id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
57.2k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2009-4702
SQL injection vulnerability in the Tour Extension (pm_tour) extension before 0.0.13 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[ "cpe:2.3:a:markus_barchfeld:pm_tour:*:*:*:*:*:*:*:*", "cpe:2.3:a:markus_barchfeld:pm_tour:0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:markus_barchfeld:pm_tour:0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:markus_barchfeld:pm_tour:0.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:markus_barchfeld:pm_tour:0.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
RHSA-2024:4546
Red Hat Security Advisory: git-lfs security update
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
7.5
null
null
GHSA-828x-pwwm-pchf
The Administrative console in IBM WebSphere Application Server (WAS) 6.1 before 6.1.0.47, 7.0 before 7.0.0.29, 8.0 before 8.0.0.7, and 8.5 before 8.5.5.0 does not properly perform caching, which allows local users to obtain sensitive information via unspecified vectors.
[]
null
null
null
null
RHSA-2020:3495
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.2 security update on RHEL 6
keycloak: security headers missing on REST endpoints keycloak: DoS by sending multiple simultaneous requests with a Content-Length header value greater than actual byte count of request body
[ "cpe:/a:redhat:red_hat_single_sign_on:7::el6" ]
null
7.5
null
null
CVE-2019-16139
An issue was discovered in the compact_arena crate before 0.4.0 for Rust. Generativity is mishandled, leading to an out-of-bounds write or read.
[ "cpe:2.3:a:compact_arena_project:compact_arena:*:*:*:*:*:*:*:*" ]
null
9.8
null
9
GHSA-xjqp-6mgv-34p5
In sendChunk of WirelessCharger.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239700400References: N/A
[]
null
6.7
null
null
GHSA-6629-6f9p-64x8
** DISPUTED ** A vulnerability, which was classified as critical, was found in Ubiquiti EdgeRouter X 2.0.9-hotfix.6. Affected is an unknown function of the component Static Routing Configuration Handler. The manipulation of the argument next-hop-interface leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. VDB-223302 is the identifier assigned to this vulnerability. NOTE: The vendor position is that post-authentication issues are not accepted as vulnerabilities.
[]
null
9.8
null
null
cisco-sa-ewlc-capwap-dos-2OA3JgKS
Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Denial of Service Vulnerability
A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol processing of Cisco IOS XE Wireless Controller Software for the Cisco Catalyst 9000 Family Wireless Controllers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition of an affected device. The vulnerability is due to insufficient validation of CAPWAP packets. An attacker could exploit this vulnerability by sending a malformed CAPWAP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to crash and reload, resulting in a DoS condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is part of the March 2021 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2021 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74408"].
[]
null
8.6
null
null
CVE-2019-0122
Double free in Intel(R) SGX SDK for Linux before version 2.2 and Intel(R) SGX SDK for Windows before version 2.1 may allow an authenticated user to potentially enable information disclosure or denial of service via local access.
[ "cpe:2.3:a:intel:software_guard_extensions_sdk:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
null
7.1
3.6
RHSA-2009:1138
Red Hat Security Advisory: openswan security update
Openswan ASN.1 parser vulnerability
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
CVE-2018-17297
The unzip function in ZipUtil.java in Hutool before 4.1.12 allows remote attackers to overwrite arbitrary files via directory traversal sequences in a filename within a ZIP archive.
[ "cpe:2.3:a:hutool:hutool:*:*:*:*:*:*:*:*" ]
null
null
7.5
6.4
GHSA-f888-6ph8-hvgc
A memory leak in the spi_gpio_probe() function in drivers/spi/spi-gpio.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering devm_add_action_or_reset() failures, aka CID-d3b0ffa1d75d.
[]
null
7.5
null
null
GHSA-m4wp-2j5p-9x5g
A vulnerability was identified in Lenovo XClarity Administrator (LXCA) before 1.4.0 where LXCA user account names may be exposed to unauthenticated users with access to the LXCA web user interface. No password information of the user accounts is exposed.
[]
null
null
5.3
null
CVE-2019-12934
An issue was discovered in the wp-code-highlightjs plugin through 0.6.2 for WordPress. wp-admin/options-general.php?page=wp-code-highlight-js allows CSRF, as demonstrated by an XSS payload in the hljs_additional_css parameter.
[ "cpe:2.3:a:wp-code-highlightjs_project:wp-code-highlightjs:*:*:*:*:*:wordpress:*:*" ]
null
null
8.8
6.8
CVE-2023-4710
TOTVS RM Portal cross site scripting
A vulnerability classified as problematic was found in TOTVS RM 12.1. Affected by this vulnerability is an unknown functionality of the component Portal. The manipulation of the argument d leads to cross site scripting. The attack can be launched remotely. The identifier VDB-238573 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:totvs:rm:12.1:*:*:*:*:*:*:*" ]
null
4.3
4.3
5
CVE-2021-24180
Related Posts for WordPress < 2.0.4 - Authenticated Reflected Cross-Site Scripting (XSS)
Unvalidated input and lack of output encoding within the Related Posts for WordPress plugin before 2.0.4 lead to a Reflected Cross-Site Scripting (XSS) vulnerability within the 'lang' GET parameter while editing a post, triggered when users with the capability of editing posts access a malicious URL.
[ "cpe:2.3:a:never5:related_posts:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
3.5
GHSA-mq4g-hhgp-p8r7
A remote execution of arbitrary commands vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.5.x: 6.5.4.17 and below; Aruba Instant 8.3.x: 8.3.0.13 and below; Aruba Instant 8.5.x: 8.5.0.10 and below; Aruba Instant 8.6.x: 8.6.0.5 and below; Aruba Instant 8.7.x: 8.7.0.0 and below. Aruba has released patches for Aruba Instant that address this security vulnerability.
[]
null
9.8
null
null
GHSA-vrv5-28j8-rv7x
Improper Access Control in GitHub repository chocobozzz/peertube prior to 4.1.0.
[]
null
null
null
null
GHSA-mqfx-478h-43p4
Multiple cross-site scripting (XSS) vulnerabilities in BosDev BosMarket Business Directory System allow remote authenticated users to inject arbitrary web script or HTML via (1) user info (account details) or (2) a post.
[]
null
null
null
null
CVE-2019-13967
iTop 2.2.0 through 2.6.0 allows remote attackers to cause a denial of service (application outage) via many requests to launch a compile operation. The requests use the pages/exec.php?exec_env=production&exec_module=itop-hub-connector&exec_page=ajax.php&operation=compile URI. This only affects the community version.
[ "cpe:2.3:a:combodo:itop:*:*:*:*:community:*:*:*" ]
null
7.5
null
5
CVE-2019-19896
In IXP EasyInstall 6.2.13723, there is Remote Code Execution via weak permissions on the Engine Service share. The default file permissions of the IXP$ share on the server allows modification of directories and files (e.g., bat-scripts), which allows execution of code in the context of NT AUTHORITY\SYSTEM on the target server and clients.
[ "cpe:2.3:a:ixpdata:easyinstall:6.2.13723:*:*:*:*:*:*:*" ]
null
null
9.9
null
CVE-2021-21191
Use after free in WebRTC in Google Chrome prior to 89.0.4389.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
CVE-2010-0388
Format string vulnerability in the WebDAV implementation in webservd in Sun Java System Web Server 7.0 Update 6 allows remote attackers to cause a denial of service (daemon crash) and possibly have unspecified other impact via format string specifiers in the encoding attribute of the XML declaration in a PROPFIND request.
[ "cpe:2.3:a:sun:java_system_web_server:7.0:update_6:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2021-28501
An issue has recently been discovered in Arista EOS where the incorrect use of EOS's AAA API’s by the OpenConfig and TerminAttr agents could result in unrestricted access to the device for local users with nopassword configuration.
An issue has recently been discovered in Arista EOS where the incorrect use of EOS's AAA API’s by the OpenConfig and TerminAttr agents could result in unrestricted access to the device for local users with nopassword configuration.
[ "cpe:2.3:a:arista:terminattr:*:*:*:*:*:*:*:*" ]
null
9.1
null
null
GHSA-px4h-xg32-q955
ReDoS in normalize-url
The normalize-url package before 4.5.1, 5.x before 5.3.1, and 6.x before 6.0.1 for Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data: URLs.
[]
null
7.5
null
null
CVE-2018-20013
In UrBackup 2.2.6, an attacker can send a malformed request to the client over the network, and trigger a fileservplugin/CClientThread.cpp CClientThread::ProcessPacket metadata_id!=0 assertion, leading to shutting down the client application.
[ "cpe:2.3:a:urbackup:urbackup:2.2.6:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2017-18221
The __munlock_pagevec function in mm/mlock.c in the Linux kernel before 4.11.4 allows local users to cause a denial of service (NR_MLOCK accounting corruption) via crafted use of mlockall and munlockall system calls.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
null
5.5
4.9
RHSA-2021:2587
Red Hat Security Advisory: ruby:2.5 security, bug fix, and enhancement update
ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? ruby: Regular expression denial of service vulnerability of WEBrick's Digest authentication ruby: HTTP response splitting in WEBrick ruby: Code injection via command argument of Shell#test / Shell#[] rubygem-json: Unsafe object creation vulnerability in JSON ruby: BasicSocket#read_nonblock method leads to information disclosure ruby: Potential HTTP request smuggling in WEBrick ruby: XML round-trip vulnerability in REXML
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
7.5
null
CVE-2012-4112
The Baseboard Management Controller (BMC) in Cisco Unified Computing System (UCS) allows local users to gain privileges and execute arbitrary commands via crafted command parameters within the command-line interface, aka Bug ID CSCtr43330.
[ "cpe:2.3:h:cisco:unified_computing_system:-:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2012-4010
Opera before 11.60 allows remote attackers to spoof the address bar via unspecified homograph characters, a different vulnerability than CVE-2010-2660.
[ "cpe:2.3:a:opera:opera_browser:*:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.52:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.52:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.53:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.60:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.61:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.62:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.63:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.00:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.10:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.50:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.52:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-h8ff-xm6f-g53p
The Gallery Manager plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_Query_Arg without appropriate escaping on the URL in all versions up to, and including, 1.6.58. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
null
6.1
null
null
CVE-2023-48502
Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79)
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
[ "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
CVE-2006-3303
Multiple cross-site scripting (XSS) vulnerabilities in pm.php in DeluxeBB 1.07 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) subject or (2) to parameters.
[ "cpe:2.3:a:deluxebb:deluxebb:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-rc9p-5gf8-h3m8
A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in virtio network subcomponent in the Linux kernel due to a double fget. This flaw could allow a local attacker to crash the system, and could even lead to a kernel information leak problem.
[]
null
7.1
null
null
CVE-2012-0508
Unspecified vulnerability in the JavaFX component in Oracle Java SE JavaFX, 1.3.0 and earlier, and 1.2.2 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
[ "cpe:2.3:a:oracle:javafx:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:javafx:1.3.0:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-g625-6qfm-gm8r
The SOAP parser in PHP before 5.3.23 and 5.4.x before 5.4.13 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory functions. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-1824.
[]
null
null
null
null
CVE-2025-1671
Academist Membership <= 1.1.6 - Authentication Bypass via Account Takeover
The Academist Membership plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.1.6. This is due to the academist_membership_check_facebook_user() function not properly verifying a user's identity prior to authenticating them. This makes it possible for unauthenticated attackers to log in as any user, including site administrators.
[]
null
9.8
null
null
CVE-2010-4772
Cross-site scripting (XSS) vulnerability in blocks/lang.php in S-CMS 2.5 allows remote attackers to inject arbitrary web script or HTML via the id parameter to viewforum.php.
[ "cpe:2.3:a:matteoiammarrone:s-cms:2.5:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-c4c4-8xhp-h8pf
Cross-Site Request Forgery (CSRF) vulnerability in Copyscape / Indigo Stream Technologies Copyscape Premium allows Stored XSS.This issue affects Copyscape Premium: from n/a through 1.3.6.
[]
null
7.1
null
null
GHSA-m55v-6hqc-x3jh
In Libarchive 3.4.0, archive_wstring_append_from_mbs in archive_string.c has an out-of-bounds read because of an incorrect mbrtowc or mbtowc call. For example, bsdtar crashes via a crafted archive.
[]
null
5.5
null
null
CVE-2025-3237
Tenda FH1202 wrlwpsset access control
A vulnerability was found in Tenda FH1202 1.2.0.14(408). It has been rated as critical. This issue affects some unknown processing of the file /goform/wrlwpsset. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
5.3
5.3
5
CVE-2024-43982
WordPress Login As Users plugin <= 1.4.3 - Broken Access Control to Account Takeover vulnerability
Missing Authorization vulnerability in Geek Code Lab Login As Users allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Login As Users: from n/a through 1.4.3.
[ "cpe:2.3:a:geek_code_lab:login_as_users:*:*:*:*:*:*:*:*", "cpe:2.3:a:geekcodelab:login_as_users:*:*:*:*:*:wordpress:*:*" ]
null
8.8
null
null
CVE-2019-3717
Select Dell Client Commercial and Consumer platforms contain an Improper Access Vulnerability. An unauthenticated attacker with physical access to the system could potentially bypass intended Secure Boot restrictions to run unsigned and untrusted code on expansion cards installed in the system during platform boot. Refer to https://www.dell.com/support/article/us/en/04/sln317683/dsa-2019-043-dell-client-improper-access-control-vulnerability?lang=en for versions affected by this vulnerability.
[ "cpe:2.3:o:dell:chengming_3967_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3967:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3977_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3977:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3980_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3980:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g3_3579_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g3_3579:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g3_3779_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g3_3779:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g5_5587_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g5_5587:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g5_5590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g5_5590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g7_7588_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g7_7588:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g7_7590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g7_7590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g7_7790_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g7_7790:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:embedded_box_pc_5000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:embedded_box_pc_5000:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3153_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3153:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3158_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3158:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5368_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5368:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5378_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5378:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5379_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5379:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7353_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7353:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7359_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7359:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7368_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7368:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7373_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7373:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7378_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7378:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7370_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7370:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3459_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3459:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3467_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3467:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3468_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3468:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5468_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5468:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7460_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7460:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7466_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7466:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7467_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7467:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3458_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3458:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3559_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3559:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3567_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3567:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3568_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3568:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5566_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5566:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5567_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5567:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7560_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7560:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5568_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5568:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5578_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5578:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5579_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5579:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7568_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7568:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7569_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7569:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7573_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7573:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7579_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7579:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7570_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7570:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7566_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7566:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7567_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7567:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7577_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7577:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3558_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3558:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5767_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5767:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7773_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7773:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7778_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7778:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7779_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7779:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3268_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3268:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3470:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3476_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3476:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3481_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3481:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3576_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3576:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3583_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3583:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3581_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3581:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3584_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3584:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3668_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3668:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_670_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_670:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3780_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3780:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3781_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3781:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5370_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5370:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5457_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5457:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5458_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5458:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5459_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5459:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5481_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5481:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5482_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5482:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5557_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5557:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5558_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5558:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5559_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5559:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5570_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5570:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5582_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5582:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5758_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5758:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5759_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5759:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5770_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5770:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7380_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7380:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7386_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7386:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7472_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7472:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7572_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7572:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7580_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7586_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7586:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7786_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7786:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3150_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3150:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3160_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3160:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3180_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3180:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3189_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3189:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3190_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3190:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3350_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3350:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3379_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3379:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3380_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3380:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3390_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3390:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3450_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3450:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3460_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3460:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3470:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3550:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3560_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3560:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3570_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3570:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5175_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5175:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5179_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5179:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5250:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5280_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5280:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5285_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5285:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5288_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5288:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5289_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5289:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5290_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5290:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5290_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5290_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5414_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5414:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5450_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5450:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5488_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5488:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5491_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5491:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5550:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5591_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5591:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7202_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7202:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7212_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7212:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7214_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7214:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7250:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7275_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7275:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7280_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7280:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7285_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7285:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7290_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7290:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7350_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7350:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7370_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7370:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7380_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7380:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7389_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7389:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7390_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7390:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7390_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7390_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7414_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7414:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7424_rugged_extreme_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7424_rugged_extreme:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_e5250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_e5250:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_e5270_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_e5270:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_e5450_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_e5450:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_e5470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_e5470:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_e5550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_e5550:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_e5570_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_e5570:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_e7250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_e7250:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_e7270_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_e7270:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_e7450_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_e7450:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_e7470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_e7470:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3040_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3040:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3046_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3046:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3050_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3050:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3050_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3050_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3060_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3060:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3240_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3240_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5040_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5040:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5050_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5050:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5060_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5060:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5250_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5250_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5260_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5260_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7040_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7040:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7050_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7050:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7060_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7060:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7440_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7440_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7450_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7450_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7460_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7460_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7760_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7760_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_xe3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_xe3:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3620_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3620:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3630_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3630:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3930_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3930:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5530_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5530_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5720_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5720_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5820_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5820:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7710_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7710:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7720_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7720:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7820_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7820:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7920_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7920:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_t5810_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_t5810:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_t7810_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_t7810:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_t7910_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_t7910:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:venue_7140_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:venue_7140:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3468_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3468:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5468_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5468:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3568_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3568:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5568_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5568:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_7570_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_7570:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_7580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_7580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3070_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3070:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3267_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3267:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3268_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3268:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3458_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3458:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3459_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3459:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3470:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3478_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3478:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3581_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3581:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3584_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3584:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3583_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3583:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3660_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3660:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3667_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3667:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3668_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3668:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3669_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3669:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3670_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3670:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5370_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5370:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5471_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5471:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5481_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5481:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5581_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5581:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:wyse_5070_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:wyse_5070:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:wyse_7040_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:wyse_7040:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_9250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_9250:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_9350_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_9350:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_9360_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_9360:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_9370_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_9370:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_9380_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_9380:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_9550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_9550:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_9560_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_9560:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_9570_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_9570:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_7760_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_7760:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_8900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_8900:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_9575_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_9575:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_9343_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_9343:-:*:*:*:*:*:*:*" ]
null
null
7.1
null
GHSA-3g5x-2qp3-gm68
The Gutenberg Forms plugin for WordPress is vulnerable to arbitrary file uploads due to the users can specify the allowed file types in the 'upload' function in versions up to, and including, 2.2.9. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
[]
null
9.8
null
null
GHSA-pphx-vq77-fh32
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.28. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.7 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:H).
[]
null
6.7
null
null
CVE-2006-4922
Unrestricted file upload vulnerability in starnet/editors/htmlarea/popups/images.php in Site@School (S@S) 2.4.02 and earlier allows remote attackers to upload and execute arbitrary files with executable extensions.
[ "cpe:2.3:a:siteatschool:siteatschool:*:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-qj5h-583m-qh6v
GNU LibreDWG 0.12.3.4163 through 0.12.3.4191 has a double-free in bit_chain_free (called from dwg_encode_MTEXT and dwg_encode_add_object).
[]
null
null
null
null
GHSA-xjm3-g539-hx9g
Cross-site scripting (XSS) vulnerability in Microsoft Internet Security and Acceleration (ISA) Server 2000 allows remote attackers to inject arbitrary web script via a URL containing the script in the domain name portion, which is not properly cleansed in the default error pages (1) 500.htm for "500 Internal Server error" or (2) 404.htm for "404 Not Found."
[]
null
null
null
null
GHSA-2r4m-58v9-r9jf
Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following: Execute code on the affected device or cause it to reload unexpectedly Cause LLDP database corruption on the affected device For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Cisco has released firmware updates that address these vulnerabilities.
[]
null
null
null
null
CVE-2022-36490
H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function EditMacList.
[ "cpe:2.3:o:h3c:magic_nx18_plus_firmware:nx18pv100r003:*:*:*:*:*:*:*", "cpe:2.3:h:h3c:magic_nx18_plus:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2024-49995
tipc: guard against string buffer overrun
In the Linux kernel, the following vulnerability has been resolved: tipc: guard against string buffer overrun Smatch reports that copying media_name and if_name to name_parts may overwrite the destination. .../bearer.c:166 bearer_name_validate() error: strcpy() 'media_name' too large for 'name_parts->media_name' (32 vs 16) .../bearer.c:167 bearer_name_validate() error: strcpy() 'if_name' too large for 'name_parts->if_name' (1010102 vs 16) This does seem to be the case so guard against this possibility by using strscpy() and failing if truncation occurs. Introduced by commit b97bf3fd8f6a ("[TIPC] Initial merge") Compile tested only.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-xcmp-v444-vq94
The Category and Taxonomy Meta Fields plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the image meta field value in the 'wpaft_add_meta_textinput' function in versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with editor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
[]
null
5.5
null
null
GHSA-cwwg-93gv-4r7h
In the Linux kernel, the following vulnerability has been resolved:soc: fsl: qbman: Always disable interrupts when taking cgr_locksmp_call_function_single disables IRQs when executing the callback. To prevent deadlocks, we must disable IRQs when taking cgr_lock elsewhere. This is already done by qman_update_cgr and qman_delete_cgr; fix the other lockers.
[]
null
5.5
null
null
CVE-2023-43983
Presto Changeo attributegrid up to 2.0.3 was discovered to contain a SQL injection vulnerability via the component disable_json.php.
[ "cpe:2.3:a:presto-changeo:attribute_grid:*:*:*:*:*:prestashop:*:*" ]
null
9.8
null
null
CVE-2017-16126
The module botbait is a tool to be used to track bot and automated tools usage with-in the npm ecosystem. botbait is known to record and track user information. The module tracks the following information. Source IP process.versions process.platform How the module was invoked (test, require, pre-install)
[ "cpe:2.3:a:botbait_project:botbait:*:*:*:*:*:node.js:*:*" ]
null
null
5.3
5
CVE-2021-28070
Cross Site Request Forgery (CSRF) vulnerability exist in PopojiCMS 2.0.1 in po-admin/route.php?mod=user&act=multidelete.
[ "cpe:2.3:a:popojicms:popojicms:2.0.1:*:*:*:*:*:*:*" ]
null
4.3
null
4.3
GHSA-vrx6-28g2-g5gm
Cross-Site Request Forgery (CSRF) vulnerability in xtemos WoodMart - Multipurpose WooCommerce Theme <= 7.1.1 versions.
[]
null
8.8
null
null
GHSA-3xfg-wqwr-xxc8
A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.4, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. A malicious application may be able to gain root privileges.
[]
null
null
null
null
CVE-2016-6132
The gdImageCreateFromTgaCtx function in the GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file.
[ "cpe:2.3:a:libgd:libgd:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
CVE-2019-2972
Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters). The supported version that is affected is 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data as well as unauthorized read access to a subset of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).
[ "cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*" ]
null
7.3
null
7.5
CVE-2023-44984
WordPress bbp style pack Plugin <= 5.6.7 is vulnerable to Cross Site Scripting (XSS)
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Robin Wilson bbp style pack plugin <= 5.6.7 versions.
[ "cpe:2.3:a:rewweb:bbp_style_pack:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
null
CVE-2017-10228
Vulnerability in the Oracle Hospitality Cruise Shipboard Property Management System component of Oracle Hospitality Applications (subcomponent: Module). The supported version that is affected is 8.0.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Cruise Shipboard Property Management System. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Hospitality Cruise Shipboard Property Management System accessible data as well as unauthorized read access to a subset of Oracle Hospitality Cruise Shipboard Property Management System accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:hospitality_cruise_shipboard_property_management_system:8.0.0.0:*:*:*:*:*:*:*" ]
null
null
5.4
5.5
ICSA-22-342-02
AVEVA InTouch Access Anywhere and Plant SCADA Access Anywhere
AVEVA InTouch Access Anywhere versions 2020 R2 and older are vulnerable to a path traversal exploit that could allow an unauthenticated user with network access to read files on the system outside of the secure gateway web server. CVE-2022-23854 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). AVEVA InTouch Access Anywhere versions 2023 and prior and Plant SCADA Access Anywhere versions 2020 R2 and prior use outdated OpenSSL versions that are vulnerable to a classic buffer overflow, which could allow an attacker to create denial-of-service conditions or execute arbitrary code. CVE-2021-3711 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). AVEVA InTouch Access Anywhere versions 2023 and prior and Plant SCADA Access Anywhere versions 2020 R2 and prior use versions of jQuery vulnerable to cross-site scripting. Passing HTML from untrusted sources—even after sanitizing it—to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code in jQuery versions greater than or equal to 1.2 and before 3.5.0. CVE-2020-11022 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[]
null
null
6.1
null
CVE-2021-32657
Malicious user could break user administration page
Nextcloud Server is a Nextcloud package that handles data storage. In versions of Nextcloud Server prior to 10.0.11, 20.0.10, and 21.0.2, a malicious user may be able to break the user administration page. This would disallow administrators to administrate users on the Nextcloud instance. The vulnerability is fixed in versions 19.0.11, 20.0.10, and 21.0.2. As a workaround, administrators can use the OCC command line tool to administrate the Nextcloud users.
[ "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
CVE-2011-1925
nbd-server.c in Network Block Device (nbd-server) 2.9.21 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by causing a negotiation failure, as demonstrated by specifying a name for a non-existent export.
[ "cpe:2.3:a:wouter_verhelst:nbd:*:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-f67q-wr6w-23jq
Boa has an uncaught exception when transitioning the state of `AsyncGenerator` objects
A wrong assumption made when handling ECMAScript's `AsyncGenerator` operations can cause an uncaught exception on certain scripts.DetailsBoa's implementation of `AsyncGenerator` makes the assumption that the state of an `AsyncGenerator` object cannot change while resolving a promise created by methods of `AsyncGenerator` such as `%AsyncGeneratorPrototype%.next`, `%AsyncGeneratorPrototype%.return`, or `%AsyncGeneratorPrototype%.throw`. However, a carefully constructed code could trigger a state transition from a getter method for the promise's `then` property, which causes the engine to fail an assertion of this assumption, causing an uncaught exception. This could be used to create a Denial Of Service attack in applications that run arbitrary ECMAScript code provided by an external user.PatchesVersion 0.19.0 is patched to correctly handle this case.WorkaroundsUsers unable to upgrade to the patched version would want to use [`std::panic::catch_unwind`](https://doc.rust-lang.org/std/panic/fn.catch_unwind.html) to ensure any exceptions caused by the engine don't impact the availability of the main application.Referenceshttps://github.com/boa-dev/boa/commit/69ea2f52ed976934bff588d6b566bae01be313f7https://github.com/tc39/ecma262/security/advisories/GHSA-g38c-wh3c-5h9r
[]
null
7.5
null
null
GHSA-7c7c-8m42-fjhc
There is a Parameter verification issue in Huawei Smartphone.Successful exploitation of this vulnerability can affect service integrity.
[]
null
null
null
null
GHSA-q9r3-wvmc-78qp
On all versions of BIG-IP 12.1.x and 11.6.x, the original TLS protocol includes a weakness in the master secret negotiation that is mitigated by the Extended Master Secret (EMS) extension defined in RFC 7627. TLS connections that do not use EMS are vulnerable to man-in-the-middle attacks during renegotiation. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
[]
null
null
null
null
CVE-2016-9910
The serializer in html5lib before 0.99999999 might allow remote attackers to conduct cross-site scripting (XSS) attacks by leveraging mishandling of special characters in attribute values, a different vulnerability than CVE-2016-9909.
[ "cpe:2.3:a:html5lib:html5lib:*:1.0b8:*:*:*:*:*:*" ]
null
null
6.1
4.3
GHSA-pjh3-48qc-pm5c
Multiple vulnerabilities in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to either execute arbitrary code on the underlying operating system, install and boot a malicious software image, or execute unsigned binaries on an affected device. These vulnerabilities are due to improper checks performed by system boot routines. To exploit these vulnerabilities, the attacker would need privileged access to the CLI of the device. A successful exploit could allow the attacker to either execute arbitrary code on the underlying operating system or execute unsigned code and bypass the image verification check part of the secure boot process. For more information about these vulnerabilities, see the Details section of this advisory.
[]
null
null
null
null
GHSA-2xjj-2wcr-mj9m
Multiple cross-site scripting (XSS) vulnerabilities in the Mingle Forum plugin before 1.0.34 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) search_words parameter in a search action to wpf.class.php or (2) togroupusers parameter in an add_user_togroup action to fs-admin/fs-admin.php.
[]
null
null
null
null
CVE-2017-16380
An issue was discovered in Adobe Acrobat and Reader: 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, and 11.0.22 and earlier versions. This vulnerability is an instance of a security bypass vulnerability for a certain file-type extension. Acrobat maintains both a blacklist and whitelist (the user can specify an allowed attachment). However, any file extensions that are neither on the blacklist nor the whitelist can still be opened after displaying a warning prompt.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*" ]
null
null
8.8
9.3
GHSA-vhr6-32q6-wwvf
Due to lack of proper memory management, when a victim opens manipulated Portable Document Format (.pdf, PDFPublishing.dll) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application.
[]
null
5.5
null
null
CVE-2007-5685
The safe_path function in shttp before 0.0.5 allows remote attackers to conduct directory traversal attacks and read files via a combination of ".." and sub-directory specifiers that resolve to a pathname that is at or below the same level as the web document root, but in a different part of the directory tree.
[ "cpe:2.3:a:serverkit:shttp:*:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2006-3687
Stack-based buffer overflow in the Universal Plug and Play (UPnP) service in D-Link DI-524, DI-604 Broadband Router, DI-624, D-Link DI-784, WBR-1310 Wireless G Router, WBR-2310 RangeBooster G Router, and EBR-2310 Ethernet Broadband Router allows remote attackers to execute arbitrary code via a long M-SEARCH request to UDP port 1900.
[ "cpe:2.3:h:d-link:di-604_broadband_router:*:*:*:*:*:*:*:*", "cpe:2.3:h:d-link:di-784:*:*:*:*:*:*:*:*", "cpe:2.3:h:d-link:ebr-2310_ethernet_broadband_router:*:*:*:*:*:*:*:*", "cpe:2.3:h:d-link:wbr-1310_wireless_g_router:*:*:*:*:*:*:*:*", "cpe:2.3:h:d-link:wbr-2310_rangebooster_g_router:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:di-524:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:di-624:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2019-1121
A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory, aka 'DirectWrite Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1117, CVE-2019-1118, CVE-2019-1119, CVE-2019-1120, CVE-2019-1122, CVE-2019-1123, CVE-2019-1124, CVE-2019-1127, CVE-2019-1128.
[ "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
null
8.8
9.3
GHSA-96rp-hhc3-26cm
In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, Uninitialized data for socket address leads to information exposure.
[]
null
null
5.5
null
CVE-2023-40834
OpenCart CMS v4.0.2.2 was discovered to lack a protective mechanism on its login page against excessive login attempts, allowing unauthenticated attackers to gain access to the application via a brute force attack to the password parameter.
[ "cpe:2.3:a:opencart:opencart:4.0.2.2:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-mvp5-93x2-533f
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in RadiusTheme The Post Grid allows Stored XSS.This issue affects The Post Grid: from n/a through 7.7.1.
[]
null
6.5
null
null
GHSA-w7rh-9w5v-rwqj
Magento defense-in-depth security mitigation vulnerability
Magento versions 2.3.4 and earlier, 2.2.11 and earlier (see note), 1.14.4.4 and earlier, and 1.9.4.4 and earlier have a defense-in-depth security mitigation vulnerability. Successful exploitation could lead to unauthorized access to admin panel.
[]
null
7.5
null
null
CVE-2004-1549
The conference menu in ActivePost Standard 3.1 sends passwords of password-protected rooms in cleartext, which could allow remote attackers to gain sensitive information by sniffing the network connection.
[ "cpe:2.3:a:onnuri_infotek:activepost_standard:3.1:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-39vj-8gx7-5cj5
The Weintek cMT product line is vulnerable to a cross-site scripting vulnerability, which could allow an unauthenticated remote attacker to inject malicious JavaScript code.
[]
null
6.1
null
null
RHSA-2024:6969
Red Hat Security Advisory: container-tools:rhel8 security update
golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: net/mail: comments in display names are incorrectly handled golang: net: malformed DNS message can cause infinite loop net/http: Denial of service due to improper 100-continue handling in net/http
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.9
null
null
RHSA-2021:0240
Red Hat Security Advisory: dnsmasq security update
dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker
[ "cpe:/o:redhat:rhel_aus:7.2::server" ]
null
4
null
null
GHSA-4jr7-wrr7-7q7v
Directory traversal vulnerability in the com.me.opmanager.extranet.remote.communication.fw.fe.FileCollector servlet in ZOHO ManageEngine OpManager 8.8 through 11.3, Social IT Plus 11.0, and IT360 10.4 and earlier allows remote attackers or remote authenticated users to write to and execute arbitrary WAR files via a .. (dot dot) in the regionID parameter.
[]
null
null
null
null
CVE-2022-20582
In ppmp_unprotect_mfcfw_buf of drm_fw.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-233645166References: N/A
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2023-36845
Junos OS: EX and SRX Series: A PHP vulnerability in J-Web allows an unauthenticated to control an important environment variable
A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to remotely execute code. Using a crafted request which sets the variable PHPRC an attacker is able to modify the PHP execution environment allowing the injection und execution of code. This issue affects Juniper Networks Junos OS on EX Series and SRX Series: * All versions prior to 20.4R3-S9; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S7; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3-S1; * 22.4 versions prior to 22.4R2-S1, 22.4R3; * 23.2 versions prior to 23.2R1-S1, 23.2R2.
[ "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r3-s8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r3-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex2200:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex2200-c:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex2200-vc:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex2300-24mp:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex2300-24p:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex2300-24t:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex2300-48mp:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex2300-48p:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex2300-48t:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex2300-c:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex2300m:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex3200:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex3300:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex3300-vc:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4200:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4200-vc:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4300-24p:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4300-24p-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4300-24t:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4300-24t-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4300-32f:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4300-32f-dc:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4300-32f-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4300-48mp:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4300-48mp-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4300-48p:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4300-48p-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4300-48t:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4300-48t-afi:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4300-48t-dc:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4300-48t-dc-afi:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4300-48t-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4300-48tafi:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4300-48tdc:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4300-48tdc-afi:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4300-mp:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4300-vc:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4300m:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4400:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4500:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4500-vc:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4550:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4550-vc:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4550\\/vc:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4600-vc:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4650:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex6200:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex6210:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex8200:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex8200-vc:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex8208:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex8216:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex9200:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex9204:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex9208:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex9214:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex9250:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex9251:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex9253:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2018-13085
The mintToken function of a smart contract implementation for FreeCoin (FREE), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[ "cpe:2.3:a:freecoin_project:freecoin:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-fp3g-q6mc-hv9v
An information disclosure vulnerability exists when Microsoft Edge improperly handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8123.
[]
null
null
4.3
null
GHSA-fgcc-2fx7-p23v
A denial of service vulnerability exists in MDT's firmware for the KNXnet/IP Secure router SCN-IP100.03 and KNX IP interface SCN-IP000.03 before v3.0.4, that allows a remote attacker to turn the device unresponsive to all requests on the KNXnet/IP Secure layer, until the device is rebooted, via a SESSION_REQUEST frame with a modified total length field.
[]
null
7.5
null
null
GHSA-72qj-6vqg-mprg
An issue was discovered in OpenEXR before 2.4.1. There is an out-of-bounds read and write in DwaCompressor::uncompress in ImfDwaCompressor.cpp when handling the UNKNOWN compression case.
[]
null
5.5
null
null
GHSA-47wx-963f-2v3w
The Order Tracking Pro plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the start_date and end_date parameters in versions up to, and including, 3.3.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
null
6.1
null
null
CVE-2006-1927
Cisco IOS XR, when configured for Multi Protocol Label Switching (MPLS) and running on Cisco CRS-1 or Cisco 12000 series routers, allows remote attackers to cause a denial of service (Line card crash) via certain MPLS packets, as identified by Cisco bug ID CSCsc77475.
[ "cpe:2.3:o:cisco:ios_xr:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.2.3:*:crs-1:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.2.3:*:prp:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.2.50:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2022-38059
WordPress Access Code Feeder plugin <= 1.0.3 - Cross-Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Alexey Trofimov's Access Code Feeder plugin <= 1.0.3 at WordPress.
[ "cpe:2.3:a:access_code_feeder_project:access_code_feeder:*:*:*:*:*:wordpress:*:*" ]
null
5.5
null
null
CVE-2008-2686
webinc/bxe/scripts/loadsave.php in Flux CMS 1.5.0 and earlier allows remote attackers to execute arbitrary code by overwriting a PHP file in webinc/bxe/scripts/ via a filename in the XML parameter and PHP sequences in the request body, then making a direct request for this filename.
[ "cpe:2.3:a:flux_cms:flux_cms:*:*:*:*:*:*:*:*", "cpe:2.3:a:flux_cms:flux_cms:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:flux_cms:flux_cms:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:flux_cms:flux_cms:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:flux_cms:flux_cms:1.31:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-h3cg-ghq7-28v7
PHP remote file inclusion vulnerability in index.php in Artmedic Links 5.0 allows remote attackers to execute arbitrary PHP code via a URL in the id parameter, which is processed by the readfile function.
[]
null
null
null
null
CVE-2022-36784
Elsight – Elsight Halo Remote Code Execution (RCE)
Elsight – Elsight Halo  Remote Code Execution (RCE) Elsight Halo web panel allows us to perform connection validation. through the POST request : /api/v1/nics/wifi/wlan0/ping we can abuse DESTINATION parameter and leverage it to remote code execution.
[ "cpe:2.3:o:elsight:halo_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:elsight:halo:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-8h9h-rx47-ch3c
SQL Injection vulnerability in Online Book Store v1.0 via the bookisbn parameter to admin_edit.php, which could let a remote malicious user execute arbitrary code.
[]
null
null
null
null
GHSA-f93w-237m-4cjv
Sme.UP TOKYO V6R1M220406 was discovered to contain an arbitrary file download vulnerabilty via the component /ResourceService.
[]
null
7.5
null
null
GHSA-qv95-g3gm-x542
Hashicorp Vault Privilege Escalation Vulnerability
HashiCorp Vault and Vault Enterprise through 1.7.4 and 1.8.3 allowed a user with write permission to an entity alias ID sharing a mount accessor with another user to acquire this other user’s policies by merging their identities. Fixed in Vault and Vault Enterprise 1.7.5 and 1.8.4.
[]
null
2.9
null
null