id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
57.2k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2009-4702 | SQL injection vulnerability in the Tour Extension (pm_tour) extension before 0.0.13 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | [
"cpe:2.3:a:markus_barchfeld:pm_tour:*:*:*:*:*:*:*:*",
"cpe:2.3:a:markus_barchfeld:pm_tour:0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:markus_barchfeld:pm_tour:0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:markus_barchfeld:pm_tour:0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:markus_barchfeld:pm_tour:0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2024:4546 | Red Hat Security Advisory: git-lfs security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 7.5 | null | null |
GHSA-828x-pwwm-pchf | The Administrative console in IBM WebSphere Application Server (WAS) 6.1 before 6.1.0.47, 7.0 before 7.0.0.29, 8.0 before 8.0.0.7, and 8.5 before 8.5.5.0 does not properly perform caching, which allows local users to obtain sensitive information via unspecified vectors. | [] | null | null | null | null |
|
RHSA-2020:3495 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.2 security update on RHEL 6 | keycloak: security headers missing on REST endpoints keycloak: DoS by sending multiple simultaneous requests with a Content-Length header value greater than actual byte count of request body | [
"cpe:/a:redhat:red_hat_single_sign_on:7::el6"
] | null | 7.5 | null | null |
CVE-2019-16139 | An issue was discovered in the compact_arena crate before 0.4.0 for Rust. Generativity is mishandled, leading to an out-of-bounds write or read. | [
"cpe:2.3:a:compact_arena_project:compact_arena:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 9 |
|
GHSA-xjqp-6mgv-34p5 | In sendChunk of WirelessCharger.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239700400References: N/A | [] | null | 6.7 | null | null |
|
GHSA-6629-6f9p-64x8 | ** DISPUTED ** A vulnerability, which was classified as critical, was found in Ubiquiti EdgeRouter X 2.0.9-hotfix.6. Affected is an unknown function of the component Static Routing Configuration Handler. The manipulation of the argument next-hop-interface leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. VDB-223302 is the identifier assigned to this vulnerability. NOTE: The vendor position is that post-authentication issues are not accepted as vulnerabilities. | [] | null | 9.8 | null | null |
|
cisco-sa-ewlc-capwap-dos-2OA3JgKS | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Denial of Service Vulnerability | A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol processing of Cisco IOS XE Wireless Controller Software for the Cisco Catalyst 9000 Family Wireless Controllers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition of an affected device.
The vulnerability is due to insufficient validation of CAPWAP packets. An attacker could exploit this vulnerability by sending a malformed CAPWAP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to crash and reload, resulting in a DoS condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the March 2021 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2021 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74408"]. | [] | null | 8.6 | null | null |
CVE-2019-0122 | Double free in Intel(R) SGX SDK for Linux before version 2.2 and Intel(R) SGX SDK for Windows before version 2.1 may allow an authenticated user to potentially enable information disclosure or denial of service via local access. | [
"cpe:2.3:a:intel:software_guard_extensions_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | null | 7.1 | 3.6 |
|
RHSA-2009:1138 | Red Hat Security Advisory: openswan security update | Openswan ASN.1 parser vulnerability | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
CVE-2018-17297 | The unzip function in ZipUtil.java in Hutool before 4.1.12 allows remote attackers to overwrite arbitrary files via directory traversal sequences in a filename within a ZIP archive. | [
"cpe:2.3:a:hutool:hutool:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 6.4 |
|
GHSA-f888-6ph8-hvgc | A memory leak in the spi_gpio_probe() function in drivers/spi/spi-gpio.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering devm_add_action_or_reset() failures, aka CID-d3b0ffa1d75d. | [] | null | 7.5 | null | null |
|
GHSA-m4wp-2j5p-9x5g | A vulnerability was identified in Lenovo XClarity Administrator (LXCA) before 1.4.0 where LXCA user account names may be exposed to unauthenticated users with access to the LXCA web user interface. No password information of the user accounts is exposed. | [] | null | null | 5.3 | null |
|
CVE-2019-12934 | An issue was discovered in the wp-code-highlightjs plugin through 0.6.2 for WordPress. wp-admin/options-general.php?page=wp-code-highlight-js allows CSRF, as demonstrated by an XSS payload in the hljs_additional_css parameter. | [
"cpe:2.3:a:wp-code-highlightjs_project:wp-code-highlightjs:*:*:*:*:*:wordpress:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2023-4710 | TOTVS RM Portal cross site scripting | A vulnerability classified as problematic was found in TOTVS RM 12.1. Affected by this vulnerability is an unknown functionality of the component Portal. The manipulation of the argument d leads to cross site scripting. The attack can be launched remotely. The identifier VDB-238573 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:totvs:rm:12.1:*:*:*:*:*:*:*"
] | null | 4.3 | 4.3 | 5 |
CVE-2021-24180 | Related Posts for WordPress < 2.0.4 - Authenticated Reflected Cross-Site Scripting (XSS) | Unvalidated input and lack of output encoding within the Related Posts for WordPress plugin before 2.0.4 lead to a Reflected Cross-Site Scripting (XSS) vulnerability within the 'lang' GET parameter while editing a post, triggered when users with the capability of editing posts access a malicious URL. | [
"cpe:2.3:a:never5:related_posts:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | 3.5 |
GHSA-mq4g-hhgp-p8r7 | A remote execution of arbitrary commands vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.5.x: 6.5.4.17 and below; Aruba Instant 8.3.x: 8.3.0.13 and below; Aruba Instant 8.5.x: 8.5.0.10 and below; Aruba Instant 8.6.x: 8.6.0.5 and below; Aruba Instant 8.7.x: 8.7.0.0 and below. Aruba has released patches for Aruba Instant that address this security vulnerability. | [] | null | 9.8 | null | null |
|
GHSA-vrv5-28j8-rv7x | Improper Access Control in GitHub repository chocobozzz/peertube prior to 4.1.0. | [] | null | null | null | null |
|
GHSA-mqfx-478h-43p4 | Multiple cross-site scripting (XSS) vulnerabilities in BosDev BosMarket Business Directory System allow remote authenticated users to inject arbitrary web script or HTML via (1) user info (account details) or (2) a post. | [] | null | null | null | null |
|
CVE-2019-13967 | iTop 2.2.0 through 2.6.0 allows remote attackers to cause a denial of service (application outage) via many requests to launch a compile operation. The requests use the pages/exec.php?exec_env=production&exec_module=itop-hub-connector&exec_page=ajax.php&operation=compile URI. This only affects the community version. | [
"cpe:2.3:a:combodo:itop:*:*:*:*:community:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2019-19896 | In IXP EasyInstall 6.2.13723, there is Remote Code Execution via weak permissions on the Engine Service share. The default file permissions of the IXP$ share on the server allows modification of directories and files (e.g., bat-scripts), which allows execution of code in the context of NT AUTHORITY\SYSTEM on the target server and clients. | [
"cpe:2.3:a:ixpdata:easyinstall:6.2.13723:*:*:*:*:*:*:*"
] | null | null | 9.9 | null |
|
CVE-2021-21191 | Use after free in WebRTC in Google Chrome prior to 89.0.4389.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
CVE-2010-0388 | Format string vulnerability in the WebDAV implementation in webservd in Sun Java System Web Server 7.0 Update 6 allows remote attackers to cause a denial of service (daemon crash) and possibly have unspecified other impact via format string specifiers in the encoding attribute of the XML declaration in a PROPFIND request. | [
"cpe:2.3:a:sun:java_system_web_server:7.0:update_6:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2021-28501 | An issue has recently been discovered in Arista EOS where the incorrect use of EOS's AAA API’s by the OpenConfig and TerminAttr agents could result in unrestricted access to the device for local users with nopassword configuration. | An issue has recently been discovered in Arista EOS where the incorrect use of EOS's AAA API’s by the OpenConfig and TerminAttr agents could result in unrestricted access to the device for local users with nopassword configuration. | [
"cpe:2.3:a:arista:terminattr:*:*:*:*:*:*:*:*"
] | null | 9.1 | null | null |
GHSA-px4h-xg32-q955 | ReDoS in normalize-url | The normalize-url package before 4.5.1, 5.x before 5.3.1, and 6.x before 6.0.1 for Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data: URLs. | [] | null | 7.5 | null | null |
CVE-2018-20013 | In UrBackup 2.2.6, an attacker can send a malformed request to the client over the network, and trigger a fileservplugin/CClientThread.cpp CClientThread::ProcessPacket metadata_id!=0 assertion, leading to shutting down the client application. | [
"cpe:2.3:a:urbackup:urbackup:2.2.6:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2017-18221 | The __munlock_pagevec function in mm/mlock.c in the Linux kernel before 4.11.4 allows local users to cause a denial of service (NR_MLOCK accounting corruption) via crafted use of mlockall and munlockall system calls. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.9 |
|
RHSA-2021:2587 | Red Hat Security Advisory: ruby:2.5 security, bug fix, and enhancement update | ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? ruby: Regular expression denial of service vulnerability of WEBrick's Digest authentication ruby: HTTP response splitting in WEBrick ruby: Code injection via command argument of Shell#test / Shell#[] rubygem-json: Unsafe object creation vulnerability in JSON ruby: BasicSocket#read_nonblock method leads to information disclosure ruby: Potential HTTP request smuggling in WEBrick ruby: XML round-trip vulnerability in REXML | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | 7.5 | null |
CVE-2012-4112 | The Baseboard Management Controller (BMC) in Cisco Unified Computing System (UCS) allows local users to gain privileges and execute arbitrary commands via crafted command parameters within the command-line interface, aka Bug ID CSCtr43330. | [
"cpe:2.3:h:cisco:unified_computing_system:-:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2012-4010 | Opera before 11.60 allows remote attackers to spoof the address bar via unspecified homograph characters, a different vulnerability than CVE-2010-2660. | [
"cpe:2.3:a:opera:opera_browser:*:beta:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.52:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.52:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.53:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.54:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.60:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.61:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.62:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.63:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.00:beta:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.10:beta:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.50:beta:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.52:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-h8ff-xm6f-g53p | The Gallery Manager plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_Query_Arg without appropriate escaping on the URL in all versions up to, and including, 1.6.58. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] | null | 6.1 | null | null |
|
CVE-2023-48502 | Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79) | Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
CVE-2006-3303 | Multiple cross-site scripting (XSS) vulnerabilities in pm.php in DeluxeBB 1.07 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) subject or (2) to parameters. | [
"cpe:2.3:a:deluxebb:deluxebb:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-rc9p-5gf8-h3m8 | A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in virtio network subcomponent in the Linux kernel due to a double fget. This flaw could allow a local attacker to crash the system, and could even lead to a kernel information leak problem. | [] | null | 7.1 | null | null |
|
CVE-2012-0508 | Unspecified vulnerability in the JavaFX component in Oracle Java SE JavaFX, 1.3.0 and earlier, and 1.2.2 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. | [
"cpe:2.3:a:oracle:javafx:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:1.3.0:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-g625-6qfm-gm8r | The SOAP parser in PHP before 5.3.23 and 5.4.x before 5.4.13 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory functions. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-1824. | [] | null | null | null | null |
|
CVE-2025-1671 | Academist Membership <= 1.1.6 - Authentication Bypass via Account Takeover | The Academist Membership plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.1.6. This is due to the academist_membership_check_facebook_user() function not properly verifying a user's identity prior to authenticating them. This makes it possible for unauthenticated attackers to log in as any user, including site administrators. | [] | null | 9.8 | null | null |
CVE-2010-4772 | Cross-site scripting (XSS) vulnerability in blocks/lang.php in S-CMS 2.5 allows remote attackers to inject arbitrary web script or HTML via the id parameter to viewforum.php. | [
"cpe:2.3:a:matteoiammarrone:s-cms:2.5:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-c4c4-8xhp-h8pf | Cross-Site Request Forgery (CSRF) vulnerability in Copyscape / Indigo Stream Technologies Copyscape Premium allows Stored XSS.This issue affects Copyscape Premium: from n/a through 1.3.6. | [] | null | 7.1 | null | null |
|
GHSA-m55v-6hqc-x3jh | In Libarchive 3.4.0, archive_wstring_append_from_mbs in archive_string.c has an out-of-bounds read because of an incorrect mbrtowc or mbtowc call. For example, bsdtar crashes via a crafted archive. | [] | null | 5.5 | null | null |
|
CVE-2025-3237 | Tenda FH1202 wrlwpsset access control | A vulnerability was found in Tenda FH1202 1.2.0.14(408). It has been rated as critical. This issue affects some unknown processing of the file /goform/wrlwpsset. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | [] | 6.9 | 5.3 | 5.3 | 5 |
CVE-2024-43982 | WordPress Login As Users plugin <= 1.4.3 - Broken Access Control to Account Takeover vulnerability | Missing Authorization vulnerability in Geek Code Lab Login As Users allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Login As Users: from n/a through 1.4.3. | [
"cpe:2.3:a:geek_code_lab:login_as_users:*:*:*:*:*:*:*:*",
"cpe:2.3:a:geekcodelab:login_as_users:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | null |
CVE-2019-3717 | Select Dell Client Commercial and Consumer platforms contain an Improper Access Vulnerability. An unauthenticated attacker with physical access to the system could potentially bypass intended Secure Boot restrictions to run unsigned and untrusted code on expansion cards installed in the system during platform boot. Refer to https://www.dell.com/support/article/us/en/04/sln317683/dsa-2019-043-dell-client-improper-access-control-vulnerability?lang=en for versions affected by this vulnerability. | [
"cpe:2.3:o:dell:chengming_3967_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:chengming_3967:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3977_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:chengming_3977:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3980_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:chengming_3980:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g3_3579_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:g3_3579:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g3_3779_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:g3_3779:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g5_5587_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:g5_5587:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g5_5590_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:g5_5590:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g7_7588_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:g7_7588:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g7_7590_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:g7_7590:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g7_7790_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:g7_7790:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:embedded_box_pc_5000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:embedded_box_pc_5000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3153_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3153:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3158_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3158:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5368_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5368:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5378_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5378:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5379_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5379:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7353_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7353:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7359_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7359:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7368_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7368:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7373_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7373:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7378_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7378:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7370_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3459_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3459:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3467_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3467:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3468_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3468:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5468_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5468:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7460_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7460:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7466_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7466:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7467_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7467:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3458_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3458:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3559_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3559:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3567_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3567:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3568_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3568:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5566_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5566:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5567_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5567:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7560_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7560:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5568_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5568:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5578_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5578:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5579_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5579:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7568_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7568:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7569_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7569:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7573_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7573:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7579_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7579:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7570_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7570:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7566_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7566:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7567_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7567:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7577_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7577:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3558_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3558:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5767_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5767:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7773_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7773:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7778_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7778:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7779_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7779:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3268_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3268:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3470_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3470:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3476_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3476:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3481_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3481:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3576_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3576:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3580_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3583_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3583:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3581_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3581:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3584_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3584:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3668_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3668:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_670_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3780_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3780:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3781_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3781:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5370_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5457_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5457:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5458_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5458:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5459_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5459:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5481_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5481:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5482_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5482:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5557_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5557:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5558_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5558:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5559_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5559:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5570_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5570:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5580_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5582_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5582:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5758_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5758:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5759_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5759:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5770_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5770:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7380_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7386_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7386:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7472_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7472:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7572_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7572:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7580_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7586_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7586:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7786_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7786:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3160_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3160:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3180_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3180:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3189_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3189:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3190_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3190:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3350_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3379_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3379:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3380_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3390_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3450_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3460_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3460:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3470_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3470:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3490_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3550_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3560_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3560:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3570_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3570:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3580_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3590_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3590:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5175_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5175:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5179_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5179:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5280_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5280:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5285_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5285:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5288_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5288:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5289_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5289:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5290_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5290_2-in-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5290_2-in-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5414_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5414:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5420_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5450_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5488_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5488:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5490_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5491_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5491:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5550_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5580_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5590_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5590:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5591_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5591:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7202_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7202:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7212_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7214_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7214:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7275_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7275:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7280_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7280:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7285_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7285:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7290_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7350_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7370_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7380_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7389_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7389:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7390_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7390_2-in-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7390_2-in-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7414_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7414:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7424_rugged_extreme_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7424_rugged_extreme:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7490_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_e5250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_e5250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_e5270_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_e5270:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_e5450_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_e5450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_e5470_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_e5470:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_e5550_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_e5550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_e5570_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_e5570:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_e7250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_e7250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_e7270_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_e7270:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_e7450_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_e7450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_e7470_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_e7470:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3040_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_3040:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3046_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_3046:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3050_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_3050:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3050_aio_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_3050_aio:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3060_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_3060:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3240_aio_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_3240_aio:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5040_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_5040:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5050_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_5050:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5060_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_5060:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5250_aio_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_5250_aio:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5260_aio_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_5260_aio:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7040_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_7040:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7050_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_7050:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7060_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_7060:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7440_aio_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_7440_aio:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7450_aio_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_7450_aio:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7460_aio_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_7460_aio:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7760_aio_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_7760_aio:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_xe3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_xe3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3420_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_3420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3430_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_3430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3510_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_3510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3520_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_3520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3530_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_3530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3620_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_3620:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3630_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_3630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3930_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_3930:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5510_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_5510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5520_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_5520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5530_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_5530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5530_2-in-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_5530_2-in-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5720_aio_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_5720_aio:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5820_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_5820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7510_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_7510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7520_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_7520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7530_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_7530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7710_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_7710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7720_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_7720:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7820_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_7820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7920_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_7920:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_t5810_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_t5810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_t7810_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_t7810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_t7910_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_t7910:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:venue_7140_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:venue_7140:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3468_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3468:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5468_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_5468:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3568_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3568:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5568_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_5568:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_7570_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_7570:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_7580_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_7580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3070_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3070:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3267_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3267:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3268_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3268:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3458_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3458:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3459_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3459:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3470_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3470:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3478_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3478:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3580_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3581_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3581:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3584_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3584:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3583_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3583:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3660_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3667_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3667:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3668_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3668:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3669_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3669:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3670_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5370_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_5370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5471_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_5471:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5481_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_5481:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5581_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_5581:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:wyse_5070_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:wyse_5070:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:wyse_7040_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:wyse_7040:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_9250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xps_9250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_9350_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xps_9350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_9360_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xps_9360:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_9370_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xps_9370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_9380_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xps_9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_9550_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xps_9550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_9560_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xps_9560:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_9570_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xps_9570:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_7760_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xps_7760:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_8900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xps_8900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_9575_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xps_9575:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_9343_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xps_9343:-:*:*:*:*:*:*:*"
] | null | null | 7.1 | null |
|
GHSA-3g5x-2qp3-gm68 | The Gutenberg Forms plugin for WordPress is vulnerable to arbitrary file uploads due to the users can specify the allowed file types in the 'upload' function in versions up to, and including, 2.2.9. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. | [] | null | 9.8 | null | null |
|
GHSA-pphx-vq77-fh32 | Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.28. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.7 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:H). | [] | null | 6.7 | null | null |
|
CVE-2006-4922 | Unrestricted file upload vulnerability in starnet/editors/htmlarea/popups/images.php in Site@School (S@S) 2.4.02 and earlier allows remote attackers to upload and execute arbitrary files with executable extensions. | [
"cpe:2.3:a:siteatschool:siteatschool:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-qj5h-583m-qh6v | GNU LibreDWG 0.12.3.4163 through 0.12.3.4191 has a double-free in bit_chain_free (called from dwg_encode_MTEXT and dwg_encode_add_object). | [] | null | null | null | null |
|
GHSA-xjm3-g539-hx9g | Cross-site scripting (XSS) vulnerability in Microsoft Internet Security and Acceleration (ISA) Server 2000 allows remote attackers to inject arbitrary web script via a URL containing the script in the domain name portion, which is not properly cleansed in the default error pages (1) 500.htm for "500 Internal Server error" or (2) 404.htm for "404 Not Found." | [] | null | null | null | null |
|
GHSA-2r4m-58v9-r9jf | Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following: Execute code on the affected device or cause it to reload unexpectedly Cause LLDP database corruption on the affected device For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Cisco has released firmware updates that address these vulnerabilities. | [] | null | null | null | null |
|
CVE-2022-36490 | H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function EditMacList. | [
"cpe:2.3:o:h3c:magic_nx18_plus_firmware:nx18pv100r003:*:*:*:*:*:*:*",
"cpe:2.3:h:h3c:magic_nx18_plus:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2024-49995 | tipc: guard against string buffer overrun | In the Linux kernel, the following vulnerability has been resolved:
tipc: guard against string buffer overrun
Smatch reports that copying media_name and if_name to name_parts may
overwrite the destination.
.../bearer.c:166 bearer_name_validate() error: strcpy() 'media_name' too large for 'name_parts->media_name' (32 vs 16)
.../bearer.c:167 bearer_name_validate() error: strcpy() 'if_name' too large for 'name_parts->if_name' (1010102 vs 16)
This does seem to be the case so guard against this possibility by using
strscpy() and failing if truncation occurs.
Introduced by commit b97bf3fd8f6a ("[TIPC] Initial merge")
Compile tested only. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-xcmp-v444-vq94 | The Category and Taxonomy Meta Fields plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the image meta field value in the 'wpaft_add_meta_textinput' function in versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with editor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | [] | null | 5.5 | null | null |
|
GHSA-cwwg-93gv-4r7h | In the Linux kernel, the following vulnerability has been resolved:soc: fsl: qbman: Always disable interrupts when taking cgr_locksmp_call_function_single disables IRQs when executing the callback. To
prevent deadlocks, we must disable IRQs when taking cgr_lock elsewhere.
This is already done by qman_update_cgr and qman_delete_cgr; fix the
other lockers. | [] | null | 5.5 | null | null |
|
CVE-2023-43983 | Presto Changeo attributegrid up to 2.0.3 was discovered to contain a SQL injection vulnerability via the component disable_json.php. | [
"cpe:2.3:a:presto-changeo:attribute_grid:*:*:*:*:*:prestashop:*:*"
] | null | 9.8 | null | null |
|
CVE-2017-16126 | The module botbait is a tool to be used to track bot and automated tools usage with-in the npm ecosystem. botbait is known to record and track user information. The module tracks the following information. Source IP process.versions process.platform How the module was invoked (test, require, pre-install) | [
"cpe:2.3:a:botbait_project:botbait:*:*:*:*:*:node.js:*:*"
] | null | null | 5.3 | 5 |
|
CVE-2021-28070 | Cross Site Request Forgery (CSRF) vulnerability exist in PopojiCMS 2.0.1 in po-admin/route.php?mod=user&act=multidelete. | [
"cpe:2.3:a:popojicms:popojicms:2.0.1:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4.3 |
|
GHSA-vrx6-28g2-g5gm | Cross-Site Request Forgery (CSRF) vulnerability in xtemos WoodMart - Multipurpose WooCommerce Theme <= 7.1.1 versions. | [] | null | 8.8 | null | null |
|
GHSA-3xfg-wqwr-xxc8 | A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.4, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. A malicious application may be able to gain root privileges. | [] | null | null | null | null |
|
CVE-2016-6132 | The gdImageCreateFromTgaCtx function in the GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file. | [
"cpe:2.3:a:libgd:libgd:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
CVE-2019-2972 | Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters). The supported version that is affected is 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data as well as unauthorized read access to a subset of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). | [
"cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*"
] | null | 7.3 | null | 7.5 |
|
CVE-2023-44984 | WordPress bbp style pack Plugin <= 5.6.7 is vulnerable to Cross Site Scripting (XSS) | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Robin Wilson bbp style pack plugin <= 5.6.7 versions. | [
"cpe:2.3:a:rewweb:bbp_style_pack:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null |
CVE-2017-10228 | Vulnerability in the Oracle Hospitality Cruise Shipboard Property Management System component of Oracle Hospitality Applications (subcomponent: Module). The supported version that is affected is 8.0.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Cruise Shipboard Property Management System. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Hospitality Cruise Shipboard Property Management System accessible data as well as unauthorized read access to a subset of Oracle Hospitality Cruise Shipboard Property Management System accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:hospitality_cruise_shipboard_property_management_system:8.0.0.0:*:*:*:*:*:*:*"
] | null | null | 5.4 | 5.5 |
|
ICSA-22-342-02 | AVEVA InTouch Access Anywhere and Plant SCADA Access Anywhere | AVEVA InTouch Access Anywhere versions 2020 R2 and older are vulnerable to a path traversal exploit that could allow an unauthenticated user with network access to read files on the system outside of the secure gateway web server. CVE-2022-23854 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). AVEVA InTouch Access Anywhere versions 2023 and prior and Plant SCADA Access Anywhere versions 2020 R2 and prior use outdated OpenSSL versions that are vulnerable to a classic buffer overflow, which could allow an attacker to create denial-of-service conditions or execute arbitrary code. CVE-2021-3711 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). AVEVA InTouch Access Anywhere versions 2023 and prior and Plant SCADA Access Anywhere versions 2020 R2 and prior use versions of jQuery vulnerable to cross-site scripting. Passing HTML from untrusted sources—even after sanitizing it—to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code in jQuery versions greater than or equal to 1.2 and before 3.5.0. CVE-2020-11022 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [] | null | null | 6.1 | null |
CVE-2021-32657 | Malicious user could break user administration page | Nextcloud Server is a Nextcloud package that handles data storage. In versions of Nextcloud Server prior to 10.0.11, 20.0.10, and 21.0.2, a malicious user may be able to break the user administration page. This would disallow administrators to administrate users on the Nextcloud instance. The vulnerability is fixed in versions 19.0.11, 20.0.10, and 21.0.2. As a workaround, administrators can use the OCC command line tool to administrate the Nextcloud users. | [
"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
CVE-2011-1925 | nbd-server.c in Network Block Device (nbd-server) 2.9.21 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by causing a negotiation failure, as demonstrated by specifying a name for a non-existent export. | [
"cpe:2.3:a:wouter_verhelst:nbd:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-f67q-wr6w-23jq | Boa has an uncaught exception when transitioning the state of `AsyncGenerator` objects | A wrong assumption made when handling ECMAScript's `AsyncGenerator` operations can cause an uncaught exception on certain scripts.DetailsBoa's implementation of `AsyncGenerator` makes the assumption that the state of an `AsyncGenerator` object cannot change while resolving a promise created by methods of `AsyncGenerator` such as `%AsyncGeneratorPrototype%.next`, `%AsyncGeneratorPrototype%.return`, or `%AsyncGeneratorPrototype%.throw`.
However, a carefully constructed code could trigger a state transition from a getter method for the promise's `then` property, which causes the engine to fail an assertion of this assumption, causing an uncaught exception. This could be used to create a Denial Of Service attack in applications that run arbitrary ECMAScript code provided by an external user.PatchesVersion 0.19.0 is patched to correctly handle this case.WorkaroundsUsers unable to upgrade to the patched version would want to use [`std::panic::catch_unwind`](https://doc.rust-lang.org/std/panic/fn.catch_unwind.html) to ensure any exceptions caused by the engine don't impact the availability of the main application.Referenceshttps://github.com/boa-dev/boa/commit/69ea2f52ed976934bff588d6b566bae01be313f7https://github.com/tc39/ecma262/security/advisories/GHSA-g38c-wh3c-5h9r | [] | null | 7.5 | null | null |
GHSA-7c7c-8m42-fjhc | There is a Parameter verification issue in Huawei Smartphone.Successful exploitation of this vulnerability can affect service integrity. | [] | null | null | null | null |
|
GHSA-q9r3-wvmc-78qp | On all versions of BIG-IP 12.1.x and 11.6.x, the original TLS protocol includes a weakness in the master secret negotiation that is mitigated by the Extended Master Secret (EMS) extension defined in RFC 7627. TLS connections that do not use EMS are vulnerable to man-in-the-middle attacks during renegotiation. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. | [] | null | null | null | null |
|
CVE-2016-9910 | The serializer in html5lib before 0.99999999 might allow remote attackers to conduct cross-site scripting (XSS) attacks by leveraging mishandling of special characters in attribute values, a different vulnerability than CVE-2016-9909. | [
"cpe:2.3:a:html5lib:html5lib:*:1.0b8:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-pjh3-48qc-pm5c | Multiple vulnerabilities in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to either execute arbitrary code on the underlying operating system, install and boot a malicious software image, or execute unsigned binaries on an affected device. These vulnerabilities are due to improper checks performed by system boot routines. To exploit these vulnerabilities, the attacker would need privileged access to the CLI of the device. A successful exploit could allow the attacker to either execute arbitrary code on the underlying operating system or execute unsigned code and bypass the image verification check part of the secure boot process. For more information about these vulnerabilities, see the Details section of this advisory. | [] | null | null | null | null |
|
GHSA-2xjj-2wcr-mj9m | Multiple cross-site scripting (XSS) vulnerabilities in the Mingle Forum plugin before 1.0.34 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) search_words parameter in a search action to wpf.class.php or (2) togroupusers parameter in an add_user_togroup action to fs-admin/fs-admin.php. | [] | null | null | null | null |
|
CVE-2017-16380 | An issue was discovered in Adobe Acrobat and Reader: 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, and 11.0.22 and earlier versions. This vulnerability is an instance of a security bypass vulnerability for a certain file-type extension. Acrobat maintains both a blacklist and whitelist (the user can specify an allowed attachment). However, any file extensions that are neither on the blacklist nor the whitelist can still be opened after displaying a warning prompt. | [
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*"
] | null | null | 8.8 | 9.3 |
|
GHSA-vhr6-32q6-wwvf | Due to lack of proper memory management, when a victim opens manipulated Portable Document Format (.pdf, PDFPublishing.dll) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application. | [] | null | 5.5 | null | null |
|
CVE-2007-5685 | The safe_path function in shttp before 0.0.5 allows remote attackers to conduct directory traversal attacks and read files via a combination of ".." and sub-directory specifiers that resolve to a pathname that is at or below the same level as the web document root, but in a different part of the directory tree. | [
"cpe:2.3:a:serverkit:shttp:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2006-3687 | Stack-based buffer overflow in the Universal Plug and Play (UPnP) service in D-Link DI-524, DI-604 Broadband Router, DI-624, D-Link DI-784, WBR-1310 Wireless G Router, WBR-2310 RangeBooster G Router, and EBR-2310 Ethernet Broadband Router allows remote attackers to execute arbitrary code via a long M-SEARCH request to UDP port 1900. | [
"cpe:2.3:h:d-link:di-604_broadband_router:*:*:*:*:*:*:*:*",
"cpe:2.3:h:d-link:di-784:*:*:*:*:*:*:*:*",
"cpe:2.3:h:d-link:ebr-2310_ethernet_broadband_router:*:*:*:*:*:*:*:*",
"cpe:2.3:h:d-link:wbr-1310_wireless_g_router:*:*:*:*:*:*:*:*",
"cpe:2.3:h:d-link:wbr-2310_rangebooster_g_router:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:di-524:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:di-624:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2019-1121 | A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory, aka 'DirectWrite Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1117, CVE-2019-1118, CVE-2019-1119, CVE-2019-1120, CVE-2019-1122, CVE-2019-1123, CVE-2019-1124, CVE-2019-1127, CVE-2019-1128. | [
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9.3 |
|
GHSA-96rp-hhc3-26cm | In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, Uninitialized data for socket address leads to information exposure. | [] | null | null | 5.5 | null |
|
CVE-2023-40834 | OpenCart CMS v4.0.2.2 was discovered to lack a protective mechanism on its login page against excessive login attempts, allowing unauthenticated attackers to gain access to the application via a brute force attack to the password parameter. | [
"cpe:2.3:a:opencart:opencart:4.0.2.2:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-mvp5-93x2-533f | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in RadiusTheme The Post Grid allows Stored XSS.This issue affects The Post Grid: from n/a through 7.7.1. | [] | null | 6.5 | null | null |
|
GHSA-w7rh-9w5v-rwqj | Magento defense-in-depth security mitigation vulnerability | Magento versions 2.3.4 and earlier, 2.2.11 and earlier (see note), 1.14.4.4 and earlier, and 1.9.4.4 and earlier have a defense-in-depth security mitigation vulnerability. Successful exploitation could lead to unauthorized access to admin panel. | [] | null | 7.5 | null | null |
CVE-2004-1549 | The conference menu in ActivePost Standard 3.1 sends passwords of password-protected rooms in cleartext, which could allow remote attackers to gain sensitive information by sniffing the network connection. | [
"cpe:2.3:a:onnuri_infotek:activepost_standard:3.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-39vj-8gx7-5cj5 | The Weintek cMT product line is vulnerable to a cross-site scripting vulnerability, which could allow an unauthenticated remote attacker to inject malicious JavaScript code. | [] | null | 6.1 | null | null |
|
RHSA-2024:6969 | Red Hat Security Advisory: container-tools:rhel8 security update | golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: net/mail: comments in display names are incorrectly handled golang: net: malformed DNS message can cause infinite loop net/http: Denial of service due to improper 100-continue handling in net/http | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.9 | null | null |
RHSA-2021:0240 | Red Hat Security Advisory: dnsmasq security update | dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker | [
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 4 | null | null |
GHSA-4jr7-wrr7-7q7v | Directory traversal vulnerability in the com.me.opmanager.extranet.remote.communication.fw.fe.FileCollector servlet in ZOHO ManageEngine OpManager 8.8 through 11.3, Social IT Plus 11.0, and IT360 10.4 and earlier allows remote attackers or remote authenticated users to write to and execute arbitrary WAR files via a .. (dot dot) in the regionID parameter. | [] | null | null | null | null |
|
CVE-2022-20582 | In ppmp_unprotect_mfcfw_buf of drm_fw.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-233645166References: N/A | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2023-36845 | Junos OS: EX and SRX Series: A PHP vulnerability in J-Web allows an unauthenticated to control an important environment variable | A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series
and SRX Series
allows an unauthenticated, network-based attacker to remotely execute code.
Using a crafted request which sets the variable PHPRC an attacker is able to modify the PHP execution environment allowing the injection und execution of code.
This issue affects Juniper Networks Junos OS on EX Series
and
SRX Series:
* All versions prior to
20.4R3-S9;
* 21.1 versions 21.1R1 and later;
* 21.2 versions prior to 21.2R3-S7;
* 21.3 versions prior to 21.3R3-S5;
* 21.4 versions prior to 21.4R3-S5;
* 22.1 versions
prior to
22.1R3-S4;
* 22.2 versions
prior to
22.2R3-S2;
* 22.3 versions
prior to
22.3R2-S2, 22.3R3-S1;
* 22.4 versions
prior to
22.4R2-S1, 22.4R3;
* 23.2 versions prior to 23.2R1-S1, 23.2R2. | [
"cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex2200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex2200-c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex2200-vc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex2300-24mp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex2300-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex2300-24t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex2300-48mp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex2300-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex2300-48t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex2300-c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex2300m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex3200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex3300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex3300-vc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4200-vc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-24p-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-24t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-24t-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-32f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-32f-dc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-32f-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-48mp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-48mp-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-48p-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-48t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-48t-afi:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-48t-dc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-48t-dc-afi:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-48t-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-48tafi:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-48tdc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-48tdc-afi:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-mp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-vc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4500-vc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4550-vc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4550\\/vc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4600-vc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex6200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex6210:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex8200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex8200-vc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex8208:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex8216:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex9200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex9204:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex9208:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex9214:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex9250:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex9251:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex9253:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
CVE-2018-13085 | The mintToken function of a smart contract implementation for FreeCoin (FREE), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [
"cpe:2.3:a:freecoin_project:freecoin:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-fp3g-q6mc-hv9v | An information disclosure vulnerability exists when Microsoft Edge improperly handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8123. | [] | null | null | 4.3 | null |
|
GHSA-fgcc-2fx7-p23v | A denial of service vulnerability exists in MDT's firmware for the KNXnet/IP Secure router SCN-IP100.03 and KNX IP interface SCN-IP000.03 before v3.0.4, that allows a remote attacker to turn the device unresponsive to all requests on the KNXnet/IP Secure layer, until the device is rebooted, via a SESSION_REQUEST frame with a modified total length field. | [] | null | 7.5 | null | null |
|
GHSA-72qj-6vqg-mprg | An issue was discovered in OpenEXR before 2.4.1. There is an out-of-bounds read and write in DwaCompressor::uncompress in ImfDwaCompressor.cpp when handling the UNKNOWN compression case. | [] | null | 5.5 | null | null |
|
GHSA-47wx-963f-2v3w | The Order Tracking Pro plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the start_date and end_date parameters in versions up to, and including, 3.3.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] | null | 6.1 | null | null |
|
CVE-2006-1927 | Cisco IOS XR, when configured for Multi Protocol Label Switching (MPLS) and running on Cisco CRS-1 or Cisco 12000 series routers, allows remote attackers to cause a denial of service (Line card crash) via certain MPLS packets, as identified by Cisco bug ID CSCsc77475. | [
"cpe:2.3:o:cisco:ios_xr:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.2.3:*:crs-1:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.2.3:*:prp:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.2.50:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2022-38059 | WordPress Access Code Feeder plugin <= 1.0.3 - Cross-Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Alexey Trofimov's Access Code Feeder plugin <= 1.0.3 at WordPress. | [
"cpe:2.3:a:access_code_feeder_project:access_code_feeder:*:*:*:*:*:wordpress:*:*"
] | null | 5.5 | null | null |
CVE-2008-2686 | webinc/bxe/scripts/loadsave.php in Flux CMS 1.5.0 and earlier allows remote attackers to execute arbitrary code by overwriting a PHP file in webinc/bxe/scripts/ via a filename in the XML parameter and PHP sequences in the request body, then making a direct request for this filename. | [
"cpe:2.3:a:flux_cms:flux_cms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:flux_cms:flux_cms:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:flux_cms:flux_cms:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:flux_cms:flux_cms:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:flux_cms:flux_cms:1.31:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-h3cg-ghq7-28v7 | PHP remote file inclusion vulnerability in index.php in Artmedic Links 5.0 allows remote attackers to execute arbitrary PHP code via a URL in the id parameter, which is processed by the readfile function. | [] | null | null | null | null |
|
CVE-2022-36784 | Elsight – Elsight Halo Remote Code Execution (RCE) |
Elsight – Elsight Halo Remote Code Execution (RCE)
Elsight Halo web panel allows us to perform connection validation.
through the POST request :
/api/v1/nics/wifi/wlan0/ping
we can abuse DESTINATION parameter and leverage it to remote code execution.
| [
"cpe:2.3:o:elsight:halo_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:elsight:halo:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
GHSA-8h9h-rx47-ch3c | SQL Injection vulnerability in Online Book Store v1.0 via the bookisbn parameter to admin_edit.php, which could let a remote malicious user execute arbitrary code. | [] | null | null | null | null |
|
GHSA-f93w-237m-4cjv | Sme.UP TOKYO V6R1M220406 was discovered to contain an arbitrary file download vulnerabilty via the component /ResourceService. | [] | null | 7.5 | null | null |
|
GHSA-qv95-g3gm-x542 | Hashicorp Vault Privilege Escalation Vulnerability | HashiCorp Vault and Vault Enterprise through 1.7.4 and 1.8.3 allowed a user with write permission to an entity alias ID sharing a mount accessor with another user to acquire this other user’s policies by merging their identities. Fixed in Vault and Vault Enterprise 1.7.5 and 1.8.4. | [] | null | 2.9 | null | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.