id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
RHSA-2019:3046 | Red Hat Security Advisory: Red Hat Single Sign-On 7.3.4 security update on RHEL 8 | undertow: Information leak in requests for directories without trailing slashes jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server. jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. jackson-databind: default typing mishandling leading to remote code execution keycloak: adapter endpoints are exposed via arbitrary URLs keycloak: cross-realm user access auth bypass | [
"cpe:/a:redhat:red_hat_single_sign_on:7::el8"
] | null | null | 5 | null |
GHSA-8jf2-78m7-7f8v | Mattermost fails to verify if the requestor is a sysadmin or not, before allowing `install` requests to the Apps allowing a regular user send install requests to the Apps. | [] | null | 4.2 | null | null |
|
CVE-2023-40185 | Shescape on Windows escaping may be bypassed in threaded context | shescape is simple shell escape library for JavaScript. This may impact users that use Shescape on Windows in a threaded context. The vulnerability can result in Shescape escaping (or quoting) for the wrong shell, thus allowing attackers to bypass protections depending on the combination of expected and used shell. This bug has been patched in version 1.7.4. | [
"cpe:2.3:a:shescape_project:shescape:*:*:*:*:*:node.js:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
CVE-2022-20134 | In readArguments of CallSubjectDialog.java, there is a possible way to trick the user to call the wrong phone number due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-218341397 | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
GHSA-xxqf-p783-9fhr | Multiple vulnerabilities in Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, local attacker to read arbitrary files on the underlying operating system (OS) of an affected device. For more information about these vulnerabilities, see the Details section of this advisory. | [] | null | 4.4 | null | null |
|
GHSA-mw76-359p-w3vr | The unite-gallery-lite plugin before 1.5 for WordPress has SQL injection via data[galleryID] to wp-admin/admin-ajax.php. | [] | null | null | null | null |
|
CVE-2022-38380 | An improper access control [CWE-284] vulnerability in FortiOS version 7.2.0 and versions 7.0.0 through 7.0.7 may allow a remote authenticated read-only user to modify the interface settings via the API. | [
"cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.2.0:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
|
RHSA-2008:0579 | Red Hat Security Advisory: vsftpd security update | older vsftpd authentication memory leak | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::es"
] | null | null | null | null |
CVE-2004-1113 | SQL injection vulnerability in SQLgrey Postfix greylisting service before 1.2.0 allows remote attackers to execute arbitrary SQL commands via the (1) sender or (2) recipient e-mail addresses. | [
"cpe:2.3:a:sqlgrey:sqlgrey_postfix_greylisting_service:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sqlgrey:sqlgrey_postfix_greylisting_service:1.1.3:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-h774-2wxq-fmf6 | SQL injection vulnerability in modules.php in the EasyContent module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the page_id parameter. | [] | null | null | null | null |
|
CVE-2009-4556 | Quick Heal AntiVirus Plus 2009 10.00 SP1 and Quick Heal Total Security 2009 10.00 SP1 use weak permissions (Everyone: Full Control) for the product files, which allows local users to gain privileges by replacing executables with Trojan horse programs, as demonstrated by replacing quhlpsvc.exe. | [
"cpe:2.3:a:quickheal:antivirus_plus_2009:10.00:sp1:*:*:*:*:*:*",
"cpe:2.3:a:quickheal:total_security_2009:10.00:sp1:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-2024-7676 | Sourcecodester Car Driving School Management System Master.php save_package sql injection | A vulnerability was found in Sourcecodester Car Driving School Management System 1.0. It has been classified as critical. Affected is the function save_package of the file /classes/Master.php?f=save_package. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:sourcecodester:car_driving_school_management_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oretnom23:car_driving_school_management_system:1.0:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 |
GHSA-6m74-gf29-77gx | The Windows Adobe Type Manager Font Driver (Atmfd.dll) in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, and Windows Server 2012 and R2 allows an elevation of privilege vulnerability due to the way objects are handled in memory, aka "OpenType Font Driver Elevation of Privilege Vulnerability". | [] | null | null | 7 | null |
|
CVE-2004-0043 | Buffer overflow in Yahoo Instant Messenger 5.6.0.1351 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long filename in the download feature. | [
"cpe:2.3:a:yahoo:messenger:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-m5vv-7jxc-8p6x | Redaxo Core CMS Cross Site Scripting (XSS) | The mediapool feature of the Redaxo Core CMS application v 5.17.1 is vulnerable to Cross Site Scripting(XSS) which allows a remote attacker to escalate privileges. | [] | 5.3 | null | null | null |
GHSA-c76x-fv7r-4xjr | In SQLite 3.31.1, there is an out of bounds access problem through ALTER TABLE for views that have a nested FROM clause. | [] | null | 9.8 | null | null |
|
CVE-2025-46394 | In tar in BusyBox through 1.37.0, a TAR archive can have filenames hidden from a listing through the use of terminal escape sequences. | [] | null | 3.2 | null | null |
|
CVE-2015-0328 | Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2015-0325 and CVE-2015-0326. | [
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2001-0968 | Knox Arkeia server 4.2, and possibly other versions, installs its root user with a null password by default, which allows local and remote users to gain privileges. | [
"cpe:2.3:a:knox_software:arkeia:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:knox_software:arkeia:4.2.8.2:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2014-6298 | Unrestricted file upload vulnerability in the mm_forum extension before 1.9.3 for TYPO3 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via unspecified vectors. | [
"cpe:2.3:a:mm_forum_project:mm_forum:*:*:*:*:*:typo3:*:*",
"cpe:2.3:a:mm_forum_project:mm_forum:0.1.0:*:*:*:*:typo3:*:*",
"cpe:2.3:a:mm_forum_project:mm_forum:0.1.1:*:*:*:*:typo3:*:*",
"cpe:2.3:a:mm_forum_project:mm_forum:0.1.2:*:*:*:*:typo3:*:*",
"cpe:2.3:a:mm_forum_project:mm_forum:0.1.3:*:*:*:*:typo3:*:*",
"cpe:2.3:a:mm_forum_project:mm_forum:0.1.4:*:*:*:*:typo3:*:*",
"cpe:2.3:a:mm_forum_project:mm_forum:0.1.5:*:*:*:*:typo3:*:*",
"cpe:2.3:a:mm_forum_project:mm_forum:0.1.6:*:*:*:*:typo3:*:*",
"cpe:2.3:a:mm_forum_project:mm_forum:0.1.7:*:*:*:*:typo3:*:*",
"cpe:2.3:a:mm_forum_project:mm_forum:0.1.8:*:*:*:*:typo3:*:*",
"cpe:2.3:a:mm_forum_project:mm_forum:1.8.1:*:*:*:*:typo3:*:*",
"cpe:2.3:a:mm_forum_project:mm_forum:1.8.2:*:*:*:*:typo3:*:*",
"cpe:2.3:a:mm_forum_project:mm_forum:1.8.3:*:*:*:*:typo3:*:*",
"cpe:2.3:a:mm_forum_project:mm_forum:1.9.0:*:*:*:*:typo3:*:*",
"cpe:2.3:a:mm_forum_project:mm_forum:1.9.1:*:*:*:*:typo3:*:*"
] | null | null | null | 7.5 |
|
CVE-2009-1815 | Stack-based buffer overflow in Sonic Spot Audioactive Player 1.93b allows remote attackers to execute arbitrary code via a long string in a playlist file, as demonstrated by a long .mp3 URL in a .m3u file. | [
"cpe:2.3:a:sonicspot:audioactive_player:1.93b:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2022-21766 | In CCCI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06641673; Issue ID: ALPS06641653. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | 4.6 |
|
RHSA-2024:8546 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.9.5 bug fixes and container updates | elliptic: nodejs/elliptic: EDDSA signature malleability due to missing signature length check elliptic: nodejs/elliptic: ECDSA signature malleability due to missing checks elliptic: nodejs/elliptic: ECDSA implementation malleability due to BER-enconded signatures being allowed elliptic: Missing Validation in Elliptic's EDDSA Signature Verification | [
"cpe:/a:redhat:acm:2.9::el8"
] | null | 8.2 | null | null |
CVE-2025-21814 | ptp: Ensure info->enable callback is always set | In the Linux kernel, the following vulnerability has been resolved:
ptp: Ensure info->enable callback is always set
The ioctl and sysfs handlers unconditionally call the ->enable callback.
Not all drivers implement that callback, leading to NULL dereferences.
Example of affected drivers: ptp_s390.c, ptp_vclock.c and ptp_mock.c.
Instead use a dummy callback if no better was specified by the driver. | [] | null | 5.5 | null | null |
CVE-2020-20345 | WTCMS 1.0 contains a reflective cross-site scripting (XSS) vulnerability in the page management background which allows attackers to obtain cookies via a crafted payload entered into the search box. | [
"cpe:2.3:a:wtcms_project:wtcms:1.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
GHSA-8xqw-6q3f-w3jp | An ActiveX control in IcoLaunch.dll in Mitsubishi Electric Automation MC-WorX Suite 8.02 allows user-assisted remote attackers to execute arbitrary programs via a crafted HTML document in conjunction with a Login Client button click. | [] | null | null | null | null |
|
CVE-2023-3083 | Cross-site Scripting (XSS) - Stored in nilsteampassnet/teampass | Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9. | [
"cpe:2.3:a:teampass:teampass:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | null |
RHSA-2020:0127 | Red Hat Security Advisory: thunderbird security update | Mozilla: Bypass of @namespace CSS sanitization during pasting Mozilla: Type Confusion in XPCVariant.cpp Mozilla: CSS sanitization does not escape HTML tags Mozilla: Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4 Mozilla: IonMonkey type confusion with StoreElementHole and FallibleStoreElement | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 8.8 | null |
GHSA-fqfw-xqpm-2238 | The Grandstream Wave app 1.0.1.26 and earlier for Android does not use HTTPS when retrieving update information, which might allow man-in-the-middle attackers to execute arbitrary code via a crafted application. | [] | null | null | 7.8 | null |
|
CVE-2025-27478 | Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability | Heap-based buffer overflow in Windows Local Security Authority (LSA) allows an authorized attacker to elevate privileges locally. | [] | null | 7 | null | null |
GHSA-j44q-5mx6-236v | In the Linux kernel, the following vulnerability has been resolved:net: phy: phy_device: Prevent nullptr exceptions on ISRIf phydev->irq is set unconditionally, check
for valid interrupt handler or fall back to polling mode to prevent
nullptr exceptions in interrupt service routine. | [] | null | 5.5 | null | null |
|
CVE-2017-17151 | Huawei AR100, AR100-S, AR110-S, AR120, AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR510, DP300, NetEngine16EX, RP200, SRG1300, SRG2300, SRG3300, TE30, TE40, TE50, TE60, TP3106, TP3206, ViewPoint 8660, and ViewPoint 9030 have an insufficient validation vulnerability. Since packet validation is insufficient, an unauthenticated attacker may send special H323 packets to exploit the vulnerability. Successful exploit could allow the attacker to send malicious packets and result in DOS attacks. | [
"cpe:2.3:o:huawei:ar100_firmware:v200r008c20spc700:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar100_firmware:v200r008c20spc700pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar100_firmware:v200r008c20spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar100_firmware:v200r008c20spc800pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar100_firmware:v200r008c30:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar100-s_firmware:v200r007c00spca00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar100-s_firmware:v200r007c00spcb00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar100-s_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar100-s_firmware:v200r008c20spc700:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar100-s_firmware:v200r008c20spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar100-s_firmware:v200r008c20spc800pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar100-s_firmware:v200r008c30:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar100-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar110-s_firmware:v200r007c00spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar110-s_firmware:v200r007c00spc900:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar110-s_firmware:v200r007c00spcb00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar110-s_firmware:v200r008c20spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar110-s_firmware:v200r008c30:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar110-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120_firmware:v200r006c10spc300:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120_firmware:v200r006c10spc300pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120_firmware:v200r007c00pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120_firmware:v200r007c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120_firmware:v200r007c00spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120_firmware:v200r007c00spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120_firmware:v200r007c00spc600pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120_firmware:v200r007c00spc900:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120_firmware:v200r007c00spc900pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120_firmware:v200r007c00spcb00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120_firmware:v200r007c00spcb00pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120_firmware:v200r007c01:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120_firmware:v200r008c20spc700:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120_firmware:v200r008c20spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120_firmware:v200r008c30:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar120:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00spc900:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00spca00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00spcb00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20spc700:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r006c10pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r006c10spc030:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r006c10spc300:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r006c10spc300pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r006c10spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r007c00pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r007c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r007c00spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r007c00spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r007c00spc600pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r007c00spc900:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r007c00spc900pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r007c00spca00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r007c00spcb00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r007c00spcb00pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r008c20spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r008c20spc700:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r008c20spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00spc900:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00spcb00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20spc700:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20spc800pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r006c10pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r006c10spc300:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r006c10spc300pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r007c00pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r007c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r007c00spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r007c00spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r007c00spc600pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r007c00spc900:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r007c00spc900pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r007c00spcb00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r007c00spcb00pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r007c02pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r008c20spc700:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r008c20spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00spc900:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00spcb00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20spc700:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r006c10pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r006c10spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r006c10spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r006c10spc300:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r006c10spc300pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r006c10spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r007c00pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r007c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r007c00spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r007c00spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r007c00spc600pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r007c00spc900:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r007c00spc900pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r007c00spcb00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r007c00spcb00pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r008c20spc500t:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r008c20spc501t:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r008c20spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r008c20spc700:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r008c20spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r008c30spc100:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r006c10pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r006c10spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r006c10spc300:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r006c10spc300pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r007c00pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r007c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r007c00spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r007c00spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r007c00spc600pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r007c00spc900:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r007c00spc900pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r007c00spcb00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r007c00spcb00pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r008c20spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r008c20spc700:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r008c20spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r008c20spc900:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r008c20spc900pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00spc900:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00spcb00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20spc700:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r006c10pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r006c10spc300:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r006c10spc300pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r006c10spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r007c00pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r007c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r007c00spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r007c00spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r007c00spc600pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r007c00spc900:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r007c00spc900pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r007c00spca00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r007c00spcb00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r007c00spcb00pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r008c20spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r008c20spc700:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r008c20spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00spc900:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00spcb00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20spc700:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20spc800pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r006c10pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r006c10spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r006c10spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r006c10spc300:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r006c10spc300pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r006c10spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r007c00pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r007c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r007c00spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r007c00spc500:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r007c00spc510t:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r007c00spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r007c00spc600pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r007c00spc900:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r007c00spc900pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r007c00spca00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r007c00spcb00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r007c00spcb00pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r007c00spcc00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r008c20b560:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r008c20b570:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r008c20b580:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r008c20spc700:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r008c20spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r008c30b010:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r008c30b020:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r008c30b030:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r008c30b050:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r008c30b060:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r008c30b070:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r008c30b080:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r008c30spc067t:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar510_firmware:v200r006c10pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar510_firmware:v200r006c10spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc900:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar510_firmware:v200r007c00spcb00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:dp300_firmware:v500r002c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:dp300_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:dp300_firmware:v500r002c00spc300:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:dp300_firmware:v500r002c00spc400:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:dp300_firmware:v500r002c00spc500:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:dp300_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:dp300_firmware:v500r002c00spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:dp300_firmware:v500r002c00spc900:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10spc300:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00spc900:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00spcb00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20spc700:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:rp200_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg1300_firmware:v200r006c10spc300:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg1300_firmware:v200r007c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg1300_firmware:v200r007c00spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg1300_firmware:v200r007c00spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg1300_firmware:v200r007c00spc900:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg1300_firmware:v200r007c00spcb00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg2300_firmware:v200r006c10spc300:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg2300_firmware:v200r007c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg2300_firmware:v200r007c00spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg2300_firmware:v200r007c00spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg2300_firmware:v200r007c00spc900:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg2300_firmware:v200r007c00spcb00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg3300_firmware:v200r006c10spc300:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg3300_firmware:v200r007c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg3300_firmware:v200r007c00spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg3300_firmware:v200r007c00spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg3300_firmware:v200r007c00spc900:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg3300_firmware:v200r007c00spcb00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te30_firmware:v100r001c02spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te30_firmware:v100r001c02spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te30_firmware:v100r001c10spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te30_firmware:v100r001c10spc300:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te30_firmware:v100r001c10spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te30_firmware:v100r001c10spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te30_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te30_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te30_firmware:v500r002c00spc700:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te30_firmware:v500r002c00spc900:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te30_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te40_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te40_firmware:v500r002c00spc700:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te40_firmware:v500r002c00spc900:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te40_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te50_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te50_firmware:v500r002c00spc700:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te50_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te60_firmware:v100r001c01spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te60_firmware:v100r001c10b010:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te60_firmware:v100r001c10spc300:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te60_firmware:v100r001c10spc400:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te60_firmware:v100r001c10spc502t:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te60_firmware:v100r001c10spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te60_firmware:v100r001c10spc700:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te60_firmware:v100r001c10spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te60_firmware:v100r001c10spc900:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te60_firmware:v500r002c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te60_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te60_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te60_firmware:v500r002c00spc700:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te60_firmware:v500r002c00spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te60_firmware:v500r002c00spc900:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te60_firmware:v500r002c00spca00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te60_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tp3106_firmware:v100r001c06b020:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tp3106_firmware:v100r002c00b026:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tp3106_firmware:v100r002c00b027:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tp3106_firmware:v100r002c00b028:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tp3106_firmware:v100r002c00b029:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tp3106_firmware:v100r002c00spc100b022:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tp3106_firmware:v100r002c00spc100b022sp01:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tp3106_firmware:v100r002c00spc100b023:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tp3106_firmware:v100r002c00spc100b024:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tp3106_firmware:v100r002c00spc100b025:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tp3106_firmware:v100r002c00spc101t:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tp3106_firmware:v100r002c00spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tp3106_firmware:v100r002c00spc400:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tp3106_firmware:v100r002c00spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tp3106_firmware:v100r002c00t:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tp3206_firmware:v100r002c00spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tp3206_firmware:v100r002c00spc400:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tp3206_firmware:v100r002c00spc600:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp02:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp03:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp04:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc100b010:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc100b011:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc200t:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc300:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc400:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc500:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc600t:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc700:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc900:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spca00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcb00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcc00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02spc100b010:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp15:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp16:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b015sp03:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100b012:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc100b010:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc100b011:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc100b012:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc300:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc400:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc500:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 |
|
GHSA-4prh-h48w-ph58 | The Premium Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's menu and shape widgets in all versions up to, and including, 4.10.30 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
CVE-2019-2547 | Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1 and 18c. Easily exploitable vulnerability allows low privileged attacker having Create Session, Create Procedure privilege with network access via multiple protocols to compromise Java VM. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java VM. CVSS 3.0 Base Score 3.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L). | [
"cpe:2.3:a:oracle:database_server:11.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:12.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:12.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:18c:*:*:*:*:*:*:*"
] | null | null | 3.5 | 3.5 |
|
GHSA-3648-p859-9652 | Double free vulnerability in the tvb_uncompress function in epan/tvbuff.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (application crash) via a packet with malformed data that uses zlib compression. | [] | null | null | null | null |
|
GHSA-ghhh-97cc-m8qx | Code injection in openSUSE when running some source services used in the open build service 2.1 before March 11 2011. | [] | null | null | 9.8 | null |
|
GHSA-xr88-75g2-cjj4 | rpc-gssd in nfs-utils before 1.2.8 performs reverse DNS resolution for server names during GSSAPI authentication, which might allow remote attackers to read otherwise-restricted files via DNS spoofing attacks. | [] | null | null | null | null |
|
GHSA-qp82-v3h4-hw29 | In the Linux kernel, the following vulnerability has been resolved:NFSD: Fix potential use-after-free in nfsd_file_put()nfsd_file_put_noref() can free @nf, so don't dereference @nf
immediately upon return from nfsd_file_put_noref(). | [] | null | 7.8 | null | null |
|
GHSA-3p36-28gq-hv7j | In inviteInternal of p2p_iface.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-274443441 | [] | null | 4.4 | null | null |
|
CVE-2023-21176 | In list_key_entries of utils.rs, there is a possible way to disable user credentials due to resource exhaustion. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-222287335 | [
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] | null | 4.4 | null | null |
|
GHSA-x2v3-2w43-qrx6 | A vulnerability has been identified in SICAM TOOLBOX II (All versions). Affected applications use a circumventable access control within a database service. This could allow an attacker to access the database. | [] | null | null | null | null |
|
CVE-2023-35719 | ManageEngine ADSelfService Plus GINA Client Insufficient Verification of Data Authenticity Authentication Bypass Vulnerability | ManageEngine ADSelfService Plus GINA Client Insufficient Verification of Data Authenticity Authentication Bypass Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of ManageEngine ADSelfService Plus. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the Password Reset Portal used by the GINA client. The issue results from the lack of proper authentication of data received via HTTP. An attacker can leverage this vulnerability to bypass authentication and execute code in the context of SYSTEM. Was ZDI-CAN-17009. | [
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6122:*:*:*:*:*:*"
] | null | null | 6.8 | null |
CVE-2016-5042 | The dwarf_get_aranges_list function in libdwarf before 20160923 allows remote attackers to cause a denial of service (infinite loop and crash) via a crafted DWARF section. | [
"cpe:2.3:a:libdwarf_project:libdwarf:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
RHSA-2025:1742 | Red Hat Security Advisory: postgresql security update | postgresql: PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 8.1 | null | null |
CVE-2024-10928 | MonoCMS Posts Page opensaved.php cross site scripting | A vulnerability was found in MonoCMS up to 20240528. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /monofiles/opensaved.php of the component Posts Page. The manipulation of the argument filtcategory/filtstatus leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:monocms:monocms:*:*:*:*:*:*:*:*"
] | 5.3 | 3.5 | 3.5 | 4 |
CVE-2010-0171 | Mozilla Firefox 3.0.x before 3.0.18, 3.5.x before 3.5.8, and 3.6.x before 3.6.2; Thunderbird before 3.0.2; and SeaMonkey before 2.0.3 allow remote attackers to perform cross-origin keystroke capture, and possibly conduct cross-site scripting (XSS) attacks, by using the addEventListener and setTimeout functions in conjunction with a wrapped object. NOTE: this vulnerability exists because of an incomplete fix for CVE-2007-3736. | [
"cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.5:1.1.10:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-xj4w-r6gr-x5qm | Project Inheritance Plugin showed secret environment variables defined in Mask Passwords Plugin | Jenkins Project Inheritance Plugin 19.08.02 and earlier displayed a list of environment variables passed to a build without masking sensitive variables contributed by the Mask Passwords Plugin. | [] | null | 6.5 | null | null |
CVE-2017-15613 | TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-interface variable in the cmxddns.lua file. | [
"cpe:2.3:o:tp-link:er5110g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:er5110g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:er5120g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:er5120g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:er5510g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:er5510g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:er5520g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:er5520g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r4149g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r4149g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r4239g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r4239g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r4299g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r4299g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r473gp-ac_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r473gp-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r473g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r473g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r473p-ac_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r473p-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r473_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r473:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r478g\\+_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r478g\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r478_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r478:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r478\\+_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r478\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r483g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r483g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r483_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r483:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r488_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r488:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war1300l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war1300l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war1750l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war1750l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war2600l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war2600l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war302_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war302:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war450l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war450l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war458l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war458l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war458_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war458:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war900l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war900l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr1300g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr1300g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr1300l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr1300l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr1750l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr1750l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr2600l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr2600l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr302_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr302:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr4300l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr4300l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr450l_firmware:1.0161125:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr450l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr458l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr458l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr900g_firmware:3.0_170306:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr900g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr900l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr900l:-:*:*:*:*:*:*:*"
] | null | null | 7.2 | 9 |
|
GHSA-872c-2hjf-mhv5 | The DHCP client implementation in Universal Small Cell firmware on Cisco Small Cell products allows remote attackers to execute arbitrary commands via crafted DHCP messages, aka Bug ID CSCup47513. | [] | null | null | null | null |
|
CVE-2024-2500 | The ColorMag theme for WordPress is vulnerable to Stored Cross-Site Scripting via a user's Display Name in all versions up to, and including, 3.1.6 due to insufficient input sanitization and output escaping. This makes it possible for authentciated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
GHSA-wcxq-f256-53xp | In Apache APISIX Dashboard before 2.10.1, the Manager API uses two frameworks and introduces framework `droplet` on the basis of framework `gin`, all APIs and authentication middleware are developed based on framework `droplet`, but some API directly use the interface of framework `gin` thus bypassing the authentication. | [] | null | null | null | null |
|
CVE-2004-2536 | The exit_thread function (process.c) in Linux kernel 2.6 through 2.6.5 does not invalidate the per-TSS io_bitmap pointers if a process obtains IO access permissions from the ioperm function but does not drop those permissions when it exits, which allows other processes to access the per-TSS pointers, access restricted memory locations, and possibly gain privileges. | [
"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2001-0988 | Arkeia backup server 4.2.8-2 and earlier creates its database files with world-writable permissions, which could allow local users to overwrite the files or obtain sensitive information. | [
"cpe:2.3:a:knox_software:arkeia:*:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
RHSA-2018:0654 | Red Hat Security Advisory: kernel-alt security, bug fix, and enhancement update | hw: cpu: speculative execution bounds-check bypass kernel: Buffer overflow in mp_override_legacy_irq() kernel: memory leak when merging buffers in SCSI IO vectors kernel: NULL pointer dereference due to KEYCTL_READ on negative key kernel: net: double-free and memory corruption in get_net_ns_by_id() kernel: Incorrect updates of uninstantiated keys crash the kernel Kernel: KVM: oops when checking KVM_CAP_PPC_HTM on PPC platform Kernel: ipsec: xfrm: use-after-free leading to potential privilege escalation kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity kernel: Arbitrary stack overwrite causing oops via crafted signal frame kernel: Stack information leak in the EFS element kernel: Integer overflow in futex.c:futux_requeue can lead to denial of service or unspecified impact kernel: Race condition in sound system can lead to denial of service | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 4.7 | null |
GHSA-c998-93wx-vqcj | IBM AppScan Enterprise Edition could allow a remote attacker to execute arbitrary code on the system, caused by improper handling of objects in memory. By persuading a victim to open specially-crafted content, an attacker could exploit this vulnerability to execute arbitrary code on the system in the same context as the victim. | [] | null | null | 7.3 | null |
|
GHSA-x248-p532-m7g5 | GitLab 12.5 through 12.8.1 allows HTML Injection. A particular error header was potentially susceptible to injection or potentially other vulnerabilities via unescaped input. | [] | null | null | null | null |
|
CVE-2014-4644 | SQL injection vulnerability in superlinks.php in the superlinks plugin 1.4-2 for Cacti allows remote attackers to execute arbitrary SQL commands via the id parameter. | [
"cpe:2.3:a:cacti:superlinks:1.4-2:*:*:*:*:cacti:*:*"
] | null | null | null | 7.5 |
|
GHSA-6xm5-pr6p-6gxg | Vulnerability in the Oracle FLEXCUBE Private Banking component of Oracle Financial Services Applications (subcomponent: Operations). Supported versions that are affected are 2.0.0, 2.0.1, 2.2.0 and 12.0.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Private Banking. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle FLEXCUBE Private Banking accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). | [] | null | null | 4.3 | null |
|
CVE-2014-0349 | Multiple unspecified vulnerabilities in J2k-Codec allow remote attackers to execute arbitrary code via a crafted JPEG 2000 file. | [
"cpe:2.3:a:j2k-codec:j2k-codec:-:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
RHSA-2022:8932 | Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.26.0 | golang: crash in a golang.org/x/crypto/ssh server | [
"cpe:/a:redhat:serverless:1.0::el8"
] | null | 7.5 | null | null |
CVE-2007-0863 | PHP remote file inclusion vulnerability in Trevorchan 0.7 and earlier allows remote attackers to execute arbitrary code via the tc_config[rootdir] parameter to (1) upgrade.php, (2) paint_save.php, (3) menu.php, (4) manage.php, and (5) banned.php. NOTE: his issue has been disputed by reliable third parties, who state that the variable is set before use in config.php | [
"cpe:2.3:a:trevorchan:trevorchan:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2024-13606 | JS Help Desk – The Ultimate Help Desk & Support Plugin <= 2.8.8 - Unauthenticated Sensitive Information Exposure Through Unprotected Directory | The JS Help Desk – The Ultimate Help Desk & Support Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.8.8 via the 'jssupportticketdata' directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads/jssupportticketdata directory which can contain file attachments included in support tickets. | [] | null | 7.5 | null | null |
CVE-2023-46249 | authentik potential installation takeover when default admin user is deleted | authentik is an open-source Identity Provider. Prior to versions 2023.8.4 and 2023.10.2, when the default admin user has been deleted, it is potentially possible for an attacker to set the password of the default admin user without any authentication. authentik uses a blueprint to create the default admin user, which can also optionally set the default admin users' password from an environment variable. When the user is deleted, the `initial-setup` flow used to configure authentik after the first installation becomes available again. authentik 2023.8.4 and 2023.10.2 fix this issue. As a workaround, ensure the default admin user (Username `akadmin`) exists and has a password set. It is recommended to use a very strong password for this user, and store it in a secure location like a password manager. It is also possible to deactivate the user to prevent any logins as akadmin. | [
"cpe:2.3:a:goauthentik:authentik:*:*:*:*:*:*:*:*"
] | null | 9.7 | null | null |
GHSA-g639-7h38-4849 | The QSharedMemory class in Qt 5.0.0, 4.8.x before 4.8.5, 4.7.x before 4.7.6, and other versions including 4.4.0 uses weak permissions (world-readable and world-writable) for shared memory segments, which allows local users to read sensitive information or modify critical program data, as demonstrated by reading a pixmap being sent to an X server. | [] | null | null | null | null |
|
CVE-2023-24159 | TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the admpass parameter in the setPasswordCfg function. | [
"cpe:2.3:o:totolink:ca300-poe_firmware:6.2c.884:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:ca300-poe:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2000-0739 | Directory traversal vulnerability in strong.exe program in NAI Net Tools PKI server 1.0 before HotFix 3 allows remote attackers to read arbitrary files via a .. (dot dot) attack in an HTTPS request to the enrollment server. | [
"cpe:2.3:a:network_associates:net_tools_pki_server:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:network_associates:net_tools_pki_server:1.0hotfix1:*:*:*:*:*:*:*",
"cpe:2.3:a:network_associates:net_tools_pki_server:1.0hotfix2:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2006-3283 | SQL injection vulnerability in Dating Agent PRO 4.7.1 allows remote attackers to execute arbitrary SQL commands via the (1) pid parameter in picture.php, (2) mid parameter in mem.php, and the (3) sex and (4) relationship parameters in search.php. | [
"cpe:2.3:a:datetopia:dating_agent_pro:4.7.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-pjq5-5rc2-6pp7 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound Hero Mega Menu - Responsive WordPress Menu Plugin allows SQL Injection. This issue affects Hero Mega Menu - Responsive WordPress Menu Plugin: from n/a through 1.16.5. | [] | null | 8.5 | null | null |
|
GHSA-fwwv-5jh4-hx7p | Java 1.4.2 before 1.4.2 Release 2 on Apple Mac OS X does not prevent multiple programs from opening the same port as a Java ServerSocket, which allows local users to operate a Java program that intercepts network data intended for the ServerSocket of a different Java program. | [] | null | null | null | null |
|
CVE-2018-11309 | Blind SQL injection in coupon_code in the MemberMouse plugin 2.2.8 and prior for WordPress allows an unauthenticated attacker to dump the WordPress MySQL database via an applyCoupon action in an admin-ajax.php request. | [
"cpe:2.3:a:membermouse:membermouse:*:*:*:*:*:wordpress:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2017-1000066 | The entry details view function in KeePass version 1.32 inadvertently decrypts certain database entries into memory, which may result in the disclosure of sensitive information. | [
"cpe:2.3:a:keepass:keepass:1.32:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
RHSA-2024:9547 | Red Hat Security Advisory: krb5 security update | freeradius: forgery attack | [
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/o:redhat:rhel_eus:9.4::baseos"
] | null | 9 | null | null |
GHSA-xxw8-ppw6-gv4w | The debug interface of Goldshell ASIC Miners v2.2.1 and below was discovered to be exposed publicly on the web interface, allowing attackers to access passwords and other sensitive information in plaintext. | [] | null | 7.5 | null | null |
|
CVE-2019-11776 | In Eclipse BIRT versions 1.0 to 4.7, the Report Viewer allows Reflected XSS in URL parameter. Attacker can execute the payload in victim's browser context. | [
"cpe:2.3:a:eclipse:business_intelligence_and_reporting_tools:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-q82r-7f6x-3rcx | The AddResolution.jspa resource in Jira before version 7.13.6, from version 8.0.0 before version 8.2.3, and from version 8.3.0 before version 8.3.2 allows remote attackers to create new resolutions via a Cross-site request forgery (CSRF) vulnerability. | [] | null | null | 4.3 | null |
|
GHSA-9h6c-p2fm-j5qx | Shadankun Server Security Type (excluding normal blocking method types) Ver.1.5.3 and earlier allows remote attackers to cause a denial of service which may result in not being able to add newly detected attack source IP addresses as blocking targets for about 10 minutes via a specially crafted request. | [] | null | 7.5 | null | null |
|
GHSA-9f9g-qwcw-j94j | When Akka HTTP before 10.5.2 accepts file uploads via the FileUploadDirectives.fileUploadAll directive, the temporary file it creates has too weak permissions: it is readable by other users on Linux or UNIX, a similar issue to CVE-2022-41946. | [] | null | 4.7 | null | null |
|
CVE-2021-21213 | Use after free in WebMIDI in Google Chrome prior to 90.0.4430.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-4vww-mc66-62m6 | HTTP Request Smuggling in Apache Tomcat | Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did not correctly parse the HTTP transfer-encoding request header in some circumstances leading to the possibility to request smuggling when used with a reverse proxy. Specifically: - Tomcat incorrectly ignored the transfer encoding header if the client declared it would only accept an HTTP/1.0 response; - Tomcat honoured the identify encoding; and - Tomcat did not ensure that, if present, the chunked encoding was the final encoding. | [] | null | 5.3 | null | null |
GHSA-mjfr-374m-86mh | A heap-use-after-free in the av_freep function in libavutil/mem.c of FFmpeg 4.2 allows attackers to execute arbitrary code. | [] | null | null | null | null |
|
CVE-2025-24547 | WordPress Caching Compatible Cookie Opt-In plugin <= 0.0.10 - Stored Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Matthias Wagner - FALKEmedia Caching Compatible Cookie Opt-In and JavaScript allows Stored XSS. This issue affects Caching Compatible Cookie Opt-In and JavaScript: from n/a through 0.0.10. | [] | null | 6.5 | null | null |
GHSA-7hmx-xxrr-h2wg | ACC Tigris allows public access without a login. | [] | null | null | null | null |
|
RHSA-2016:1140 | Red Hat Security Advisory: squid34 security update | squid: buffer overflow in cachemgr.cgi squid: multiple issues in ESI processing squid: multiple issues in ESI processing squid: multiple issues in ESI processing squid: Cache poisoning issue in HTTP Request handling squid: Header Smuggling issue in HTTP Request processing squid: SegFault from ESIInclude::Start squid: SIGSEGV in ESIContext response handling | [
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
CVE-2018-11595 | Espruino before 1.99 allows attackers to cause a denial of service (application crash) and a potential Escalation of Privileges with a user crafted input file via a Buffer Overflow during syntax parsing, because strncat is misused. | [
"cpe:2.3:o:espruino:espruino:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 |
|
CVE-2023-24919 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | [
"cpe:2.3:a:microsoft:dynamics_365:*:*:*:*:on-premises:*:*:*"
] | null | 5.4 | null | null |
CVE-2016-8692 | The jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.4 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted YRsiz value in a BMP image to the imginfo command. | [
"cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
CVE-2024-7339 | TVT DVR TD-2104TS-CL queryDevInfo information disclosure | A vulnerability has been found in TVT DVR TD-2104TS-CL, DVR TD-2108TS-HP, Provision-ISR DVR SH-4050A5-5L(MM) and AVISION DVR AV108T and classified as problematic. This vulnerability affects unknown code of the file /queryDevInfo. The manipulation leads to information disclosure. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-273262 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:tvt:dvr_td_2014ts_cl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tvt:dvr_td_2018ts_hp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tvt:provision_isr_dvr_sh_4050a5_5l\\/mm\\/:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tvt:avision_dvr_av108t:*:*:*:*:*:*:*:*",
"cpe:2.3:o:provision-isr:sh-4050a5-5l\\(mm\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:provision-isr:sh-4050a5-5l\\(mm\\)_firmware:1.3.3.20657b180918.d06.u2\\(4a41t\\):*:*:*:*:*:*:*",
"cpe:2.3:o:provision-isr:sh-4050a5-5l\\(mm\\)_firmware:1.3.4.22966b181219.d00.u1\\(4a21s\\):*:*:*:*:*:*:*",
"cpe:2.3:o:provision-isr:sh-4050a5-5l\\(mm\\)_firmware:1.3.4.22966b181219.d14.u1\\(8a41t\\):*:*:*:*:*:*:*",
"cpe:2.3:o:provision-isr:sh-4050a5-5l\\(mm\\)_firmware:1.3.4.22966b181219.d44.u1\\(16a82t\\):*:*:*:*:*:*:*",
"cpe:2.3:o:provision-isr:sh-4050a5-5l\\(mm\\)_firmware:1.3.4.24513b190218.d00.u1\\(8a21s\\):*:*:*:*:*:*:*",
"cpe:2.3:o:provision-isr:sh-4050a5-5l\\(mm\\)_firmware:1.3.4.24879b190222.d00.u2\\(8a21s\\):*:*:*:*:*:*:*",
"cpe:2.3:h:provision-isr:sh-4050a5-5l\\(mm\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:tvt:avision_av108t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tvt:avision_av108t_firmware:1.3.3.20657b180918.d06.u2\\(4a41t\\):*:*:*:*:*:*:*",
"cpe:2.3:o:tvt:avision_av108t_firmware:1.3.4.22966b181219.d00.u1\\(4a21s\\):*:*:*:*:*:*:*",
"cpe:2.3:o:tvt:avision_av108t_firmware:1.3.4.22966b181219.d14.u1\\(8a41t\\):*:*:*:*:*:*:*",
"cpe:2.3:o:tvt:avision_av108t_firmware:1.3.4.22966b181219.d44.u1\\(16a82t\\):*:*:*:*:*:*:*",
"cpe:2.3:o:tvt:avision_av108t_firmware:1.3.4.24513b190218.d00.u1\\(8a21s\\):*:*:*:*:*:*:*",
"cpe:2.3:o:tvt:avision_av108t_firmware:1.3.4.24879b190222.d00.u2\\(8a21s\\):*:*:*:*:*:*:*",
"cpe:2.3:h:tvt:avision_av108t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tvt:td-2104ts-cl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tvt:td-2104ts-cl_firmware:1.3.3.20657b180918.d06.u2\\(4a41t\\):*:*:*:*:*:*:*",
"cpe:2.3:o:tvt:td-2104ts-cl_firmware:1.3.4.22966b181219.d00.u1\\(4a21s\\):*:*:*:*:*:*:*",
"cpe:2.3:o:tvt:td-2104ts-cl_firmware:1.3.4.22966b181219.d14.u1\\(8a41t\\):*:*:*:*:*:*:*",
"cpe:2.3:o:tvt:td-2104ts-cl_firmware:1.3.4.22966b181219.d44.u1\\(16a82t\\):*:*:*:*:*:*:*",
"cpe:2.3:o:tvt:td-2104ts-cl_firmware:1.3.4.24513b190218.d00.u1\\(8a21s\\):*:*:*:*:*:*:*",
"cpe:2.3:o:tvt:td-2104ts-cl_firmware:1.3.4.24879b190222.d00.u2\\(8a21s\\):*:*:*:*:*:*:*",
"cpe:2.3:h:tvt:td-2104ts-cl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tvt:td-2108ts-hp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tvt:td-2108ts-hp_firmware:1.3.3.20657b180918.d06.u2\\(4a41t\\):*:*:*:*:*:*:*",
"cpe:2.3:o:tvt:td-2108ts-hp_firmware:1.3.4.22966b181219.d00.u1\\(4a21s\\):*:*:*:*:*:*:*",
"cpe:2.3:o:tvt:td-2108ts-hp_firmware:1.3.4.22966b181219.d14.u1\\(8a41t\\):*:*:*:*:*:*:*",
"cpe:2.3:o:tvt:td-2108ts-hp_firmware:1.3.4.22966b181219.d44.u1\\(16a82t\\):*:*:*:*:*:*:*",
"cpe:2.3:o:tvt:td-2108ts-hp_firmware:1.3.4.24513b190218.d00.u1\\(8a21s\\):*:*:*:*:*:*:*",
"cpe:2.3:o:tvt:td-2108ts-hp_firmware:1.3.4.24879b190222.d00.u2\\(8a21s\\):*:*:*:*:*:*:*",
"cpe:2.3:h:tvt:td-2108ts-hp:-:*:*:*:*:*:*:*"
] | 6.9 | 5.3 | 5.3 | 5 |
GHSA-w2q4-3cx2-j37v | An elevation of privilege vulnerability in the NVIDIA GPU driver in Android before 2016-11-05 could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Android ID: A-30904789. References: NVIDIA N-CVE-2016-6730. | [] | null | null | 7.3 | null |
|
GHSA-7wmg-4ph5-5435 | ChurchInfo allows remote attackers to execute obtain sensitive information via the PersonID parameter to (1) PersonView.php, (2) MemberRoleChange.php, (3) PropertyAssign.php, (4) WhyCameEditor.php, (5) GroupPropsEditor.php, (6) Reports/PDFLabel.php, or (7) UserDelete.php, an invalid Number parameter to (8) SelectList.php or (9) SelectDelete.php, GroupID parameter to (10) GroupView.php, (11) GroupMemberList.php, (12) MemberRoleChange.php, (13) GroupDelete.php, (14) /Reports/ClassAttendance.php, or (15) /Reports/GroupReport.php, (16) PropertyID parameter to PropertyEditor.php, FamilyID parameter to (17) Canvas05Editor.php, (18) CanvasEditor.php, or (19) FamilyView.php, or (20) PledgeID parameter to PledgeDetails.php, which reveal the path in an error message. | [] | null | null | null | null |
|
GHSA-8c7h-4cwj-75cp | A vulnerability classified as critical was found in SourceCodester Music Gallery Site 1.0. This vulnerability affects unknown code of the file /classes/Master.php?f=delete_category. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | [] | 5.3 | 6.3 | null | null |
|
CVE-2016-9067 | Two use-after-free errors during DOM operations resulting in potentially exploitable crashes. This vulnerability affects Firefox < 50. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 5 |
|
GHSA-gxwp-4448-26fp | The Countdown Timer for Elementor WordPress plugin before 1.3.7 does not sanitise and escape some parameters when outputting them on the page, which could allow users with a role as low as contributor to perform Cross-Site Scripting attacks. | [] | null | 5.9 | null | null |
|
CVE-2020-11848 | Denial of service vulnerability on Micro Focus ArcSight Management Center. Affecting all versions prior to version 2.9.5. The vulnerability could cause the server to become unavailable, causing a denial of service. | [
"cpe:2.3:a:microfocus:arcsight_management_center:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.