id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
CVE-2020-6548
Heap buffer overflow in Skia in Google Chrome prior to 84.0.4147.125 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*" ]
null
8.8
null
9.3
null
CVE-2008-6540
DotNetNuke before 4.8.2, during installation or upgrade, does not warn the administrator when the default (1) ValidationKey and (2) DecryptionKey values cannot be modified in the web.config file, which allows remote attackers to bypass intended access restrictions by using the default keys.
[ "cpe:2.3:a:dotnetnuke:dotnetnuke:*:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:1.0.10d:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:1.0.10e:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:3.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:3.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.5.2:*:*:*:*:*:*:*" ]
null
null
null
5.1
null
GHSA-ghrx-gvrm-v752
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in carrotbits Greek Namedays Widget From Eortologio.Net allows Stored XSS.This issue affects Greek Namedays Widget From Eortologio.Net: from n/a through 20191113.
[]
null
6.5
null
null
null
RHSA-2016:0599
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.7 update
tomcat: non-persistent DoS attack by feeding data by aborting an upload EAP: HTTPS NIO connector uses no timeout when reading SSL handshake from client
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6.4" ]
null
null
null
null
null
GHSA-m276-v8xm-46jm
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
[]
null
9.8
null
null
null
CVE-2024-4566
ShopLentor <= 2.8.8 - Missing Authorization to WordPress Option Modification
The ShopLentor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_dismiss function in all versions up to, and including, 2.8.8. This makes it possible for authenticated attackers, with contributor-level access and above, to set arbitrary WordPress options to "true". NOTE: This vulnerability can be exploited by attackers with subscriber- or customer-level access and above if (1) the WooCommerce plugin is deactivated or (2) access to the default WordPress admin dashboard is explicitly enabled for authenticated users.
[]
null
7.1
null
null
null
CVE-2015-1346
Multiple unspecified vulnerabilities in Google V8 before 3.30.33.15, as used in Google Chrome before 40.0.2214.91, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:chromium:chromium:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-262h-5vgm-7f9h
PostgreSQL 7.2.1 and 7.2.2 allows local users to delete transaction log (pg_clog) data and cause a denial of service (data loss) via the VACUUM command.
[]
null
null
null
null
null
GHSA-hrw8-p8vq-hx3r
Reflected cross-site scripting vulnerability exists in multiple versions of PowerCMS. If a product administrator accesses a crafted URL, an arbitrary script may be executed on the browser.
[]
5.3
6.1
null
null
null
CVE-2021-25524
Insecure storage of device information in Contacts prior to version 12.7.05.24 allows attacker to get Samsung Account ID.
[ "cpe:2.3:a:samsung:contacts:*:*:*:*:*:*:*:*" ]
null
4
null
null
null
CVE-2023-28054
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
[ "cpe:2.3:o:dell:alienware_area_51m_r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_area_51m_r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_area_51m_r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_area_51m_r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r11_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r11:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r12_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r12:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r13_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r13:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r15_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r15:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m15_r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m15_r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m15_r3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m15_r3:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m15_r4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m15_r4:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m15_r6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m15_r6:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m15_r7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m15_r7:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m16_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m16:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m17_r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m17_r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m17_r3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m17_r3:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m17_r4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m17_r4:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x14_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x14:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x15_r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x15_r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x15_r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x15_r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x17_r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x17_r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x17_r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x17_r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3900:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3901_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3901:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3910_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3910:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3911_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3911:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3980_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3980:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3988_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3988:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3990_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3990:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3991_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3991:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g15_5510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g15_5510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g15_5511_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g15_5511:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g15_5520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g15_5520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g15_5530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g15_5530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g16_7620_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g16_7620:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g3_15_3590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g3_15_3590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g3_3500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g3_3500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g3_3579_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g3_3579:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g3_3779_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g3_3779:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g5_15_5500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g5_15_5500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g5_15_5590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g5_15_5590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g5_5000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g5_5000:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g5_5090_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g5_5090:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g7_15_7500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g7_15_7500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g7_15_7590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g7_15_7590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g7_17_7700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g7_17_7700:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g7_17_7790_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g7_17_7790:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5820_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5820_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7820_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7820_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7920_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7920_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:embedded_box_pc_5000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:embedded_box_pc_5000:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_13_5330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_13_5330:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_14_5410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_14_5410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_14_5418_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_14_5418:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_14_5430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_14_5430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_14_7430_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_14_7430_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_14_plus_7420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_14_plus_7420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_15_3511_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_15_3511:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_15_5510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_15_5510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_15_5518_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_15_5518:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_16_5630_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_16_5630:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_16_7620_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_16_7620_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_16_7630_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_16_7630_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_16_plus_7620_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_16_plus_7620:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_24_5410_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_24_5410_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_24_5420_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_24_5420_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_24_5421_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_24_5421_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_27_7720_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_27_7720_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3020_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3020:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3020s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3020s:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3280_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3280:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3470:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3471_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3471:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3481_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3481:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3482_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3482:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3493_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3493:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3501:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3502_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3502:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3511_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3511:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3521_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3521:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3581_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3581:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3582_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3582:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3583_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3583:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3584_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3584:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3593_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3593:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3670_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3670:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3671_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3671:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3780_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3780:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3781_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3781:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3782_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3782:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3790_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3790:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3793_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3793:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3880_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3880:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3881_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3881:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3891_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3891:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3910_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3910:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5301_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5301:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5320:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5391_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5391:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5400_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5400_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5401_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5401:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5401_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5401_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5402_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5402:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5406_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5406_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5408_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5408:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5409_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5409:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5481_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5481_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5490_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5490_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5491_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5491_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5493_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5493:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5494_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5494:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5498_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5498:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5501:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5502_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5502:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5508_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5508:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5509_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5509:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5570_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5570:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5591_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5591_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5593_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5593:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5594_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5594:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5598_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5598:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5620_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5620:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5770_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5770:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7000:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7300_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7300_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7306_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7306_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7391_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7391:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7500_2-in-1_black_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7500_2-in-1_black:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7500_2-in-1_silver_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7500_2-in-1_silver:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7501:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7506_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7506_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7591_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7591:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7610_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7610:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7700_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7700_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7706_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7706_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7710_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7710:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7790_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7790:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7791_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7791:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5491_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5491_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_12_rugged_extreme_7214_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_12_rugged_extreme_7214:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_13_3380_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_13_3380:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_14_rugged_5414_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_14_rugged_5414:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3120_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3120:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3140_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3140:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3180_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3180:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3189_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3189:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3190_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3190:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3190_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3190_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3301_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3301:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3310_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3310_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3320:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3330:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3390_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3390_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5280_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5280:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5285_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5285_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5288_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5288:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5289_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5289:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5290_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5290:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5290_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5290_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5300_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5300_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5310_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5310_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5320:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5330:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5401_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5401:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5411_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5411:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5420_rugged_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5420_rugged:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5424_rugged_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5424_rugged:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5488_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5488:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5491_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5491:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5501:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5511_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5511:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5521_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5521:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5531_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5531:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5591_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5591:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7200_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7200_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7210_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7210_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7212_rugged_extreme_tablet_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7212_rugged_extreme_tablet:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7230_rugged_extreme_tablet_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7230_rugged_extreme_tablet:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7280_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7280:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7285_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7285_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7290_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7290:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7320_detachable_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7320_detachable:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7330:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7380_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7380:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7389_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7389:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7390_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7390:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7390_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7390_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7400_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7400_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7414_rugged_extreme_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7414_rugged_extreme:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7424_rugged_extreme_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7424_rugged_extreme:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9330:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_rugged_5430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_rugged_5430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_rugged_7220_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_rugged_7220:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_rugged_7220ex_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_rugged_7220ex:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_rugged_7330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_rugged_7330:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5421_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5421:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3000:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3000_thin_client_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3000_thin_client:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3050_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3050:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3050_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3050_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3060_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3060:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3070_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3070:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3080_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3080:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3090_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3090:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3090_ultra_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3090_ultra:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3280_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3280_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5000:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5050_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5050:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5060_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5060:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5070_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5070:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5080_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5080:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5090_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5090:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5250:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5260_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5260_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5270_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5270_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5480_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5480_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5490_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5490_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7000:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7000_oem_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7000_oem:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7050_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7050:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7060_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7060:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7070_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7070:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7070_ultra_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7070_ultra:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7071_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7071:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7080_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7080:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7090_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7090:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7090_ultra_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7090_ultra:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7450_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7450:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7460_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7460_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7470_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7470_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7480_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7480_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7490_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7490_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7760_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7760_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7770_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7770_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7780_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7780_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7410_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7410_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_small_form_factor_plus_7010_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_small_form_factor_plus_7010:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_tower_plus_7010_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_tower_plus_7010:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_xe3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_xe3:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3240_compact_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3240_compact:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3420_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3420_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3430_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3430_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3431_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3431_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3440_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3440:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3450_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3450:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3460_small_form_factor_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3460_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3540_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3540:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3541_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3541:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3550:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3551_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3551:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3560_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3560:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3561_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3561:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3570_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3570:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3571_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3571:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3620_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3620_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3630_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3630_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3640_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3640_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3650_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3650_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3660_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3660:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3930_rack_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3930_rack:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5470:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5530_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5530_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5540_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5540:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5550:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5560_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5560:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5570_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5570:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5720_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5720_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5750:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5760_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5760:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5770_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5770:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7540_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7540:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7560_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7560:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7670_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7670:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7710_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7710:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7720_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7720:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7730_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7730:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7740_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7740:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7760_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7760:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7770_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7770:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7865_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7865_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_16_5630_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_16_5630:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3020_sff_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3020_sff:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3020_t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3020_t:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3070_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3070:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3267_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3267:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3268_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3268:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3401_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3401:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3470:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3471_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3471:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3481_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3481:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3501:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3581_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3581:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3582_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3582:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3583_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3583:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3584_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3584:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3667_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3667:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3668_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3668:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3669_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3669:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3670_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3670:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3671_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3671:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3681_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3681:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3690_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3690:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3710_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3710:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3881_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3881:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3888_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3888:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3890_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3890:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3910_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3910:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5090_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5090:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5301_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5301:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5320:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5391_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5391:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5401_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5401:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5402_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5402:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5491_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5491:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5501:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5502_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5502:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5591_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5591:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5620_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5620:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5880_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5880:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5890_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5890:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_7500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_7500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_7510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_7510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_7590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_7590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_7620_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_7620:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:wyse_5070_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:wyse_5070:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:wyse_5470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:wyse_5470:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:wyse_5470_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:wyse_5470_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:wyse_7040_thin_client_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:wyse_7040_thin_client:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9305_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9305:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_7390_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_7390:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_7390_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_7390_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9310_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9310_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9315_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9315:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9315_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9315_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9320:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9380_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9380:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_15_7590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_15_7590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_15_9500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_15_9500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_15_9510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_15_9510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_15_9520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_15_9520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_15_9530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_15_9530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_15_9575_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_15_9575_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_17_9700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_17_9700:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_17_9710_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_17_9710:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_17_9720_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_17_9720:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_17_9730_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_17_9730:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_8940_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_8940:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_8950_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_8950:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_8960_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_8960:-:*:*:*:*:*:*:*" ]
null
5.1
null
null
null
CVE-2005-0624
reportbug before 2.62 creates the .reportbugrc configuration file with world-readable permissions, which allows local users to obtain email smarthost passwords.
[ "cpe:2.3:a:debian:reportbug:2.60:*:*:*:*:*:*:*", "cpe:2.3:a:debian:reportbug:2.61:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
GHSA-8w5r-w84g-hvww
A vulnerability was found in SourceCodester Online Tutor Portal 1.0. It has been classified as critical. This affects an unknown part of the file /tutor/courses/view_course.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
null
null
null
CVE-2006-0810
Unspecified vulnerability in config.php in Skate Board 0.9 allows remote authenticated administrators to execute arbitrary PHP code by causing certain variables in config.php to be modified, possibly due to XSS or direct static code injection.
[ "cpe:2.3:a:skate_board:skate_board:0.9:*:*:*:*:*:*:*" ]
null
null
null
3.5
null
CVE-2015-8770
Directory traversal vulnerability in the set_skin function in program/include/rcmail_output_html.php in Roundcube before 1.0.8 and 1.1.x before 1.1.4 allows remote authenticated users with certain permissions to read arbitrary files or possibly execute arbitrary code via a .. (dot dot) in the _skin parameter to index.php.
[ "cpe:2.3:a:roundcube:roundcube_webmail:*:*:*:*:*:*:*:*", "cpe:2.3:a:roundcube:roundcube_webmail:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:roundcube:roundcube_webmail:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:roundcube:roundcube_webmail:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:roundcube:roundcube_webmail:1.1.3:*:*:*:*:*:*:*" ]
null
null
7.5
6
null
GHSA-3vg7-jw9m-pc3f
Broken Access Control in Form Framework
ProblemDue to improper input validation, attackers can by-pass restrictions of predefined options and submit arbitrary data in the Form Designer backend module of the Form Framework.In the default configuration of the Form Framework this allows attackers to explicitly allow arbitrary mime-types for file uploads - however, default _fileDenyPattern_ successfully blocked files like _.htaccess_ or _malicious.php_. Besides that, attackers can persist those files in any writable directory of the corresponding TYPO3 installation.A valid backend user account with access to the form module is needed to exploit this vulnerability.SolutionUpdate to TYPO3 versions 8.7.40, 9.5.25, 10.4.14, 11.1.1 that fix the problem described.CreditsThanks to Richie Lee who reported this issue and to TYPO3 contributor Ralf Zimmermann who fixed the issue.References[TYPO3-CORE-SA-2021-003](https://typo3.org/security/advisory/typo3-core-sa-2021-003)
[]
null
8.3
null
null
null
CVE-2018-11350
An issue was discovered in Jirafeau before 3.4.1. The file "search by name" form is affected by one Cross-Site Scripting vulnerability via the name parameter.
[ "cpe:2.3:a:jirafeau:jirafeau:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
CVE-2022-24694
In Mahara 20.10 before 20.10.4, 21.04 before 21.04.3, and 21.10 before 21.10.1, the names of folders in the Files area can be seen by a person not owning the folders. (Only folder names are affected. Neither file names nor file contents are affected.)
[ "cpe:2.3:a:mahara:mahara:*:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:21.10.0:-:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:21.10.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:21.10.0:rc2:*:*:*:*:*:*" ]
null
4.3
null
4
null
CVE-2020-25774
A vulnerability in the Trend Micro Apex One ServerMigrationTool component could allow an attacker to trigger an out-of-bounds red information disclosure which would disclose sensitive information to an unprivileged account. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
[ "cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*", "cpe:2.3:a:trendmicro:apex_one:saas:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
4.3
null
4.3
null
GHSA-mxx3-jppq-w966
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through buffer overflow.
[]
null
3.3
null
null
null
GHSA-73g7-5897-637c
cPanel before 62.0.17 allows arbitrary file-overwrite operations via the WHM Zone Template editor (SEC-226).
[]
null
null
4.9
null
null
CVE-2021-27915
XSS Cross-site Scripting Stored (XSS) - Description field
Prior to the patched version, there is an XSS vulnerability in the description fields within the Mautic application which could be exploited by a logged in user of Mautic with the appropriate permissions. This could lead to the user having elevated access to the system.
[ "cpe:2.3:a:mautic:mautic:-:*:*:*:*:*:*:*", "cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*", "cpe:2.3:a:acquia:mautic:1.0.0:-:*:*:*:*:*:*", "cpe:2.3:a:acquia:mautic:1.0.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:acquia:mautic:1.0.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:acquia:mautic:1.0.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:acquia:mautic:1.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:acquia:mautic:1.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:acquia:mautic:1.0.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:acquia:mautic:1.0.0:rc4:*:*:*:*:*:*" ]
null
7.6
null
null
null
CVE-2018-13689
The mintToken function of a smart contract implementation for CJXToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[ "cpe:2.3:a:cjxtoken_project:cjxtoken:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
CVE-2025-24422
Adobe Commerce | Improper Access Control (CWE-284)
Adobe Commerce versions 2.4.8-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized read access. Exploitation of this issue does not require user interaction.
[]
null
6.5
null
null
null
GHSA-x6pp-j24v-837c
The Juniper Junos Pulse Secure Access Service (SSL VPN) devices with IVE OS 8.0 before 8.0r1, 7.4 before 7.4r5, and 7.1 before 7.1r18 allows remote attackers to conduct clickjacking attacks via unspecified vectors.
[]
null
null
null
null
null
CVE-2022-34364
Dell BSAFE SSL-J, versions before 6.5 and version 7.0 contain a debug message revealing unnecessary information vulnerability. This may lead to disclosing sensitive information to a locally privileged user. .
[ "cpe:2.3:a:dell:bsafe_ssl-j:*:*:*:*:*:*:*:*", "cpe:2.3:a:dell:bsafe_ssl-j:7.0:*:*:*:*:*:*:*" ]
null
4.4
null
null
null
GHSA-4xfh-5wgj-8xj9
NULL pointer dereference in some Intel(R) VPL software before version 24.1.4 may allow an authenticated user to potentially enable denial of service via local access.
[]
1
2.2
null
null
null
CVE-2022-32935
A lock screen issue was addressed with improved state management. This issue is fixed in iOS 15.7.1 and iPadOS 15.7.1, iOS 16.1 and iPadOS 16, macOS Ventura 13. A user may be able to view restricted content from the lock screen.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
null
4.6
null
null
null
CVE-2018-20408
An issue was discovered in Bento4 1.5.1-627. There is a memory leak in AP4_StdcFileByteStream::Create in System/StdC/Ap4StdCFileByteStream.cpp, as demonstrated by mp42hls.
[ "cpe:2.3:a:axiosys:bento4:1.5.1-627:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
null
RHSA-2023:3489
Red Hat Security Advisory: redhat-ds:12 security, bug fix, and enhancement update
RHDS: LDAP browser tries to decode userPassword instead of userCertificate attribute
[ "cpe:/a:redhat:directory_server:12.1::el9" ]
null
5.5
null
null
null
CVE-2022-27331
An access control issue in Zammad v5.0.3 broadcasts administrative configuration changes to all users who have an active application instance, including settings that should only be visible to authenticated users.
[ "cpe:2.3:a:zammad:zammad:*:*:*:*:*:*:*:*" ]
null
4.3
null
4
null
CVE-2023-36684
WordPress Convert Pro plugin <= 1.7.5 - Broken Access Control vulnerability
Missing Authorization vulnerability in Brainstorm Force Convert Pro.This issue affects Convert Pro: from n/a through 1.7.5.
[ "cpe:2.3:a:brainstormforce:convert_pro:*:*:*:*:*:wordpress:*:*" ]
null
7.1
null
null
null
CVE-2012-5590
SQL injection vulnerability in the Webmail Plus module for Drupal allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[ "cpe:2.3:a:scripthead:webmail_plus:-:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2007-3888
Multiple cross-site scripting (XSS) vulnerabilities in Insanely Simple Blog 0.5 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the search action, possibly related to the term parameter to index.php; or (2) an anonymous blog entry, possibly involving the (a) posted_by, (b) subject, and (c) content parameters to index.php; as demonstrated by the onmouseover attribute of certain elements. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:insanely_simple_blog:insanely_simple_blog:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-2xm9-4m89-4qwr
Cross Site Scripting (XSS) vulnerability exists in index.html in AFI WebACMS through 2.1.0 via the the ID parameter.
[]
null
null
null
null
null
CVE-2008-5189
CRLF injection vulnerability in Ruby on Rails before 2.0.5 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL to the redirect_to function.
[ "cpe:2.3:a:rubyonrails:rails:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:0.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:0.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:0.9.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:0.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:0.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:0.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:0.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:0.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:0.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:0.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:0.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:0.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:0.14.2:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:0.14.3:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:0.14.4:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:1.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:1.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:2.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:2.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:ruby_on_rails:0.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:ruby_on_rails:0.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:ruby_on_rails:0.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:ruby_on_rails:0.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:ruby_on_rails:0.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:ruby_on_rails:0.9.0:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2023-26218
TIBCO Nimbus Reflected Cross-site Scripting (XSS) vulnerabilities
The Web Client component of TIBCO Software Inc.'s TIBCO Nimbus contains easily exploitable Reflected Cross Site Scripting (XSS) vulnerabilities that allow a low privileged attacker to social engineer a legitimate user with network access to execute scripts targeting the affected system or the victim's local system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO Nimbus: versions 10.6.0 and below.
[ "cpe:2.3:a:tibco:nimbus:*:*:*:*:*:*:*:*" ]
null
8
null
null
null
CVE-2015-2043
Multiple cross-site scripting (XSS) vulnerabilities in Visualware MyConnection Server 8.2b allow remote attackers to inject arbitrary web script or HTML via the (1) bt, (2) variable, or (3) et parameter to myspeed/db/historyitem.
[ "cpe:2.3:a:visualware:myconnection_server:8.2b:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-j4rx-7qrg-jr79
A vulnerability classified as critical has been found in 1000 Projects Portfolio Management System MCA 1.0. This affects an unknown part of the file /update_pro_details.php. The manipulation of the argument q leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
null
null
null
GHSA-7wjw-qmg2-hcfv
The Reporting Module 1.12.0 for OpenMRS allows CSRF attacks with resultant XSS, in which administrative authentication is hijacked to insert JavaScript into a name field in webapp/reports/manageReports.jsp.
[]
null
null
8.8
null
null
CVE-2021-23654
Improper Input Validation
This affects all versions of package html-to-csv. When there is a formula embedded in a HTML page, it gets accepted without any validation and the same would be pushed while converting it into a CSV file. Through this a malicious actor can embed or generate a malicious link or execute commands via CSV files.
[ "cpe:2.3:a:html-to-csv_project:html-to-csv:*:*:*:*:*:python:*:*" ]
null
5.6
null
null
null
RHSA-2009:1061
Red Hat Security Advisory: freetype security update
freetype: multiple integer overflows
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
null
CVE-2013-5798
Unspecified vulnerability in the Oracle Identity Manager component in Oracle Fusion Middleware 11.1.2.0.0 and 11.1.2.1.0 allows remote attackers to affect integrity via unknown vectors related to End User Self Service.
[ "cpe:2.3:a:oracle:fusion_middleware:11.1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:11.1.2.1.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-cfrv-hwx5-8ffw
Missing Authorization vulnerability in Premium Addons Premium Addons PRO.This issue affects Premium Addons PRO: from n/a through 2.9.0.
[]
null
6.5
null
null
null
CVE-2025-32600
WordPress Tournamatch Plugin <= 4.6.1 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tournamatch Tournamatch allows Reflected XSS. This issue affects Tournamatch: from n/a through 4.6.1.
[]
null
7.1
null
null
null
GHSA-c8mc-x79x-5cgq
Escalation of privilege in Intel Saffron MemoryBase before 11.4 allows an authenticated user access to privileged information.
[]
null
null
5.7
null
null
CVE-2006-1812
phpWebFTP 3.2 and earlier stores script.js under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information.
[ "cpe:2.3:a:phpwebftp:phpwebftp:3.2:*:*:*:*:*:*:*" ]
null
null
null
6.4
null
GHSA-43jj-2rwc-2m3f
Broken access control on files
In SilverStripe assets 4.0, there is broken access control on files.
[]
null
5.3
null
null
null
GHSA-v2rq-5vvg-wh5r
A ZTE product is impacted by an information leak vulnerability. An attacker could use this vulnerability to obtain the authentication password of the handheld terminal and access the device illegally for operation. This affects: ZXA10 eODN V2.3P2T1
[]
null
null
null
null
null
CVE-2021-29624
Lack of protection against cookie tossing attacks in fastify-csrf
fastify-csrf is an open-source plugin helps developers protect their Fastify server against CSRF attacks. Versions of fastify-csrf prior to 3.1.0 have a "double submit" mechanism using cookies with an application deployed across multiple subdomains, e.g. "heroku"-style platform as a service. Version 3.1.0 of the fastify-csrf fixes it. the vulnerability. The user of the module would need to supply a `userInfo` when generating the CSRF token to fully implement the protection on their end. This is needed only for applications hosted on different subdomains.
[ "cpe:2.3:a:fastify:fastify-csrf:*:*:*:*:*:node.js:*:*" ]
null
6.5
null
null
null
GHSA-x84x-j5pw-3w52
Multiple cross-site scripting (XSS) vulnerabilities in Chipmunk Forum script allow remote attackers to inject arbitrary web script or HTML via the forumID parameter to (1) newtopic.php, (2) quote.php, (3) index.php, and (4) reply.php.
[]
null
null
null
null
null
GHSA-vgvm-7q9m-g8wv
In ccci, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06108658; Issue ID: ALPS06108658.
[]
null
6.7
null
null
null
CVE-2022-38656
HCL Commerce, when using Elasticsearch, could be affected by a denial of service vulnerability
HCL Commerce, when using Elasticsearch, can allow a remote attacker to cause a denial of service attack on the site and make administrative changes.
[ "cpe:2.3:a:hcltechsw:hcl_commerce:*:*:*:*:*:*:*:*" ]
null
8.6
null
null
null
CVE-2023-2031
The Locatoraid Store Locator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in versions up to, and including, 3.9.14 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[ "cpe:2.3:a:plainware:locatoraid:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
null
CVE-2024-43242
WordPress Indeed Ultimate Membership Pro plugin <= 12.6 - Unauthenticated PHP Object Injection vulnerability
Deserialization of Untrusted Data vulnerability in azzaroco Ultimate Membership Pro allows Object Injection.This issue affects Ultimate Membership Pro: from n/a through 12.6.
[ "cpe:2.3:a:azzaroco:ultimate_membership_pro:*:*:*:*:*:*:*:*", "cpe:2.3:a:wpindeed:ultimate_membership_pro:*:*:*:*:*:wordpress:*:*" ]
null
9
null
null
null
GHSA-q785-jpc2-4w88
SQL injection vulnerability in accesscontrol.php in PhpPass 2 allows remote attackers to execute arbitrary SQL commands via the (1) uid and (2) pwd parameters.
[]
null
null
null
null
null
CVE-2025-1668
School Management System – WPSchoolPress <= 2.2.16 - Missing Authorization to Arbitrary User Deletion
The School Management System – WPSchoolPress plugin for WordPress is vulnerable to arbitrary user deletion due to a missing capability check on the wpsp_DeleteUser() function in all versions up to, and including, 2.2.16. This makes it possible for authenticated attackers, with teacher-level access and above, to delete arbitrary user accounts.
[]
null
4.3
null
null
null
GHSA-7v7m-grfx-ghf2
download_script.asp in ASP Folder Gallery allows remote attackers to read arbitrary files via a filename in the file parameter.
[]
null
null
null
null
null
GHSA-33h2-rxgw-84jc
In ims service, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07937105; Issue ID: ALPS07937105.
[]
null
6.4
null
null
null
GHSA-gx3q-72jh-pq5j
Stack-based buffer overflow in hw/scsi/scsi-bus.c in QEMU, when built with SCSI-device emulation support, allows guest OS users with CAP_SYS_RAWIO permissions to cause a denial of service (instance crash) via an invalid opcode in a SCSI command descriptor block.
[]
null
5.5
null
null
null
CVE-2010-4910
SQL injection vulnerability in index.cfm in ColdGen ColdCalendar 2.06 allows remote attackers to execute arbitrary SQL commands via the EventID parameter in a ViewEventDetails action.
[ "cpe:2.3:a:coldgen:coldcalendar:2.06:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-qmpg-vp4x-46v9
The HTTP proxy in Astaro Security Linux 6.0 does not properly filter HTTP CONNECT requests to localhost, which allows remote attackers to bypass firewall rules and connect to local services.
[]
null
null
null
null
null
CVE-2025-21469
Improper Access Control in Camera Driver
Memory corruption while processing image encoding, when input buffer length is 0 in IOCTL call.
[]
null
7.8
null
null
null
GHSA-73h7-mvv6-m363
The Opal Estate Pro – Property Management and Submission plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the agent latitude and longitude parameters in all versions up to, and including, 1.7.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
CVE-2022-31668
User permission validation failure and disclosure of P2P preheat execution logs
Harbor fails to validate the user permissions when updating p2p preheat policies. By sending a request to update a p2p preheat policy with an id that belongs to a project that the currently authenticated user doesn't have access to, the attacker could modify p2p preheat policies configured in other projects.
[ "cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*" ]
null
7.4
null
null
null
GHSA-f67q-rx5w-v4hr
A vulnerability, which was classified as problematic, has been found in SourceCodester Best Employee Management System 1.0. This issue affects some unknown processing of the file /admin/salary_slip.php. The manipulation of the argument id leads to authorization bypass. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.3
4.3
null
null
null
CVE-2022-34783
Jenkins Plot Plugin 2.1.10 and earlier does not escape plot descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
[ "cpe:2.3:a:jenkins:plot:*:*:*:*:*:jenkins:*:*" ]
null
5.4
null
3.5
null
GHSA-j83x-r9qq-9g4v
Froxlor is vulnerable to authentication bypass
Authentication Bypass by Primary Weakness in GitHub repository froxlor/froxlor prior to 2.0.13.
[]
null
9.8
null
null
null
CVE-2019-12399
When Connect workers in Apache Kafka 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, or 2.3.0 are configured with one or more config providers, and a connector is created/updated on that Connect cluster to use an externalized secret variable in a substring of a connector configuration property value, then any client can issue a request to the same Connect cluster to obtain the connector's task configuration and the response will contain the plaintext secret rather than the externalized secrets variables.
[ "cpe:2.3:a:apache:kafka:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:kafka:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:kafka:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:kafka:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:kafka:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:kafka:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:kafka:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_liquidity_management:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_payments:14.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_platform:2.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_supply_chain_finance:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_trade_finance_process_management:14.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_trade_finance_process_management:14.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_trade_finance_process_management:14.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_virtual_account_management:14.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_virtual_account_management:14.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_virtual_account_management:14.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_universal_banking:14.4.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-2016-1671
Google Chrome before 50.0.2661.102 on Android mishandles / (slash) and \ (backslash) characters, which allows attackers to conduct directory traversal attacks via a file: URL, related to net/base/escape.cc and net/base/filename_util.cc.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
8.1
6.8
null
CVE-2023-32314
Sandbox Escape
vm2 is a sandbox that can run untrusted code with Node's built-in modules. A sandbox escape vulnerability exists in vm2 for versions up to and including 3.9.17. It abuses an unexpected creation of a host object based on the specification of `Proxy`. As a result a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version `3.9.18` of `vm2`. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ "cpe:2.3:a:vm2_project:vm2:*:*:*:*:*:node.js:*:*" ]
null
9.8
null
null
null
GHSA-9x9h-q494-gw26
EMC Documentum D2 version 4.5 and EMC Documentum D2 version 4.6 has Reflected Cross-Site Scripting Vulnerabilities that could potentially be exploited by malicious users to compromise the affected system.
[]
null
null
6.1
null
null
GHSA-m2fp-c5wr-xjph
Ariel Harush and Roy Hodir from OTORIO have found a flaw in the AXIS A1001 when communicating over OSDP. A heap-based buffer overflow was found in the pacsiod process which is handling the OSDP communication allowing to write outside of the allocated buffer. By appending invalid data to an OSDP message it was possible to write data beyond the heap allocated buffer. The data written outside the buffer could be used to execute arbitrary code.lease refer to the Axis security advisory for more information, mitigation and affected products and software versions.
[]
null
7.1
null
null
null
CVE-2006-3757
index.php in Zen Cart 1.3.0.2 allows remote attackers to obtain sensitive information via empty (1) _GET[], (2) _SESSION[], (3) _POST[], (4) _COOKIE[], or (5) _SESSION[] array parameters, which reveals the installation path in an error message. NOTE: this issue might be resultant from a global overwrite vulnerability.
[ "cpe:2.3:a:zen_cart:zen_cart:1.3.0.2:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2022-21610
Vulnerability in the Oracle Solaris product of Oracle Systems (component: LDoms). The supported version that is affected is 11. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Solaris accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Solaris. CVSS 3.1 Base Score 3.3 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:L).
[ "cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*" ]
null
3.3
null
null
null
GHSA-87x4-89mh-jmjg
A stored Cross-Site Scripting vulnerability in the DataDog integration in GitLab CE/EE version 13.7 and above allows an attacker to execute arbitrary JavaScript code on the victim's behalf
[]
null
5.4
null
null
null
GHSA-5m9p-995f-fvm9
An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the "TextInput" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted data.
[]
null
null
9.8
null
null
CVE-2016-2509
The password-sync feature on Belden Hirschmann Classic Platform switches L2B before 05.3.07 and L2E, L2P, L3E, and L3P before 09.0.06 sets an SNMP community to the same string as the administrator password, which allows remote attackers to obtain sensitive information by sniffing the network.
[ "cpe:2.3:o:belden:hirschmann_firmware:05.3.06:*:*:*:*:*:*:*", "cpe:2.3:h:belden:hirschmann_l2b:-:*:*:*:*:*:*:*", "cpe:2.3:o:belden:hirschmann_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:belden:hirschmann_l2e:-:*:*:*:*:*:*:*", "cpe:2.3:h:belden:hirschmann_l2p:-:*:*:*:*:*:*:*", "cpe:2.3:h:belden:hirschmann_l3e:-:*:*:*:*:*:*:*", "cpe:2.3:h:belden:hirschmann_l3p:-:*:*:*:*:*:*:*" ]
null
null
5.3
2.9
null
GHSA-4h7h-xhv3-2g96
Lost and Found Information System 1.0 allows account takeover via username and password to a /classes/Users.php?f=save URI.
[]
null
9.8
null
null
null
CVE-2022-34588
itsourcecode Advanced School Management System v1.0 is vulnerable to SQL Injection via the grade parameter at /school/view/timetable_insert_form.php.
[ "cpe:2.3:a:advanced_school_management_system_project:advanced_school_management_system:1.0:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2020-28597
A predictable seed vulnerability exists in the password reset functionality of Epignosis EfrontPro 5.2.21. By predicting the seed it is possible to generate the correct password reset 1-time token. An attacker can visit the password reset supplying the password reset token to reset the password of an account of their choice.
[ "cpe:2.3:a:epignosishq:efront:5.2.17:*:*:*:pro:*:*:*", "cpe:2.3:a:epignosishq:efront:5.2.21:*:*:*:pro:*:*:*" ]
null
null
9.8
null
null
GHSA-hg8r-px7r-4j3w
IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.
[]
null
4.3
null
null
null
GHSA-jw59-w7qw-w79g
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Windows Hyper-V Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0620, CVE-2019-0722.
[]
null
7.6
null
null
null
CVE-2007-5462
Unspecified vulnerability in the Sun Solaris RPC services library (librpcsvc) on Solaris 8 through 10 allows remote attackers to cause a denial of service (mountd crash) via unspecified packets to a server that exports many filesystems, and allows local users to cause a denial of service (automountd crash) via unspecified requests to mount filesystems from a server that exports many filesystems.
[ "cpe:2.3:o:sun:solaris:8.0:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:solaris:10.0:*:x86:*:*:*:*:*" ]
null
null
null
7.8
null
CVE-2024-49960
ext4: fix timer use-after-free on failed mount
In the Linux kernel, the following vulnerability has been resolved: ext4: fix timer use-after-free on failed mount Syzbot has found an ODEBUG bug in ext4_fill_super The del_timer_sync function cancels the s_err_report timer, which reminds about filesystem errors daily. We should guarantee the timer is no longer active before kfree(sbi). When filesystem mounting fails, the flow goes to failed_mount3, where an error occurs when ext4_stop_mmpd is called, causing a read I/O failure. This triggers the ext4_handle_error function that ultimately re-arms the timer, leaving the s_err_report timer active before kfree(sbi) is called. Fix the issue by canceling the s_err_report timer after calling ext4_stop_mmpd.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-3jxq-45r5-2p48
In getPhoneAccountsForPackage of TelecomServiceImpl.java, there is a possible way to access a tracking identifier due to a missing permission check. This could lead to local information disclosure of the identifier, which could be used to track an account across devices, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-153995334
[]
null
null
null
null
null
GHSA-p873-hg5h-j2mp
In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an attacker can append path traversal characters to the filename when using a specific command, allowing them to read arbitrary files from the system.
[]
null
6.5
null
null
null
CVE-2021-34889
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of 3DS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-14842.
[ "cpe:2.3:a:bentley:bentley_view:*:*:*:*:*:*:*:*", "cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*" ]
null
null
3.3
null
null
GHSA-cj4v-rh8v-p7c7
An issue was discovered in Appnitro MachForm before 4.2.3. When the form is set to filter a blacklist, it automatically adds dangerous extensions to the filters. If the filter is set to a whitelist, the dangerous extensions can be bypassed through ap_form_elements SQL Injection.
[]
null
null
9.8
null
null
RHSA-2020:1804
Red Hat Security Advisory: sudo security, bug fix, and enhancement update
sudo: attacker with access to a Runas ALL sudoer account can impersonate a nonexistent user sudo: by using ! character in the shadow file instead of a password hash can access to a run as all sudoer account
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.5
7.5
null
null
CVE-2024-25532
RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the bt_id parameter at /include/get_dict.aspx.
[ "cpe:2.3:a:ruvar:ruvaroa:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2024-40893
Firewalla BTLE Authenticated Command Injection
Multiple authenticated operating system (OS) command injection vulnerabilities exist in Firewalla Box Software versions before 1.979. A physically close attacker that is authenticated to the Bluetooth Low-Energy (BTLE) interface can use the network configuration service to inject commands in various configuration parameters including networkConfig.Interface.Phy.Eth0.Extra.PingTestIP, networkConfig.Interface.Phy.Eth0.Extra.DNSTestDomain, and networkConfig.Interface.Phy.Eth0.Gateway6. Additionally, because the configuration can be synced to the Firewalla cloud, the attacker may be able to persist access even after hardware resets and firmware re-flashes.
[ "cpe:2.3:a:firewalla:box_software:*:*:*:*:*:*:*:*" ]
null
6.8
null
null
null
CVE-2022-42327
x86: unintended memory sharing between guests On Intel systems that support the "virtualize APIC accesses" feature, a guest can read and write the global shared xAPIC page by moving the local APIC out of xAPIC mode. Access to this shared page bypasses the expected isolation that should exist between two guests.
[ "cpe:2.3:o:xen:xen:4.16:*:*:*:*:*:x86:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*" ]
null
7.1
null
null
null
CVE-2013-4422
SQL injection vulnerability in Quassel IRC before 0.9.1, when Qt 4.8.5 or later and PostgreSQL 8.2 or later are used, allows remote attackers to execute arbitrary SQL commands via a \ (backslash) in a message.
[ "cpe:2.3:a:quassel-irc:quassel_irc:*:*:*:*:*:*:*:*", "cpe:2.3:a:quassel-irc:quassel_irc:0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:quassel-irc:quassel_irc:0.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:quassel-irc:quassel_irc:0.3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:quassel-irc:quassel_irc:0.3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:quassel-irc:quassel_irc:0.3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:quassel-irc:quassel_irc:0.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:quassel-irc:quassel_irc:0.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:quassel-irc:quassel_irc:0.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:quassel-irc:quassel_irc:0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:quassel-irc:quassel_irc:0.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:quassel-irc:quassel_irc:0.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:quassel-irc:quassel_irc:0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:quassel-irc:quassel_irc:0.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:quassel-irc:quassel_irc:0.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:quassel-irc:quassel_irc:0.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:quassel-irc:quassel_irc:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:quassel-irc:quassel_irc:0.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:quassel-irc:quassel_irc:0.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:quassel-irc:quassel_irc:0.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:quassel-irc:quassel_irc:0.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.14:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.15:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.16:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.17:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.18:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.3:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.3.12:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.3.13:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.3.14:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.3.15:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.3.16:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.3.17:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.3.18:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.3.19:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.3.20:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.3.21:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.3.22:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.13:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.14:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.15:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.16:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:5.0.1:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2002-1631
SQL injection vulnerability in the query.xsql sample page in Oracle 9i Application Server (9iAS) allows remote attackers to execute arbitrary code via the sql parameter.
[ "cpe:2.3:a:oracle:application_server:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:1.0.2.1s:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:1.0.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:9.0.2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:9.0.2.0.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-4f98-pqgf-7wqw
mp4v2 v2.1.3 was discovered to contain a memory leak via the class MP4StringProperty at mp4property.cpp.
[]
null
5.5
null
null
null
GHSA-73f6-cmq6-69h8
A race condition vulnerability was reported in IMController, a software component of Lenovo System Interface Foundation, prior to version 1.1.20.3 that could allow a local attacker to connect and interact with the IMController child process' named pipe.
[]
null
7
null
null
null
CVE-2017-8790
An issue was discovered on Accellion FTA devices before FTA_9_12_180. The home/seos/courier/ldaptest.html POST parameter "filter" can be used for LDAP Injection.
[ "cpe:2.3:a:accellion:file_transfer_appliance:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
GHSA-qc9x-m86v-m5v2
Multiple unspecified vulnerabilities in the Provider class in Sun Java SE 5.0 before Update 20 have unknown impact and attack vectors, aka BugId 6429594. NOTE: this issue exists because of an incorrect fix for BugId 6406003.
[]
null
null
null
null
null
CVE-1999-1547
Oracle Web Listener 2.1 allows remote attackers to bypass access restrictions by replacing a character in the URL with its HTTP-encoded (hex) equivalent.
[ "cpe:2.3:a:oracle:web_listener:2.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
null