Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘id’ parameter in all versions up to, and including, 26.0.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
CVE-2018-6023
Fastweb FASTgate 0.00.47 devices are vulnerable to CSRF, with impacts including Wi-Fi password changing, Guest Wi-Fi activating, etc.
[ "cpe:2.3:o:fastweb:fastgate_firmware:0.00.47:*:*:*:*:*:*:*", "cpe:2.3:h:fastweb:fastgate:-:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
GHSA-33q7-797m-mc98
Cross-site scripting (XSS) vulnerability in cat.php in KloNews 2.0 allows remote attackers to inject arbitrary web script or HTML via the cat parameter.
[]
null
null
null
null
null
CVE-2021-23169
A heap-buffer overflow was found in the copyIntoFrameBuffer function of OpenEXR in versions before 3.0.1. An attacker could use this flaw to execute arbitrary code with the permissions of the user running the application compiled against OpenEXR.
[ "cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
null
CVE-2008-5841
Multiple SQL injection vulnerabilities in iGaming 1.5 and earlier allow remote attackers to execute arbitrary SQL commands via the browse parameter to (1) previews.php and (2) reviews.php, and the (3) id parameter to index.php in a viewarticle action.
[ "cpe:2.3:a:igamingcms:igaming_cms:*:*:*:*:*:*:*:*", "cpe:2.3:a:igamingcms:igaming_cms:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:igamingcms:igaming_cms:1.4.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-q54q-8x7m-55w5
autohtml.php in php-proxima 6.0 and earlier allows remote attackers to read arbitrary files via the name parameter in a modload operation.
[]
null
null
null
null
null
CVE-2017-7351
A SQL injection issue exists in a file upload handler in REDCap 7.x before 7.0.11 via a trailing substring to SendITController:upload.
[ "cpe:2.3:a:vanderbilt:redcap:*:*:*:*:*:*:*:*" ]
null
null
8.8
4
null
GHSA-jcch-vmhx-5jrf
Vulnerability in (1) Book of guests and (2) Post it! allows remote attackers to execute arbitrary code via shell metacharacters in the email parameter.
[]
null
null
null
null
null
GHSA-9mrj-wq9r-h4vw
An issue was discovered in Sangoma Asterisk 16.x before 16.16.1, 17.x before 17.9.2, and 18.x before 18.2.1 and Certified Asterisk before 16.8-cert6. When re-negotiating for T.38, if the initial remote response was delayed just enough, Asterisk would send both audio and T.38 in the SDP. If this happened, and the remote responded with a declined T.38 stream, then Asterisk would crash.
[]
null
null
null
null
null
CVE-2013-3346
Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*" ]
null
9.8
null
10
null
CVE-2024-12127
Learning Management System, eLearning, Course Builder, WordPress LMS Plugin – Sikshya LMS <= 0.0.21 - Reflected Cross-Site Scripting via page Parameter
The Learning Management System, eLearning, Course Builder, WordPress LMS Plugin – Sikshya LMS plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘page’ parameter in all versions up to, and including, 0.0.21 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
null
6.1
null
null
null
CVE-2019-13623
In NSA Ghidra before 9.1, path traversal can occur in RestoreTask.java (from the package ghidra.app.plugin.core.archive) via an archive with an executable file that has an initial ../ in its filename. This allows attackers to overwrite arbitrary files in scenarios where an intermediate analysis result is archived for sharing with other persons. To achieve arbitrary code execution, one approach is to overwrite some critical Ghidra modules, e.g., the decompile module.
[ "cpe:2.3:a:nsa:ghidra:*:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
null
RHSA-2023:7201
Red Hat Security Advisory: OpenShift Container Platform 4.15.0 packages and security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. ssh: Prefix truncation attack on Binary Packet Protocol (BPP)
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9" ]
null
5.9
null
null
null
ICSA-21-315-07
Siemens Nucleus RTOS-based APOGEE and TALON Products (Update C)
ICMP echo packets with fake IP options allow sending ICMP echo reply messages to arbitrary hosts on the network. (FSMD-2021-0004) The total length of an UDP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on a user-defined applications that runs on top of the UDP protocol. (FSMD-2021-0006) The total length of an ICMP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on the network buffer organization in memory. (FSMD-2021-0007) When processing a DHCP OFFER message, the DHCP client application does not validate the length of the Vendor option(s), leading to Denial-of-Service conditions. (FSMD-2021-0008) The DHCP client application does not validate the length of the Domain Name Server IP option(s) (0x06) when processing DHCP ACK packets. This may lead to Denial-of-Service conditions. (FSMD-2021-0011) When processing a DHCP ACK message, the DHCP client application does not validate the length of the Vendor option(s), leading to Denial-of-Service conditions. (FSMD-2021-0013) The DHCP client application assumes that the data supplied with the “Hostname” DHCP option is NULL terminated. In cases when global hostname variable is not defined, this may lead to Out-of-bound reads, writes, and Denial-of-service conditions. (FSMD-2021-0014) TFTP server application allows for reading the contents of the TFTP memory buffer via sending malformed TFTP commands. (FSMD-2021-0009) FTP server does not properly validate the length of the “USER” command, leading to stack-based buffer overflows. This may result in Denial-of-Service conditions and Remote Code Execution. (FSMD-2021-0010) FTP server does not properly validate the length of the “PWD/XPWD” command, leading to stack-based buffer overflows. This may result in Denial-of-Service conditions and Remote Code Execution. (FSMD-2021-0016) FTP server does not properly validate the length of the “MKD/XMKD” command, leading to stack-based buffer overflows. This may result in Denial-of-Service conditions and Remote Code Execution. (FSMD-2021-0018) Malformed TCP packets with a corrupted SACK option leads to Information Leaks and Denial-of-Service conditions. (FSMD-2021-0015) The total length of an TCP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on the network buffer organization in memory. (FSMD-2021-0017)
[]
null
7.5
null
null
null
CVE-2025-37912
ice: Check VF VSI Pointer Value in ice_vc_add_fdir_fltr()
In the Linux kernel, the following vulnerability has been resolved: ice: Check VF VSI Pointer Value in ice_vc_add_fdir_fltr() As mentioned in the commit baeb705fd6a7 ("ice: always check VF VSI pointer values"), we need to perform a null pointer check on the return value of ice_get_vf_vsi() before using it.
[]
null
null
null
null
null
GHSA-pq6p-2mhg-4rw5
Cross-site scripting (XSS) vulnerability in Brilliant Gallery 5.x before 5.x-4.2, a module for Drupal, allows remote authenticated users with permissions to inject arbitrary web script or HTML via unspecified vectors related to posting of answers.
[]
null
null
null
null
null
GHSA-w97j-3h9r-h9rm
Cross-Site Request Forgery (CSRF) vulnerability in Phuc Pham Multiple Admin Emails allows Cross Site Request Forgery.This issue affects Multiple Admin Emails: from n/a through 1.0.
[]
null
7.1
null
null
null
GHSA-wp4r-62fw-w7wj
A vulnerability, which was classified as critical, has been found in SourceCodester Young Entrepreneur E-Negosyo System 1.0. Affected by this issue is some unknown functionality of the file cart/controller.php?action=add. The manipulation of the argument PROID leads to sql injection. The identifier of this vulnerability is VDB-224624.
[]
null
8.8
null
null
null
GHSA-mw9x-56vq-m9qf
The WMS module lacks the authentication mechanism in some APIs. Successful exploitation of this vulnerability may affect data confidentiality.
[]
null
7.5
null
null
null
GHSA-r3jr-p57g-fw5f
An issue was discovered on ASUS RT-AC1900P routers before 3.0.0.4.385_20253. The router accepts an arbitrary server certificate for a firmware update. The culprit is the --no-check-certificate option passed to wget tool used to download firmware update files.
[]
null
null
null
null
null
CVE-2025-47711
Nbdkit: nbdkit-server: off-by-one error when processing block status may lead to a denial of service
There's a flaw in the nbdkit server when handling responses from its plugins regarding the status of data blocks. If a client makes a specific request for a very large data range, and a plugin responds with an even larger single block, the nbdkit server can encounter a critical internal error, leading to a denial-of-service.
[ "cpe:/o:redhat:enterprise_linux:10", "cpe:/o:redhat:enterprise_linux:7", "cpe:/o:redhat:enterprise_linux:8", "cpe:/a:redhat:advanced_virtualization:8::el8", "cpe:/o:redhat:enterprise_linux:9" ]
null
4.3
null
null
null
GHSA-vm9m-57jr-4pxh
Mattermost fails to limit the number of role names
Mattermost versions 8.1.x before 8.1.9, 9.2.x before 9.2.5, 9.3.0, and 9.4.x before 9.4.2 fail to limit the number of role names requested from the API, allowing an authenticated attacker to cause the server to run out of memory and crash by issuing an unusually large HTTP request.
[]
5.3
4.3
null
null
null
GHSA-pvp4-8q5g-43fg
In Eclipse OMR, from the initial contribution to version 0.4.0, some OMR internal port library and utilities consumers of z/OS atoe functions do not check their return values for NULL memory pointers or for memory allocation failures. This can lead to NULL pointer dereference crashes. Beginning in version 0.5.0, internal OMR consumers of atoe functions handle NULL return values and memory allocation failures correctly.
[]
5.1
5.5
null
null
null
GHSA-cxp8-978v-jwwr
An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
[]
null
null
8.8
null
null
GHSA-4jq7-688w-w4r4
SolarWinds Observability Self-Hosted is susceptible to Deserialization of Untrusted Data Local Privilege Escalation vulnerability. An attacker with low privileges can escalate privileges to run malicious files copied to a permission-protected folder. This vulnerability requires authentication from a low-level account and local access to the host server.
[]
null
7.8
null
null
null
CVE-2023-33293
An issue was discovered in KaiOS 3.0 and 3.1. The binary /system/kaios/api-daemon exposes a local web server on *.localhost with subdomains for each installed applications, e.g., myapp.localhost. An attacker can make fetch requests to api-deamon to determine if a given app is installed and read the manifest.webmanifest contents, including the app version.
[ "cpe:2.3:o:kaiostech:kaios:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:kaiostech:kaios:3.1:*:*:*:*:*:*:*" ]
null
5.3
null
null
null
GHSA-j42w-vpmm-467m
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPWeb Elite Docket (WooCommerce Collections / Wishlist / Watchlist) allows SQL Injection.This issue affects Docket (WooCommerce Collections / Wishlist / Watchlist): from n/a before 1.7.0.
[]
null
9.3
null
null
null
CVE-2021-41751
Buffer overflow vulnerability in file ecma-builtin-array-prototype.c:909 in function ecma_builtin_array_prototype_object_slice in Jerryscript before commit e1ce7dd7271288be8c0c8136eea9107df73a8ce2 on Oct 20, 2021.
[ "cpe:2.3:a:jerryscript:jerryscript:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-6xx4-fvpc-r9qf
In the Linux kernel, the following vulnerability has been resolved:platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store()If the 'buf' array received from the user contains an empty string, the 'length' variable will be zero. Accessing the 'buf' array element with index 'length - 1' will result in a buffer overflow.Add a check for an empty string.Found by Linux Verification Center (linuxtesting.org) with SVACE.
[]
null
null
null
null
null
CVE-2023-21862
Vulnerability in the Oracle Web Services Manager product of Oracle Fusion Middleware (component: XML Security component). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Web Services Manager. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Web Services Manager accessible data as well as unauthorized access to critical data or complete access to all Oracle Web Services Manager accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N).
[ "cpe:2.3:a:oracle:web_services_manager:12.2.1.4.0:*:*:*:*:*:*:*" ]
null
8.1
null
null
null
CVE-2024-22524
dnspod-sr 0dfbd37 is vulnerable to buffer overflow.
[ "cpe:2.3:a:dnspod:dnspod_security_recursive:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-74c9-fv35-3c68
Cross-site scripting (XSS) vulnerability in lostsheep.php in Crafty Syntax Live Help (CSLH) before 2.14.16, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: the versions claimed by the original researcher are probably incorrect.
[]
null
null
null
null
null
CVE-2019-16071
Enigma NMS 65.0.0 and prior allows administrative users to create low-privileged accounts that do not have the ability to modify any settings in the system, only view the components. However, it is possible for a low-privileged user to perform all actions as an administrator by bypassing authorization controls and sending requests to the server in the context of an administrator.
[ "cpe:2.3:a:netsas:enigma_nms:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.5
null
CVE-2019-5423
Path traversal vulnerability in http-live-simulator npm package version 1.0.5 allows arbitrary path to be accessed on the file system by a remote attacker.
[ "cpe:2.3:a:http-live-simulator_project:http-live-simulator:1.0.5:*:*:*:*:node.js:*:*" ]
null
null
7.5
5
null
CVE-2018-13189
The mint function of a smart contract implementation for Unolabo (UNLB), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[ "cpe:2.3:a:unolabo_project:unolabo:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
GHSA-qc86-j87r-2654
Failure to verify the protocol in SMM may allow an attacker to control the protocol and modify SPI flash resulting in a potential arbitrary code execution.
[]
null
7.8
null
null
null
GHSA-7wq2-cp3p-6phc
A vulnerability was found in codeprojects Online Restaurant Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/member_save.php. The manipulation of the argument last leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
[]
6.9
7.3
null
null
null
CVE-2024-40410
Cybele Software Thinfinity Workspace before v7.0.2.113 was discovered to contain a hardcoded cryptographic key used for encryption.
[ "cpe:2.3:a:cybelesoft:thinfinity_workspace:*:*:*:*:*:*:*:*" ]
null
4.8
null
null
null
GHSA-m258-frwv-27f2
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
[]
null
null
null
null
null
CVE-2021-22657
mySCADA myPRO
mySCADA myPRO: Versions 8.20.0 and prior has a feature where the API password can be specified, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.
[ "cpe:2.3:a:myscada:mypro:*:*:*:*:*:*:*:*" ]
null
10
null
null
null
GHSA-cmj5-7h2c-856r
The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘id’ parameter in all versions up to, and including, 1.3.7.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
CVE-2018-2391
Under certain conditions a malicious user can prevent legitimate users from accessing the SAP Internet Graphics Server (IGS), 7.20, 7.20EXT, 7.45, 7.49, 7.53, via IGS portwatcher service.
[ "cpe:2.3:a:sap:internet_graphics_server:7.20:*:*:*:*:*:*:*", "cpe:2.3:a:sap:internet_graphics_server:7.20ext:*:*:*:*:*:*:*", "cpe:2.3:a:sap:internet_graphics_server:7.45:*:*:*:*:*:*:*", "cpe:2.3:a:sap:internet_graphics_server:7.49:*:*:*:*:*:*:*", "cpe:2.3:a:sap:internet_graphics_server:7.53:*:*:*:*:*:*:*" ]
null
null
6.5
4
null
GHSA-j878-9p76-8q9h
Remote Procedure Call Runtime Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24492, CVE-2022-26809.
[]
null
8.8
null
null
null
GHSA-h3m8-vp3w-7c77
An issue was discovered on Samsung mobile devices with O(8.X), P(9.0), and Q(10.0) (Exynos chipsets) software. Attackers can bypass the Secure Bootloader protection mechanism via a heap-based buffer overflow to execute arbitrary code. The Samsung ID is SVE-2020-16712 (May 2020).
[]
null
null
null
null
null
CVE-2024-3348
SourceCodester Aplaya Beach Resort Online Reservation System index.php sql injection
A vulnerability classified as critical has been found in SourceCodester Aplaya Beach Resort Online Reservation System 1.0. Affected is an unknown function of the file booking/index.php. The manipulation of the argument log_email/log_pword leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259452.
[ "cpe:2.3:a:sourcecodester:aplaya_beach_resort_online_reservation_system:1.0:*:*:*:*:*:*:*" ]
null
7.3
7.3
7.5
null
CVE-2012-3563
Opera before 12.00 Beta allows remote attackers to cause a denial of service (application crash) via a web page that contains invalid character encodings.
[ "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.52:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.52:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.53:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.60:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.61:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.62:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.63:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.00:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.10:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.50:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.60:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.61:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.62:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.64:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2010-4861
SQL injection vulnerability in asearch.php in webSPELL 4.2.1 allows remote attackers to execute arbitrary SQL commands via the search parameter.
[ "cpe:2.3:a:webspell:webspell:4.2.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
RHSA-2023:4262
Red Hat Security Advisory: kpatch-patch security update
kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
[ "cpe:/o:redhat:rhel_e4s:8.4::baseos" ]
null
7.8
null
null
null
GHSA-75mx-chcf-2q32
TYPO3 Cross-Site Scripting vulnerability in typolinks
All link fields within the TYPO3 installation are vulnerable to Cross-Site Scripting as authorized editors can insert javascript commands by using the url scheme `javascript:`.
[]
null
6.1
null
null
null
CVE-2004-2480
Squid Web Proxy Cache 2.3.STABLE5 allows remote attackers to bypass security controls and access arbitrary websites via "@@" sequences in a URL within Internet Explorer.
[ "cpe:2.3:a:national_science_foundation:squid_web_proxy_cache:2.3_stable5:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-7mh2-4rfm-qrpw
Multiple cross-site request forgery (CSRF) vulnerabilities in the Personal Email Manager (PEM) in Websense TRITON AP-EMAIL before 8.0.0 allow remote attackers to hijack the authentication of unspecified victims via unknown vectors.
[]
null
null
null
null
null
GHSA-mjfm-528c-86p5
Norton Password Manager, prior to 6.3.0.2082, may be susceptible to an address spoofing issue. This type of issue may allow an attacker to disguise their origin IP address in order to obfuscate the source of network traffic.
[]
null
null
null
null
null
CVE-2006-0302
ZyXel P2000W VoIP 802.11b Wireless Phone running firmware WV.00.02 allows remote attackers to obtain sensitive information, such as MAC address and software version, by directly accessing UDP port 9090.
[ "cpe:2.3:h:zyxel:p2000w_version_2_voip_wifi_phone:wv.00.02:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2025-1119
Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin <= 1.6.8.5 - Unauthenticated Arbitrary Shortcode Execution
The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.6.8.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
[]
null
7.3
null
null
null
cisco-sa-webex-app-qrtO6YC2
Cisco Webex Meetings App Character Interface Manipulation Vulnerability
A vulnerability in the messaging interface of Cisco Webex App, formerly Webex Teams, could allow an unauthenticated, remote attacker to manipulate links or other content within the messaging interface. This vulnerability exists because the affected software does not properly handle character rendering. An attacker could exploit this vulnerability by sending messages within the application interface. A successful exploit could allow the attacker to modify the display of links or other content within the interface, potentially allowing the attacker to conduct phishing or spoofing attacks. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
4.3
null
null
null
GHSA-vfwj-j76c-r7mf
Microsoft Access Remote Code Execution Vulnerability
[]
null
7.8
null
null
null
CVE-2024-57259
sqfs_search_dir in Das U-Boot before 2025.01-rc1 exhibits an off-by-one error and resultant heap memory corruption for squashfs directory listing because the path separator is not considered in a size calculation.
[]
null
7.1
null
null
null
GHSA-h9pm-h729-wj6q
Cross-site request forgery (CSRF) vulnerability in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to hijack the authentication of arbitrary users by leveraging knowledge of a password and composing requests that perform SWAT actions.
[]
null
null
null
null
null
CVE-2020-6820
Under certain conditions, when handling a ReadableStream, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Thunderbird < 68.7.0, Firefox < 74.0.1, and Firefox ESR < 68.6.1.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" ]
null
8.1
null
6.8
null
GHSA-788w-97ww-9qj4
Missing Authorization vulnerability in JS Help Desk JS Help Desk – Best Help Desk & Support Plugin.This issue affects JS Help Desk – Best Help Desk & Support Plugin: from n/a through 2.8.3.
[]
null
5.3
null
null
null
RHSA-2025:12416
Red Hat Security Advisory: unbound security update
unbound: Unbound Cache poisoning
[ "cpe:/a:redhat:rhel_eus:9.4::appstream", "cpe:/a:redhat:rhel_eus:9.4::crb" ]
null
7.5
null
null
null
CVE-2021-36886
WordPress Contact Form 7 Database Addon – CFDB7 plugin <= 1.2.5.9 - Cross-Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability discovered in Contact Form 7 Database Addon – CFDB7 WordPress plugin (versions <= 1.2.5.9).
[ "cpe:2.3:a:ciphercoin:contact_form_7_database_addon:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
null
null
CVE-2012-6511
Multiple cross-site scripting (XSS) vulnerabilities in organizer/page/users.php in the Organizer plugin 1.2.1 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) delete_id parameter or (2) extension parameter in an "Update Setting" action to wp-admin/admin.php.
[ "cpe:2.3:a:organizer_project:organizer:*:*:*:*:*:wordpress:*:*" ]
null
null
null
4.3
null
CVE-2023-24887
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-f72j-hf57-7h84
In Audio File Library (aka audiofile) 0.3.6, there exists one NULL pointer dereference bug in ulaw2linear_buf in G711.cpp in libmodules.a that allows an attacker to cause a denial of service via a crafted file.
[]
null
null
6.5
null
null
ICSA-14-079-01
Siemens SIMATIC S7-1200 Improper Input Validation Vulnerabilities
Siemens SIMATIC S7-1200 PLCs 2.x and 3.x allow remote attackers to cause a denial of service (defect-mode transition and control outage) via crafted packets to UDP port 161 (aka the SNMP port). Siemens SIMATIC S7-1200 PLCs 2.x and 3.x allow remote attackers to cause a denial of service (defect-mode transition and control outage) via crafted packets to TCP port 102 (aka the ISO-TSAP port).
[]
null
null
null
null
null
GHSA-rgrx-5mj9-r82x
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound CMC MIGRATE allows Reflected XSS. This issue affects CMC MIGRATE: from n/a through 0.0.3.
[]
null
7.1
null
null
null
CVE-2016-10316
Jensen of Scandinavia AS Air:Link 3G (AL3G) version 2.23m (Rev. 3), Air:Link 5000AC (AL5000AC) version 1.13, and Air:Link 59300 (AL59300) version 1.04 (Rev. 4) devices allow remote attackers to conduct Open Redirect attacks via the return-url parameter to /goform/formLogout.
[ "cpe:2.3:o:jensenofscandinavia:al3g_firmware:2.23m:*:*:*:*:*:*:*", "cpe:2.3:h:jensenofscandinavia:al3g:-:*:*:*:*:*:*:*", "cpe:2.3:o:jensenofscandinavia:al5000ac_firmware:1.13:*:*:*:*:*:*:*", "cpe:2.3:h:jensenofscandinavia:al5000ac:-:*:*:*:*:*:*:*", "cpe:2.3:o:jensenofscandinavia:al59300_firmware:1.04:*:*:*:*:*:*:*", "cpe:2.3:h:jensenofscandinavia:al59300:-:*:*:*:*:*:*:*" ]
null
null
6.1
5.8
null
GHSA-j22q-32g5-7c29
www.modified-shop.org modified eCommerce Shopsoftware 2.0.2.2 rev 10690 has XXE in api/it-recht-kanzlei/api-it-recht-kanzlei.php.
[]
null
10
null
null
null
CVE-2019-13292
A SQL Injection issue was discovered in webERP 4.15. Payments.php accepts payment data in base64 format. After this is decoded, it is deserialized. Then, this deserialized data goes directly into a SQL query, with no sanitizing checks.
[ "cpe:2.3:a:weberp:weberp:4.15:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
CVE-2012-4536
The (1) domain_pirq_to_emuirq and (2) physdev_unmap_pirq functions in Xen 2.2 allows local guest OS administrators to cause a denial of service (Xen crash) via a crafted pirq value that triggers an out-of-bounds read.
[ "cpe:2.3:o:xen:xen:2.2.0:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
CVE-2016-0367
IBM Security Identity Manager Virtual Appliance 7.0.x before 7.0.1.3-ISS-SIM-IF0001 allows remote authenticated users to obtain sensitive information by reading an error message. IBM X-Force ID: 112072.
[ "cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.1.3:*:*:*:*:*:*:*" ]
null
null
4.3
4
null
GHSA-8999-rww7-cp8v
TCExam 11.1.015 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by public/code/tce_page_footer.php and certain other files.
[]
null
null
null
null
null
CVE-1999-1537
IIS 3.x and 4.x does not distinguish between pages requiring encryption and those that do not, which allows remote attackers to cause a denial of service (resource exhaustion) via SSL requests to the HTTPS port for normally unencrypted files, which will cause IIS to perform extra work to send the files over SSL.
[ "cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-54ww-fchf-v6h3
The shortcode-factory plugin before 1.1.1 for WordPress has XSS via add_query_arg.
[]
null
null
null
null
null
CVE-2021-39299
Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which may allow escalation of privilege and arbitrary code execution.
[ "cpe:2.3:o:hp:elite_dragonfly_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_dragonfly:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_dragonfly_g2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_dragonfly_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_dragonfly_max_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_dragonfly_max:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_x2_1013_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x2_1013_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_x2_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x2_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_x2_g8_tablet_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x2_g8_tablet:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_1050_g1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_1050_g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_830_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_830_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_830_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_830_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_830_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_830_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_830_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_830_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_836_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_836_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_836_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_836_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_aero_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_aero_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_g5_healthcare_edition_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g5_healthcare_edition:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_g6_healthcare_edition_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g6_healthcare_edition:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840r_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840r_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_846_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_846_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_850_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_850_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_850_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_850_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_850_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_850_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_850_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_850_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1030_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1030_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1030_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1030_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1030_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1030_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1030_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1030_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1040_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1040_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1040_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1040_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1040_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1040_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1040_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1040_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_830_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_830_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_830_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_830_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_830_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_830_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_830_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_830_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_430_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_430_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_430_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_430_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_430_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_430_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_430_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_430_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_440_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_440_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_440_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_440_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_450_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_450_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_450_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_450_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_470_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_470_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_630_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_630_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_640_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_640_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_640_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_640_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_640_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_640_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_640_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_640_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_650_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_650_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_650_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_650_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_650_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_650_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_650_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_650_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_11_g3_education_edition_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_11_g3_education_edition:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_11_g4_education_edition_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_11_g4_education_edition:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_11_g5_education_edition_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_11_g5_education_edition:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_11_g6_education_edition_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_11_g6_education_edition:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_11_g7_education_edition_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_11_g7_education_edition:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_440_g1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_440_g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_14u_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_14u_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_14u_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_14u_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_15_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_15_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_15u_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15u_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_15u_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15u_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_17_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_17_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_17_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_17_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_create_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_create_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_firefly_14_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_firefly_14_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_firefly_14_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_firefly_14_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_firefly_15_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_firefly_15_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_firefly_15_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_firefly_15_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_fury_15_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_fury_15_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_fury_15_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_fury_15_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_fury_17_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_fury_17_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_fury_17_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_fury_17_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_power_15_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_power_15_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_power_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_power_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_studio_15_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_studio_15_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_studio_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_studio_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_studio_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_studio_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_studio_x360_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_studio_x360_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_13_g2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_13_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_14_g2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_14_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_14_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_14_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_14_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_14_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_15_g2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_15_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_15_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_15_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_g1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_x_13_g2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_x_13_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z1_entry_tower_g5_workstation_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z1_entry_tower_g5_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z1_entry_tower_g6_workstation_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z1_entry_tower_g6_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z1_g8_tower_desktop_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z1_g8_tower_desktop_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z4_g4_workstation_\\(core-x\\)_firmware:*:*:*:*:*:linux_kernel:*:*", "cpe:2.3:o:hp:z4_g4_workstation_\\(core-x\\)_firmware:*:*:*:*:*:windows_10:*:*", "cpe:2.3:o:hp:z4_g4_workstation_\\(core-x\\)_firmware:*:*:*:*:*:windows_7:*:*", "cpe:2.3:h:hp:z4_g4_workstation_\\(core-x\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z4_g4_workstation_\\(xeon_w\\)_firmware:*:*:*:*:*:linux_kernel:*:*", "cpe:2.3:o:hp:z4_g4_workstation_\\(xeon_w\\)_firmware:*:*:*:*:*:windows_10:*:*", "cpe:2.3:o:hp:z4_g4_workstation_\\(xeon_w\\)_firmware:*:*:*:*:*:windows_7:*:*", "cpe:2.3:h:hp:z4_g4_workstation_\\(xeon_w\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z6_g4_workstation_firmware:*:*:*:*:*:linux_kernel:*:*", "cpe:2.3:o:hp:z6_g4_workstation_firmware:*:*:*:*:*:windows_10:*:*", "cpe:2.3:o:hp:z6_g4_workstation_firmware:*:*:*:*:*:windows_7:*:*", "cpe:2.3:h:hp:z6_g4_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z8_g4_workstation_firmware:*:*:*:*:*:linux_kernel:*:*", "cpe:2.3:o:hp:z8_g4_workstation_firmware:*:*:*:*:*:windows_10:*:*", "cpe:2.3:o:hp:z8_g4_workstation_firmware:*:*:*:*:*:windows_7:*:*", "cpe:2.3:h:hp:z8_g4_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:engage_flex_mini_retail_system_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:engage_flex_mini_retail_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:mp9_g4_retail_system_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:mp9_g4_retail_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:260_g3_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:260_g3_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_35w_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_35w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_65w_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_65w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_95w_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_95w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g4_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g4_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g4_tower_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g4_tower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g4_workstation_edition_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g4_workstation_edition:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g5_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g5_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g5_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g5_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g5_tower_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g5_tower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g6_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g6_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g6_tower_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g6_tower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g8_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g8_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g8_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g8_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g8_tower_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g8_tower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_805_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_805_g6_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_805_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_805_g6_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_805_g8_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_805_g8_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_805_g8_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_805_g8_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_880_g4_tower_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_880_g4_tower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_880_g5_tower_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_880_g5_tower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_880_g6_tower_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_880_g6_tower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_880_g8_tower_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_880_g8_tower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_1000_g2_23.8-in_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_1000_g2_23.8-in_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_1000_g2_23.8-in_touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_1000_g2_23.8-in_touch_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_1000_g2_27-in_4k_uhd_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_1000_g2_27-in_4k_uhd_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_1000_g2_34-in_curved_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_1000_g2_34-in_curved_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g4_23.8-in_healthcare_edition_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g4_23.8-in_healthcare_edition_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_non-touch_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_non-touch_all-in-one_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_touch_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_touch_all-in-one_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_touch_gpu_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_touch_gpu_all-in-one_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g5_23.8-in_healthcare_edition_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g5_23.8-in_healthcare_edition_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g5_23.8-inch_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g5_23.8-inch_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g6_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g6_24_all-in-one_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g6_27_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g6_27_all-in-one_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g8_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g8_24_all-in-one_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g8_27_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g8_27_all-in-one_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g5_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g5_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g5_microtower_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g5_microtower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g5_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g5_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g6_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g6_microtower_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g6_microtower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g6_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g7_microtower_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g7_microtower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g7_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g7_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_405_g8_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_405_g8_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_405_g8_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_405_g8_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_480_g5_microtower_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_480_g5_microtower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_480_g6_microtower_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_480_g6_microtower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_480_g7_pci_microtower_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_480_g7_pci_microtower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g4_microtower_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g4_microtower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g4_microtower_pc\\(with_pci_slot\\)_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g4_microtower_pc\\(with_pci_slot\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g4_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g4_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g5_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g5_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g5_microtower_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g5_microtower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g5_microtower_pc\\(with_pci_slot\\)_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g5_microtower_pc\\(with_pci_slot\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g5_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g5_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g6_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g6_microtower_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g6_microtower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g6_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_680_g4_microtower_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_680_g4_microtower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_680_g4_microtower_pc\\(with_pci_slot\\)_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_680_g4_microtower_pc\\(with_pci_slot\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_680_g6_pci_microtower_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_680_g6_pci_microtower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g4_20-inch_non-touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g4_20-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g4_23.8-inch_non-touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g4_23.8-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g5_20-inch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g5_20-inch_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g5_23.8-inch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g5_23.8-inch_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g6_20_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g6_20_all-in-one_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g6_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g6_24_all-in-one_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_440_g4_23.8-inch_non-touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_440_g4_23.8-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_440_g5_23.8-in_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_440_g5_23.8-in_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_440_g6_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_440_g6_24_all-in-one_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_600_g4_21.5-inch_touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_600_g4_21.5-inch_touch_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_600_g5_21.5-in_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_600_g5_21.5-in_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_600_g6_22_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_600_g6_22_all-in-one_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_g3_22_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_g3_22_all-in-one_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_g3_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_g3_24_all-in-one_pc:-:*:*:*:*:*:*:*" ]
null
8.8
null
7.2
null
CVE-2023-24395
WordPress Contact Form 7 Redirect & Thank You Page Plugin <= 1.0.3 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in Scott Paterson Contact Form 7 Redirect & Thank You Page plugin <= 1.0.3 versions.
[ "cpe:2.3:a:wpplugin:contact_form_7_redirect_\\&_thank_you_page:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
null
CVE-2024-31214
Traccar's unrestricted file upload vulnerability in device image upload could lead to remote code execution
Traccar is an open source GPS tracking system. Traccar versions 5.1 through 5.12 allow arbitrary files to be uploaded through the device image upload API. Attackers have full control over the file contents, full control over the directory where the file is stored, full control over the file extension, and partial control over the file name. While it's not for an attacker to overwrite an existing file, an attacker can create new files with certain names and attacker-controlled extensions anywhere on the file system. This can potentially lead to remote code execution, XSS, DOS, etc. The default install of Traccar makes this vulnerability more severe. Self-registration is enabled by default, allowing anyone to create an account to exploit this vulnerability. Traccar also runs by default with root/system privileges, allowing files to be placed anywhere on the file system. Version 6.0 contains a fix for the issue. One may also turn off self-registration by default, as that would make most vulnerabilities in the application much harder to exploit by default and reduce the severity considerably.
[ "cpe:2.3:a:traccar:traccar:*:*:*:*:*:*:*:*" ]
null
9.7
null
null
null
CVE-2011-0813
Unspecified vulnerability in Oracle Solaris 8, 9, 10, and 11 Express allows local users to affect availability via unknown vectors related to Kernel, a different vulnerability than CVE-2012-0098.
[ "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.9:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.11:*:express:*:*:*:*:*" ]
null
null
null
4.9
null
CVE-2023-51731
Stored Cross Site Scripting Vulnerability in Skyworth Router
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Hostname parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system. Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
[ "cpe:2.3:o:skyworthdigital:cm5100_firmware:4.1.1.24:*:*:*:*:*:*:*", "cpe:2.3:h:skyworthdigital:cm5100:-:*:*:*:*:*:*:*" ]
null
6.9
null
null
null
GHSA-rxjp-mfm9-w4wr
Path Traversal in Django
In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via uploaded files with suitably crafted file names.
[]
8.7
7.5
null
null
null
GHSA-275h-jw8p-gv35
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile and Snapdragon Mobile MDM9625, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 820, and SD 820A, no address argument validation is performed on calls to the qsee_prng_getdata syscall.
[]
null
null
9.8
null
null
CVE-2021-1144
Cisco Connected Mobile Experiences Privilege Escalation Vulnerability
A vulnerability in Cisco Connected Mobile Experiences (CMX) could allow a remote, authenticated attacker without administrative privileges to alter the password of any user on an affected system. The vulnerability is due to incorrect handling of authorization checks for changing a password. An authenticated attacker without administrative privileges could exploit this vulnerability by sending a modified HTTP request to an affected device. A successful exploit could allow the attacker to alter the passwords of any user on the system, including an administrative user, and then impersonate that user.
[ "cpe:2.3:a:cisco:connected_mobile_experiences:10.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:connected_mobile_experiences:10.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:connected_mobile_experiences:10.6.2:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2017-14594
The printable searchrequest issue resource in Atlassian Jira before version 7.2.12 and from version 7.3.0 before 7.6.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the jqlQuery query parameter.
[ "cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null