id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2025-48959 | Local privilege escalation due to insecure file permissions. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 40077. | [] |
|
CVE-2007-6756 | ZOLL Defibrillator / Monitor M Series, E Series, and R Series have a default password for System Configuration mode, which allows physically proximate attackers to modify device configuration and cause a denial of service (adverse human health effects). | [
"cpe:2.3:h:zoll:monitor\\/defibrillator:e:*:*:*:*:*:*:*",
"cpe:2.3:h:zoll:monitor\\/defibrillator:m:*:*:*:*:*:*:*",
"cpe:2.3:h:zoll:monitor\\/defibrillator:r:*:*:*:*:*:*:*"
] |
|
CVE-2023-1555 | Missing Authorization in GitLab | An issue has been discovered in GitLab affecting all versions starting from 15.2 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. A namespace-level banned user can access the API. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:16.3.0:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:16.3.0:*:*:*:enterprise:*:*:*"
] |
CVE-2022-20647 | Cisco Security Manager Cross-Site Scripting Vulnerabilities | Multiple vulnerabilities in the web-based management interface of Cisco Security Manager could allow an unauthenticated, remote attacker to conduct cross-site scripting attacks against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. | [
"cpe:2.3:a:cisco:security_manager:*:*:*:*:*:*:*:*"
] |
GHSA-26g3-897h-f2rc | Improper privilege management in Samsung Find prior to SMR Feb-2025 Release 1 allows local privileged attackers to disable Samsung Find. | [] |
|
GHSA-hhrg-ww69-4cxj | An issue in CatoNetworks CatoClient before v.5.8.0 allows attackers to escalate privileges and achieve a race condition (TOCTOU) via the PrivilegedHelperTool component. | [] |
|
GHSA-6464-wc5j-3x4p | Vulnerability in the Oracle Email Center component of Oracle E-Business Suite (subcomponent: Message Display). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Email Center. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Email Center, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Email Center accessible data as well as unauthorized update, insert or delete access to some of Oracle Email Center accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). | [] |
|
GHSA-8rq7-j5p6-7pw5 | An issue was discovered in Ivanti Workspace Control before 10.3.90.0. Local authenticated users with low privileges in a Workspace Control managed session can bypass Workspace Control security features configured for this session by resetting the session context. | [] |
|
GHSA-hfmf-q43v-2ffj | Improper Key Verification in openpgp | Versions of `openpgp` prior to 4.2.0 are vulnerable to Improper Key Verification. The OpenPGP standard allows signature packets to have subpackets which may be hashed or unhashed. Unhashed subpackets are not cryptographically protected and cannot be trusted. The `openpgp` package does not verify whether a subpacket is hashed. Furthermore, due to the order of parsing a signature packet information from unhashed subpackets overwrites information from hashed subpackets. This may allow an attacker to modify the contents of a key certification signature or revocation signature. Doing so could convince a victim to use an obsolete key for encryption. An attack require a victim to import a manipulated key or update an existing key with a manipulated version.RecommendationUpgrade to version 4.2.0 or later.
If you are upgrading from a version <4.0.0 it is highly recommended to read the `High-Level API Changes` section of the `openpgp` 4.0.0 release: https://github.com/openpgpjs/openpgpjs/releases/tag/v4.0.0 | [] |
GHSA-fm9c-xcj2-2j5g | An Improper Certificate Validation vulnerability in LibreOffice existed where determining if a macro was signed by a trusted author was done by only matching the serial number and issuer string of the used certificate with that of a trusted certificate. This is not sufficient to verify that the macro was actually signed with the certificate. An adversary could therefore create an arbitrary certificate with a serial number and an issuer string identical to a trusted certificate which LibreOffice would present as belonging to the trusted author, potentially leading to the user to execute arbitrary code contained in macros improperly trusted. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.7; 7.3 versions prior to 7.3.1. | [] |
|
GHSA-jjqf-3g8v-g44j | The Installation Factory installation process for IBM WebSphere Application Server (WAS) 6.0.2 on Windows, when WAS is registered as a Windows service, allows local users to obtain sensitive information by reading the logs/instconfigifwas6.log log file. | [] |
|
GHSA-m8jx-hpg8-g7ww | In the Linux kernel, the following vulnerability has been resolved:mt76: mt7921: fix kernel crash when the firmware fails to downloadFix kernel crash when the firmware is missing or fails to download.[ 9.444758] kernel BUG at drivers/pci/msi.c:375!
[ 9.449363] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP
[ 9.501033] pstate: a0400009 (NzCv daif +PAN -UAO)
[ 9.505814] pc : free_msi_irqs+0x180/0x184
[ 9.509897] lr : free_msi_irqs+0x40/0x184
[ 9.513893] sp : ffffffc015193870
[ 9.517194] x29: ffffffc015193870 x28: 00000000f0e94fa2
[ 9.522492] x27: 0000000000000acd x26: 000000000000009a
[ 9.527790] x25: ffffffc0152cee58 x24: ffffffdbb383e0d8
[ 9.533087] x23: ffffffdbb38628d0 x22: 0000000000040200
[ 9.538384] x21: ffffff8cf7de7318 x20: ffffff8cd65a2480
[ 9.543681] x19: ffffff8cf7de7000 x18: 0000000000000000
[ 9.548979] x17: ffffff8cf9ca03b4 x16: ffffffdc13ad9a34
[ 9.554277] x15: 0000000000000000 x14: 0000000000080800
[ 9.559575] x13: ffffff8cd65a2980 x12: 0000000000000000
[ 9.564873] x11: ffffff8cfa45d820 x10: ffffff8cfa45d6d0
[ 9.570171] x9 : 0000000000000040 x8 : ffffff8ccef1b780
[ 9.575469] x7 : aaaaaaaaaaaaaaaa x6 : 0000000000000000
[ 9.580766] x5 : ffffffdc13824900 x4 : ffffff8ccefe0000
[ 9.586063] x3 : 0000000000000000 x2 : 0000000000000000
[ 9.591362] x1 : 0000000000000125 x0 : ffffff8ccefe0000
[ 9.596660] Call trace:
[ 9.599095] free_msi_irqs+0x180/0x184
[ 9.602831] pci_disable_msi+0x100/0x130
[ 9.606740] pci_free_irq_vectors+0x24/0x30
[ 9.610915] mt7921_pci_probe+0xbc/0x250 [mt7921e]
[ 9.615693] pci_device_probe+0xd4/0x14c
[ 9.619604] really_probe+0x134/0x2ec
[ 9.623252] driver_probe_device+0x64/0xfc
[ 9.627335] device_driver_attach+0x4c/0x6c
[ 9.631506] __driver_attach+0xac/0xc0
[ 9.635243] bus_for_each_dev+0x8c/0xd4
[ 9.639066] driver_attach+0x2c/0x38
[ 9.642628] bus_add_driver+0xfc/0x1d0
[ 9.646365] driver_register+0x64/0xf8
[ 9.650101] __pci_register_driver+0x6c/0x7c
[ 9.654360] init_module+0x28/0xfdc [mt7921e]
[ 9.658704] do_one_initcall+0x13c/0x2d0
[ 9.662615] do_init_module+0x58/0x1e8
[ 9.666351] load_module+0xd80/0xeb4
[ 9.669912] __arm64_sys_finit_module+0xa8/0xe0
[ 9.674430] el0_svc_common+0xa4/0x16c
[ 9.678168] el0_svc_compat_handler+0x2c/0x40
[ 9.682511] el0_svc_compat+0x8/0x10
[ 9.686076] Code: a94257f6 f9400bf7 a8c47bfd d65f03c0 (d4210000)
[ 9.692155] ---[ end trace 7621f966afbf0a29 ]---
[ 9.697385] Kernel panic - not syncing: Fatal exception
[ 9.702599] SMP: stopping secondary CPUs
[ 9.706549] Kernel Offset: 0x1c03600000 from 0xffffffc010000000
[ 9.712456] PHYS_OFFSET: 0xfffffff440000000
[ 9.716625] CPU features: 0x080026,2a80aa18
[ 9.720795] Memory Limit: none | [] |
|
CVE-2022-42936 | A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process. | [
"cpe:2.3:a:autodesk:autocad:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad:2020:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad:2021:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:macos:*:*",
"cpe:2.3:a:autodesk:autocad:2023:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_advance_steel:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_advance_steel:2020:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_advance_steel:2021:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_advance_steel:2022:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_advance_steel:2023:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_architecture:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_architecture:2020:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_architecture:2021:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_architecture:2022:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_architecture:2023:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_civil_3d:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_civil_3d:2020:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_civil_3d:2021:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_civil_3d:2022:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_civil_3d:2023:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_electrical:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_electrical:2020:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_electrical:2021:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_electrical:2022:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_electrical:2023:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_lt:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_lt:2020:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_lt:2021:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:macos:*:*",
"cpe:2.3:a:autodesk:autocad_lt:2023:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_map_3d:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_map_3d:2020:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_map_3d:2021:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_map_3d:2022:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_map_3d:2023:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mechanical:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mechanical:2020:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mechanical:2021:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mechanical:2022:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mechanical:2023:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mep:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mep:2020:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mep:2021:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mep:2022:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mep:2023:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_plant_3d:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_plant_3d:2020:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_plant_3d:2021:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_plant_3d:2022:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_plant_3d:2023:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*"
] |
|
CVE-2020-14818 | Vulnerability in the Oracle Solaris product of Oracle Systems (component: Utility). The supported version that is affected is 11. Difficult to exploit vulnerability allows low privileged attacker with network access via SSH to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Solaris accessible data. CVSS 3.1 Base Score 3.0 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N). | [
"cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*"
] |
|
GHSA-fgmm-vfhx-94pc | A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. SetRec param is not object. An attacker can send an HTTP request to trigger this vulnerability. | [] |
|
CVE-2017-11052 | In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while processing a specially crafted QCA_NL80211_VENDOR_SUBCMD_NDP cfg80211 vendor command a buffer over-read can occur. | [
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-25727 | In phpMyAdmin before 4.9.11 and 5.x before 5.2.1, an authenticated user can trigger XSS by uploading a crafted .sql file through the drag-and-drop interface. | [
"cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-48648 | sfc: fix null pointer dereference in efx_hard_start_xmit | In the Linux kernel, the following vulnerability has been resolved:
sfc: fix null pointer dereference in efx_hard_start_xmit
Trying to get the channel from the tx_queue variable here is wrong
because we can only be here if tx_queue is NULL, so we shouldn't
dereference it. As the above comment in the code says, this is very
unlikely to happen, but it's wrong anyway so let's fix it.
I hit this issue because of a different bug that caused tx_queue to be
NULL. If that happens, this is the error message that we get here:
BUG: unable to handle kernel NULL pointer dereference at 0000000000000020
[...]
RIP: 0010:efx_hard_start_xmit+0x153/0x170 [sfc] | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.0:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.0:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.0:rc6:*:*:*:*:*:*"
] |
CVE-2020-26806 | admin/file.do in ObjectPlanet Opinio before 7.15 allows Unrestricted File Upload of executable JSP files, resulting in remote code execution, because filePath can have directory traversal and fileContent can be valid JSP code. | [
"cpe:2.3:a:objectplanet:opinio:*:*:*:*:*:*:*:*"
] |
|
GHSA-jx53-j6xc-p3r6 | An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with a failed length check at nfs_read_reply when calling store_block in the NFSv2 case. | [] |
|
CVE-2022-32293 | In ConnMan through 1.41, a man-in-the-middle attack against a WISPR HTTP query could be used to trigger a use-after-free in WISPR handling, leading to crashes or code execution. | [
"cpe:2.3:a:intel:connman:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] |
|
GHSA-32qh-67mm-vmwj | The Janrain Capture module 6.x-1.0 and 7.x-1.0 for Drupal, when creating a local user account, allows attackers to obtain part of the initial input used to generate passwords, which makes it easier to conduct brute force password guessing attacks. | [] |
|
CVE-2018-6035 | Insufficient policy enforcement in DevTools in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially leak user local file data via a crafted Chrome Extension. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
] |
|
GHSA-3gqh-4x39-jr92 | Teltonika RUT9XX routers with firmware before 00.04.233 provide a root terminal on a serial interface without proper access control. This allows attackers with physical access to execute arbitrary commands with root privileges. | [] |
|
CVE-2002-1986 | Perception LiteServe 2.0 through 2.0.1 allows remote attackers to obtain the source code of CGI scripts via an HTTP request with a trailing dot ("."). | [
"cpe:2.3:a:perception:liteserve:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perception:liteserve:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:perception:liteserve:2.0.2:*:*:*:*:*:*:*"
] |
|
CVE-2014-5186 | SQL injection vulnerability in the All Video Gallery (all-video-gallery) plugin 1.2 for WordPress allows remote authenticated administrators to execute arbitrary SQL commands via the id parameter in an edit action in the allvideogallery_videos page to wp-admin/admin.php. | [
"cpe:2.3:a:all_video_gallery_plugin_project:all-video-gallery:1.2:*:*:*:*:wordpress:*:*"
] |
|
GHSA-x8jj-j32x-rqj9 | An issue in hackathon-starter v.8.1.0 allows a remote attacker to escalate privileges via the user.js component. | [] |
|
CVE-2017-12301 | A vulnerability in the Python scripting subsystem of Cisco NX-OS Software could allow an authenticated, local attacker to escape the Python parser and gain unauthorized access to the underlying operating system of the device. The vulnerability exists due to insufficient sanitization of user-supplied parameters that are passed to certain Python functions within the scripting sandbox of the affected device. An attacker could exploit this vulnerability to escape the scripting sandbox and execute arbitrary commands on the underlying operating system with the privileges of the authenticated user. To exploit this vulnerability, an attacker must have local access and be authenticated to the targeted device with administrative or Python execution privileges. These requirements could limit the possibility of a successful exploit. This vulnerability affects the following Cisco products if they are running Cisco NX-OS Software: Multilayer Director Switches, Nexus 2000 Series Fabric Extenders, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 5000 Series Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches - Standalone, NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules. Cisco Bug IDs: CSCvb86832, CSCvd86474, CSCvd86479, CSCvd86484, CSCvd86490, CSCve97102, CSCvf12757, CSCvf12804, CSCvf12815, CSCvf15198. | [
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.1\\(0\\)bd\\(0.20\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:multilayer_director:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_2000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_6000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_6001:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_6004:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_6004x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9500_r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(2\\)d1\\(0.21\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.0\\(0.74\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.1\\(0.70\\)s0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(6.213\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3016q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(0\\)hsk\\(0.357\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5010p_switch:-:*:*:*:*:*:*:*"
] |
|
GHSA-57jv-9gfj-rrj9 | Huawei Honor WS851 routers with software 1.1.21.1 and earlier allow remote attackers to obtain sensitive information via unspecified vectors, aka HWPSIRT-2016-05053. | [] |
|
GHSA-7528-f25h-5m3v | Multiple SQL injection vulnerabilities in JGS-XA JGS-Portal 3.0.2 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) anzahl_beitraege parameter to jgs_portal.php, 2) year parameter to (jgs_portal_statistik.php, 3) year parameter to (jgs_portal_beitraggraf.php, 4) tag parameter to (jgs_portal_viewsgraf.php, 5) year parameter to (jgs_portal_themengraf.php, 6) year parameter to (jgs_portal_mitgraf.php, 7) id parameter to jgs_portal_sponsor.php, or (8) the Accept-Language header to jgs_portal_log.php. | [] |
|
GHSA-9574-q3cv-v9f8 | Yaws before 1.80 allows remote attackers to cause a denial of service (memory consumption and crash) via a request with a large number of headers. | [] |
|
CVE-2017-14333 | The process_version_sections function in readelf.c in GNU Binutils 2.29 allows attackers to cause a denial of service (Integer Overflow, and hang because of a time-consuming loop) or possibly have unspecified other impact via a crafted binary file with invalid values of ent.vn_next, during "readelf -a" execution. | [
"cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*"
] |
|
GHSA-rxgv-x78r-p9p9 | mod_access.c in lighttpd 1.4.15 ignores trailing / (slash) characters in the URL, which allows remote attackers to bypass url.access-deny settings. | [] |
|
CVE-2011-3349 | lightdm before 0.9.6 writes in .dmrc and Xauthority files using root permissions while the files are in user controlled folders. A local user can overwrite root-owned files via a symlink, which can allow possible privilege escalation. | [
"cpe:2.3:a:lightdm_project:lightdm:*:*:*:*:*:*:*:*"
] |
|
GHSA-g39j-8m48-qwgj | A vulnerability in the SIP inspection engine of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a crash and reload of an affected device, resulting in a denial of service (DoS) condition.The vulnerability is due to a crash that occurs during a hash lookup for a SIP pinhole connection. An attacker could exploit this vulnerability by sending crafted SIP traffic through an affected device. A successful exploit could allow the attacker to cause a crash and reload of the affected device. | [] |
|
GHSA-vqmm-339w-hc7c | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] |
|
GHSA-rmgp-j5rm-7ghv | A shell command injection in the obs-service-source_validator before 0.7 could be used to execute code as the packager when checking RPM SPEC files with specific macro constructs. | [] |
|
CVE-2024-11182 | Stored XSS vulnerability in MDaemon Email Server | An XSS issue was discovered in
MDaemon Email Server before version 24.5.1c. An attacker can send an HTML e-mail message
with
JavaScript in an img tag. This could
allow a remote attacker
to load arbitrary JavaScript code in the context of a webmail user's browser window. | [
"cpe:2.3:a:mdaemon:mdaemon:*:*:*:*:*:*:*:*"
] |
CVE-2017-1002015 | Vulnerability in wordpress plugin image-gallery-with-slideshow v1.5.2, Blind SQL Injection in image-gallery-with-slideshow/admin_setting.php via selectMulGallery parameter. | [
"cpe:2.3:a:anblik:image-gallery-with-slideshow:1.5.2:*:*:*:*:wordpress:*:*"
] |
|
CVE-2024-3627 | Wheel of Life: Coaching and Assessment Tool for Life Coach <= 1.1.7 - Missing Authorization on Several AJAX Endpoints | The Wheel of Life: Coaching and Assessment Tool for Life Coach plugin for WordPress is vulnerable to unauthorized modification and loss of data due to a missing capability check on several functions in the AjaxFunctions.php file in all versions up to, and including, 1.1.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete arbitrary posts and modify settings. | [
"cpe:2.3:a:kraftplugins:wheel_of_life:*:*:*:*:*:wordpress:*:*"
] |
GHSA-f23h-hwfp-6r8p | blog/index.php in SansCMS 0.7 has XSS via the q parameter. | [] |
|
CVE-2024-48874 | Ruijie Reyee OS Server-Side Request Forgery | Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x could give attackers the ability to force Ruijie's proxy servers to perform any request the attackers choose. Using this, attackers could access internal services used by Ruijie and their internal cloud infrastructure via AWS cloud metadata services. | [
"cpe:2.3:o:ruijie:reyee_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:ruijienetworks:reyee_os:*:*:*:*:*:*:*:*"
] |
CVE-2020-7122 | Two memory corruption vulnerabilities in the Aruba CX Switches Series 6200F, 6300, 6400, 8320, 8325, and 8400 have been found. Successful exploitation of these vulnerabilities could result in Local Denial of Service of the CDP (Cisco Discovery Protocol) process in the switch. This applies to firmware versions prior to 10.04.1000. | [
"cpe:2.3:o:arubanetworks:cx_6200f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:cx_6200f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arubanetworks:cx_6300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:cx_6300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arubanetworks:cx_6400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:cx_6400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arubanetworks:cx_8320_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:cx_8320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arubanetworks:cx_8325_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:cx_8325:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arubanetworks:cx_8400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:cx_8400:-:*:*:*:*:*:*:*"
] |
|
GHSA-27xq-hgcj-7p95 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WisdmLabs Edwiser Bridge allows Reflected XSS. This issue affects Edwiser Bridge: from n/a through 3.0.8. | [] |
|
CVE-2023-7114 | Mattermost version 2.10.0 and earlier fails to sanitize deeplink paths, which allows an attacker to perform CSRF attacks against the server.
| [
"cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:android:*:*",
"cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:iphone_os:*:*"
] |
|
GHSA-h267-xjjf-qgxq | SQL Injection in GitHub repository instantsoft/icms2 prior to 2.16.1-git. | [] |
|
CVE-2020-9757 | The SEOmatic component before 3.3.0 for Craft CMS allows Server-Side Template Injection that leads to RCE via malformed data to the metacontainers controller. | [
"cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*"
] |
|
GHSA-q6rf-xpm8-9wqx | An issue in Jorani Leave Management System 1.0.3 allows a remote attacker to execute arbitrary HTML code via a crafted script to the comment field of the List of Leave requests page. | [] |
|
GHSA-v8g5-rxh2-j66m | Nortel VPN Router (aka Contivity) 1000, 2000, 4000, and 5000 before 5_05.149, 5_05.3xx before 5_05.304, and 6.x before 6_05.140 has two template HTML files lacking certain verification tags, which allows remote attackers to access the administration interface and change the device configuration via certain requests. | [] |
|
CVE-2025-22280 | WordPress DefendWP Firewall Plugin <= 1.1.0 - Broken Access Control vulnerability | Missing Authorization vulnerability in revmakx DefendWP Firewall allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects DefendWP Firewall: from n/a through 1.1.0. | [] |
CVE-2019-17520 | The Bluetooth Low Energy implementation on Texas Instruments SDK through 3.30.00.20 for CC2640R2 devices does not properly restrict the SM Public Key packet on reception, allowing attackers in radio range to cause a denial of service (crash) via crafted packets. | [
"cpe:2.3:a:ti:cc2640r2_software_development_kit:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ti:cc2640r2:-:*:*:*:*:*:*:*"
] |
|
GHSA-j2wc-9599-j92r | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via ff_hevc_put_hevc_epel_pixels_8_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file. | [] |
|
CVE-2023-31717 | A SQL Injection attack in FUXA <= 1.1.12 allows exfiltration of confidential information from the database. | [
"cpe:2.3:a:frangoteam:fuxa:*:*:*:*:*:*:*:*"
] |
|
CVE-2015-4094 | The Thycotic Password Manager Secret Server application through 2.3 for iOS does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:thycotic:secret_server:*:*:*:*:*:iphone_os:*:*"
] |
|
GHSA-w8mw-h8pc-h94g | Multiple integer underflows in the x25_parse_facilities function in net/x25/x25_facilities.c in the Linux kernel before 2.6.36.2 allow remote attackers to cause a denial of service (system crash) via malformed X.25 (1) X25_FAC_CLASS_A, (2) X25_FAC_CLASS_B, (3) X25_FAC_CLASS_C, or (4) X25_FAC_CLASS_D facility data, a different vulnerability than CVE-2010-3873. | [] |
|
CVE-2025-22124 | md/md-bitmap: fix wrong bitmap_limit for clustermd when write sb | In the Linux kernel, the following vulnerability has been resolved:
md/md-bitmap: fix wrong bitmap_limit for clustermd when write sb
In clustermd, separate write-intent-bitmaps are used for each cluster
node:
0 4k 8k 12k
-------------------------------------------------------------------
| idle | md super | bm super [0] + bits |
| bm bits[0, contd] | bm super[1] + bits | bm bits[1, contd] |
| bm super[2] + bits | bm bits [2, contd] | bm super[3] + bits |
| bm bits [3, contd] | | |
So in node 1, pg_index in __write_sb_page() could equal to
bitmap->storage.file_pages. Then bitmap_limit will be calculated to
0. md_super_write() will be called with 0 size.
That means the first 4k sb area of node 1 will never be updated
through filemap_write_page().
This bug causes hang of mdadm/clustermd_tests/01r1_Grow_resize.
Here use (pg_index % bitmap->storage.file_pages) to make calculation
of bitmap_limit correct. | [] |
CVE-2014-1536 | The PropertyProvider::FindJustificationRange function in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] |
|
CVE-2013-7460 | A write protection and execution bypass vulnerability in McAfee (now Intel Security) Application Control (MAC) 6.1.0 for Linux and earlier allows authenticated users to change binaries that are part of the Application Control whitelist and allows execution of binaries via specific conditions. | [
"cpe:2.3:a:mcafee:application_control:*:*:*:*:*:linux:*:*",
"cpe:2.3:a:mcafee:change_control:*:*:*:*:*:linux:*:*"
] |
|
GHSA-4r5x-qjqc-p579 | Tracking Module in botbait | The module `botbait` is a tool to be used to track bot and automated tools usage with-in the npm ecosystem.`botbait` is known to record and track user information.The module tracks the following information.Source IPprocess.versionsprocess.platformHow the module was invoked (test, require, pre-install)RecommendationThis package has no functional value, and should be removed from your environment if discovered. | [] |
GHSA-9r7f-gq6c-hrcv | The discontinued FFS Colibri product allows a remote user to access files on the system including files containing login credentials for other users. | [] |
|
CVE-1999-0810 | Denial of service in Samba NETBIOS name service daemon (nmbd). | [
"cpe:2.3:a:samba:samba:2.0.5:*:*:*:*:*:*:*"
] |
|
GHSA-mcf9-3hx5-x5wc | Buffer overflow in the flow daemon (flowd) in Juniper Junos 10.4 before 10.4S14, 11.4 before 11.4R7-S2, 12.1.X44 before 12.1X44-D15, 12.1X45 before 12.1X45-D10 on SRX devices, when using telnet pass-through authentication on the firewall, might allow remote attackers to execute arbitrary code via a crafted telnet message. | [] |
|
CVE-2016-8290 | Unspecified vulnerability in Oracle MySQL 5.7.13 and earlier allows remote administrators to affect availability via vectors related to Server: Performance Schema, a different vulnerability than CVE-2016-5633. | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-21605 | Junos OS: SRX 300 Series: Specific link local traffic causes a control plane overload | An Exposure of Resource to Wrong Sphere vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX 300 Series allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).
Specific valid link-local traffic is not blocked on ports in STP blocked state but is instead sent to the control plane of the device. This leads to excessive resource consumption and in turn severe impact on all control and management protocols of the device.
This issue affects Juniper Networks Junos OS:
* 21.2 version 21.2R3-S3 and later versions earlier than 21.2R3-S6;
* 22.1 version 22.1R3 and later versions earlier than 22.1R3-S4;
* 22.2 version
22.2R2
and later versions earlier than 22.2R3-S2;
* 22.3 version
22.3R2
and later versions earlier than 22.3R3-S1;
* 22.4 versions earlier than 22.4R2-S2, 22.4R3;
* 23.2 versions earlier than 23.2R1-S1, 23.2R2.
This issue does not affect Juniper Networks Junos OS 21.4R1 and later versions of 21.4. | [] |
CVE-2023-1885 | Cross-site Scripting (XSS) - Stored in thorsten/phpmyfaq | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
| [
"cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*"
] |
CVE-2020-1233 | An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory, aka 'Windows Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1231, CVE-2020-1235, CVE-2020-1265, CVE-2020-1282, CVE-2020-1304, CVE-2020-1306, CVE-2020-1334. | [
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
|
GHSA-fxvh-v448-8246 | Multiple vulnerabilities in Cisco Intersight Virtual Appliance could allow an unauthenticated, adjacent attacker to access sensitive internal services from an external interface. These vulnerabilities are due to insufficient restrictions for IPv4 or IPv6 packets that are received on the external management interface. An attacker could exploit these vulnerabilities by sending specific traffic to this interface on an affected device. A successful exploit could allow the attacker to access sensitive internal services and make configuration changes on the affected device. | [] |
|
CVE-2021-37085 | There is a Encoding timing vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to denial of service. | [
"cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*"
] |
|
GHSA-pfq7-6f2q-pvm6 | SQL injection vulnerability in Thorsten Korner 123tkShop before 0.3.1 allows remote attackers to execute arbitrary SQL queries via various programs including function_describe_item1.inc.php. | [] |
|
GHSA-345r-5qfx-4jpr | Rocket Software UniData versions prior to 8.2.4 build 3003 and UniVerse versions prior to 11.3.5 build 1001 or 12.2.1 build 2002 use weak encryption for packet-level security and passwords transferred on the wire. | [] |
|
CVE-2013-1695 | Mozilla Firefox before 22.0 does not properly implement certain DocShell inheritance behavior for the sandbox attribute of an IFRAME element, which allows remote attackers to bypass intended access restrictions via a FRAME element within an IFRAME element. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:19.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:19.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:20.0.1:*:*:*:*:*:*:*"
] |
|
CVE-2000-0568 | Sybergen Secure Desktop 2.1 does not properly protect against false router advertisements (ICMP type 9), which allows remote attackers to modify default routes. | [
"cpe:2.3:a:sybergen:secure_desktop:2.1:*:*:*:*:*:*:*"
] |
|
CVE-1999-0120 | Sun/Solaris utmp file allows local users to gain root access if it is writable by users other than root. | [
"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*"
] |
|
CVE-2019-9169 | In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match. | [
"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
] |
|
CVE-2023-4699 | Arbitrary Command Execution Vulnerability in Mitsubishi Electric proprietary protocol communication of multiple FA products | Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation MELSEC-F Series CPU modules, MELSEC iQ-F Series, MELSEC iQ-R series CPU modules, MELSEC iQ-R series, MELSEC iQ-L series, MELSEC Q series, MELSEC-L series, Mitsubishi Electric CNC M800V/M80V series, Mitsubishi Electric CNC M800/M80/E80 series and Mitsubishi Electric CNC M700V/M70V/E70 series allows a remote unauthenticated attacker to execute arbitrary commands by sending specific packets to the affected products. This could lead to disclose or tamper with information by reading or writing control programs, or cause a denial-of-service (DoS) condition on the products by resetting the memory contents of the products to factory settings or resetting the products remotely. | [
"cpe:2.3:o:mitsubishielectric:fx3u-32mt\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-32mt\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-48mt\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-48mt\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-64mt\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-64mt\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-80mt\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-80mt\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-128mt\\/e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-128mt\\/e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-16mt\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-16mt\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-16mr\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-16mr\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-32mr\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-32mr\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-48mr\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-48mr\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-64mr\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-64mr\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-80mr\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-80mr\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-128mr\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-128mr\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-16mt\\/ess_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-16mt\\/ess:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-32mt\\/ess_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-32mt\\/ess:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-48mt\\/ess_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-48mt\\/ess:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-64mt\\/ess_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-64mt\\/ess:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-80mt\\/ess_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-80mt\\/ess:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-128mt\\/ess_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-128mt\\/ess:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-16mt\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-16mt\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-32mt\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-32mt\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-48mt\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-48mt\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-64mt\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-64mt\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-80mt\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-80mt\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-128mt\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-128mt\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-16mr\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-16mr\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-32mr\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-32mr\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-48mr\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-48mr\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-64mr\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-64mr\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-80mr\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-80mr\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-128mr\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-128mr\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-16mt\\/dss_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-16mt\\/dss:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-32mt\\/dss_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-32mt\\/dss:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-48mt\\/dss_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-48mt\\/dss:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-64mt\\/dss_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-64mt\\/dss:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-80mt\\/dss_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-80mt\\/dss:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-128mt\\/dss_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-128mt\\/dss:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-32mr\\/ua1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-32mr\\/ua1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-64mr\\/ua1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-64mr\\/ua1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-32ms\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-32ms\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-64ms\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-64ms\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-16mt\\/es-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-16mt\\/es-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-32mt\\/es-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-32mt\\/es-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-48mt\\/es-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-48mt\\/es-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-64mt\\/es-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-64mt\\/es-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-80mt\\/es-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-80mt\\/es-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-128mt\\/es-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-128mt\\/es-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-16mr\\/es-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-16mr\\/es-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-32mr\\/es-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-32mr\\/es-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-48mr\\/es-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-48mr\\/es-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-64mr\\/es-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-64mr\\/es-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-80mr\\/es-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-80mr\\/es-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-128mr\\/es-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-128mr\\/es-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3uc-16mt\\/d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3uc-16mt\\/d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3uc-32mt\\/d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3uc-32mt\\/d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3uc-64mt\\/d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3uc-64mt\\/d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3uc-96mt\\/d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3uc-96mt\\/d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3uc-16mt\\/dss_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3uc-16mt\\/dss:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3uc-32mt\\/dss_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3uc-32mt\\/dss:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3uc-64mt\\/dss_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3uc-64mt\\/dss:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3uc-96mt\\/dss_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3uc-96mt\\/dss:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3uc-16mr\\/d-t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3uc-16mr\\/d-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3uc-16mr\\/ds-t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3uc-16mr\\/ds-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3uc-32mt-lt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3uc-32mt-lt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3uc-32mt-lt-2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3uc-32mt-lt-2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3uc-16mt\\/d-p4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3uc-16mt\\/d-p4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3uc-16mt\\/dss-p4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3uc-16mt\\/dss-p4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-14mt\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-14mt\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-24mt\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-24mt\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-40mt\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-40mt\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-60mt\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-60mt\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-14mr\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-14mr\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-24mr\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-24mr\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-40mr\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-40mr\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-60mr\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-60mr\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-14mt\\/ess_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-14mt\\/ess:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-24mt\\/ess_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-24mt\\/ess:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-40mt\\/ess_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-40mt\\/ess:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-60mt\\/ess_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-60mt\\/ess:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-14mt\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-14mt\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-24mt\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-24mt\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-40mt\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-40mt\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-60mt\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-60mt\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-14mr\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-14mr\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-24mr\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-24mr\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-40mr\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-40mr\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-60mr\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-60mr\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-14mt\\/dss_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-14mt\\/dss:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-24mt\\/dss_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-24mt\\/dss:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-40mt\\/dss_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-40mt\\/dss:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-60mt\\/dss_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-60mt\\/dss:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-14mt\\/es-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-14mt\\/es-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-24mt\\/es-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-24mt\\/es-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-40mt\\/es-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-40mt\\/es-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-60mt\\/es-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-60mt\\/es-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-14mr\\/es-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-14mr\\/es-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-24mr\\/es-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-24mr\\/es-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-40mr\\/es-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-40mr\\/es-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3g-60mr\\/es-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3g-60mr\\/es-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3gc-32mt\\/d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3gc-32mt\\/d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3gc-32mt\\/dss_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3gc-32mt\\/dss:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3ge-24mt\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3ge-24mt\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3ge-40mt\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3ge-40mt\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3ge-24mr\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3ge-24mr\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3ge-40mr\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3ge-40mr\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3ge-24mt\\/ess_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3ge-24mt\\/ess:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3ge-40mt\\/ess_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3ge-40mt\\/ess:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3ge-24mt\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3ge-24mt\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3ge-40mt\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3ge-40mt\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3ge-24mr\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3ge-24mr\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3ge-40mr\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3ge-40mr\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3ge-24mt\\/dss_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3ge-24mt\\/dss:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3ge-40mt\\/dss_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3ge-40mt\\/dss:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3ga-24mt-cm_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3ga-24mt-cm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3ga-40mt-cm_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3ga-40mt-cm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3ga-60mt-cm_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3ga-60mt-cm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3ga-24mr-cm_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3ga-24mr-cm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3ga-40mr-cm_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3ga-40mr-cm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3ga-60mr-cm_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3ga-60mr-cm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3s-10mt\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3s-10mt\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3s-14mt\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3s-14mt\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3s-20mt\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3s-20mt\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3s-30mt\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3s-30mt\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3s-10mr\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3s-10mr\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3s-14mr\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3s-14mr\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3s-20mr\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3s-20mr\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3s-30mr\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3s-30mr\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3s-10mt\\/ess_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3s-10mt\\/ess:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3s-14mt\\/ess_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3s-14mt\\/ess:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3s-20mt\\/ess_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3s-20mt\\/ess:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3s-30mt\\/ess_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3s-30mt\\/ess:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3s-10mt\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3s-10mt\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3s-14mt\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3s-14mt\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3s-20mt\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3s-20mt\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3s-30mt\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3s-30mt\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3s-10mr\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3s-10mr\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3s-14mr\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3s-14mr\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3s-20mr\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3s-20mr\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3s-30mr\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3s-30mr\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3s-10mt\\/dss_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3s-10mt\\/dss:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3s-14mt\\/dss_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3s-14mt\\/dss:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3s-20mt\\/dss_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3s-20mt\\/dss:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3s-30mt\\/dss_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3s-30mt\\/dss:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3s-30mt\\/es-2ad_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3s-30mt\\/es-2ad:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3s-30mr\\/es-2ad_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3s-30mr\\/es-2ad:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3s-30mt\\/ess-2ad_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3s-30mt\\/ess-2ad:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3sa-10mt-cm_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3sa-10mt-cm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3sa-14mt-cm_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3sa-14mt-cm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3sa-20mt-cm_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3sa-20mt-cm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3sa-30mt-cm_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3sa-30mt-cm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3sa-10mr-cm_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3sa-10mr-cm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3sa-14mr-cm_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3sa-14mr-cm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3sa-20mr-cm_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3sa-20mr-cm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3sa-30mr-cm_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3sa-30mr-cm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5u-32mt\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5u-32mt\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5u-64mt\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5u-64mt\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5u-80mt\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5u-80mt\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5u-32mr\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5u-32mr\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5u-64mr\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5u-64mr\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5u-80mr\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5u-80mr\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5u-32mt\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5u-32mt\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5u-64mt\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5u-64mt\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5u-80mt\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5u-80mt\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5u-32mr\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5u-32mr\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5u-64mr\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5u-64mr\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5u-80mr\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5u-80mr\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5u-32mt\\/ess_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5u-32mt\\/ess:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5u-64mt\\/ess_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5u-64mt\\/ess:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5u-80mt\\/ess_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5u-80mt\\/ess:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5u-32mt\\/dss_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5u-32mt\\/dss:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5u-64mt\\/dss_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5u-64mt\\/dss:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5u-80mt\\/dss_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5u-80mt\\/dss:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uc-32mt\\/d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uc-32mt\\/d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uc-64mt\\/d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uc-64mt\\/d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uc-96mt\\/d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uc-96mt\\/d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uc-32mt\\/dss_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uc-32mt\\/dss:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uc-64mt\\/dss_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uc-64mt\\/dss:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uc-96mt\\/dss_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uc-96mt\\/dss:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uc-32mt\\/ds-ts_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uc-32mt\\/ds-ts:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uc-32mt\\/dss-ts_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uc-32mt\\/dss-ts:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uc-32mr\\/ds-ts_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uc-32mr\\/ds-ts:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uj-24mt\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uj-24mt\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uj-40mt\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uj-40mt\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uj-60mt\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uj-60mt\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uj-24mr\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uj-24mr\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uj-40mr\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uj-40mr\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uj-60mr\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uj-60mr\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uj-24mt\\/ess_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uj-24mt\\/ess:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uj-40mt\\/ess_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uj-40mt\\/ess:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uj-60mt\\/ess_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uj-60mt\\/ess:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uj-24mt\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uj-24mt\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uj-40mt\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uj-40mt\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uj-60mt\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uj-60mt\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uj-24mr\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uj-24mr\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uj-40mr\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uj-40mr\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uj-60mr\\/ds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uj-60mr\\/ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uj-24mt\\/dss_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uj-24mt\\/dss:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uj-40mt\\/dss_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uj-40mt\\/dss:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uj-60mt\\/dss_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uj-60mt\\/dss:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uj-24mt\\/es-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uj-24mt\\/es-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uj-40mt\\/es-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uj-40mt\\/es-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uj-60mt\\/es-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uj-60mt\\/es-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uj-24mr\\/es-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uj-24mr\\/es-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uj-40mr\\/es-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uj-40mr\\/es-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5uj-60mr\\/es-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5uj-60mr\\/es-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5s-30mt\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5s-30mt\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5s-40mt\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5s-40mt\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5s-60mt\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5s-60mt\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5s-80mt\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5s-80mt\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5s-30mr\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5s-30mr\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5s-40mr\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5s-40mr\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5s-60mr\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5s-60mr\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5s-80mr\\/es_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5s-80mr\\/es:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5s-30mt\\/ess_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5s-30mt\\/ess:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5s-40mt\\/ess_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5s-40mt\\/ess:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5s-60mt\\/ess_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5s-60mt\\/ess:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx5s-80mt\\/ess_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx5s-80mt\\/ess:-:*:*:*:*:*:*:*"
] |
GHSA-jcgx-qjj8-pgf8 | The (1) checkPasswd and (2) checkGroupXlockPasswds functions in xlockmore before 5.43 do not properly handle when a NULL value is returned upon an error by the crypt or dispcrypt function as implemented in glibc 2.17 and later, which allows attackers to bypass the screen lock via vectors related to invalid salts. | [] |
|
GHSA-67vc-4xc5-53x7 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AREOI All Bootstrap Blocks allows PHP Local File Inclusion.This issue affects All Bootstrap Blocks: from n/a through 1.3.19. | [] |
|
GHSA-3h9g-jjj6-8wgc | The ForumWP – Forum & Discussion Board plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘url’ parameter in all versions up to, and including, 2.1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] |
|
CVE-2025-32515 | WordPress Terminal Africa plugin <= 1.13.17 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in terminalafrica Terminal Africa allows Reflected XSS. This issue affects Terminal Africa: from n/a through 1.13.17. | [] |
GHSA-fg7c-85hr-w8hp | Cross-site scripting (XSS) vulnerability in the News module in Envolution allows remote attackers to inject arbitrary web script or HTML via the (1) startrow and (2) catid parameter. NOTE: this issue might be resultant from the SQL injection problem (CVE-2005-4263). | [] |
|
GHSA-w6rq-6h34-vh7q | Cached redirect poisoning via X-Forwarded-Host header | A user supplied `X-Forwarded-Host` header can be used to perform cache poisoning of a cache fronting a Ratpack server if the cache key does not include the `X-Forwarded-Host` header as a cache key.Users are only vulnerable if they do not configure a custom `PublicAddress` instance. A custom `PublicAddress` can be specified by using [ServerConfigBuilder::publicAddress](https://ratpack.io/manual/current/api/ratpack/server/ServerConfigBuilder.html#publicAddress-java.net.URI-). For versions prior to 1.9.0, by default, Ratpack utilizes an inferring version of `PublicAddress` which is vulnerable.ImpactThis can be used to perform redirect cache poisoning where an attacker can force a cached redirect to redirect to their site instead of the intended redirect location.PatchesAs of Ratpack 1.9.0, two changes have been made that mitigate this vulnerability:The default PublicAddress implementation no longer infers the address from the request context, instead relying on the configured bind host/portRelative redirects issued by the application are no longer absolutized; they are passed through as-isWorkaroundsIn production, ensure that [ServerConfigBuilder::publicAddress](https://ratpack.io/manual/current/api/ratpack/server/ServerConfigBuilder.html#publicAddress-java.net.URI-) correctly configures the server.Referenceshttps://portswigger.net/web-security/web-cache-poisoning | [] |
GHSA-743f-m6p2-83h6 | In the Linux kernel, the following vulnerability has been resolved:riscv: mm: Fix the out of bound issue of vmemmap addressIn sparse vmemmap model, the virtual address of vmemmap is calculated as:
((struct page *)VMEMMAP_START - (phys_ram_base >> PAGE_SHIFT)).
And the struct page's va can be calculated with an offset:
(vmemmap + (pfn)).However, when initializing struct pages, kernel actually starts from the
first page from the same section that phys_ram_base belongs to. If the
first page's physical address is not (phys_ram_base >> PAGE_SHIFT), then
we get an va below VMEMMAP_START when calculating va for it's struct page.For example, if phys_ram_base starts from 0x82000000 with pfn 0x82000, the
first page in the same section is actually pfn 0x80000. During
init_unavailable_range(), we will initialize struct page for pfn 0x80000
with virtual address ((struct page *)VMEMMAP_START - 0x2000), which is
below VMEMMAP_START as well as PCI_IO_END.This commit fixes this bug by introducing a new variable
'vmemmap_start_pfn' which is aligned with memory section size and using
it to calculate vmemmap address instead of phys_ram_base. | [] |
|
GHSA-mc6p-vg7m-2x3q | In Knowage through 6.1.1, there is XSS via the start_url or user_id field to the ChangePwdServlet page. | [] |
|
GHSA-4c37-7m5h-c8m9 | Apache Felix Webconsole: XSS in services console | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Felix Webconsole.This issue affects Apache Felix Webconsole 4.x up to 4.9.8 and 5.x up to 5.0.8.Users are recommended to upgrade to version 4.9.10 or 5.0.10 or higher, which fixes the issue. | [] |
GHSA-q6vr-pm5m-w6c6 | The project import/export feature in GitLab 8.9 and greater could be used to obtain otherwise private email addresses | [] |
|
GHSA-79mp-9mjj-qfv3 | Unsafe Parsing of a PNG tRNS chunk in FastStone Image Viewer through 7.5 results in a stack buffer overflow. | [] |
|
GHSA-w3jq-67c5-3rfj | On sites that also had the Elementor plugin for WordPress installed, it was possible for users with the edit_posts capability, which includes Contributor-level users, to import blocks onto any page using the astra-page-elementor-batch-process AJAX action. An attacker could craft and host a block containing malicious JavaScript on a server they controlled, and then use it to overwrite any post or page by sending an AJAX request with the action set to astra-page-elementor-batch-process and the url parameter pointed to their remotely-hosted malicious block, as well as an id parameter containing the post or page to overwrite. Any post or page that had been built with Elementor, including published pages, could be overwritten by the imported block, and the malicious JavaScript in the imported block would then be executed in the browser of any visitors to that page. | [] |
|
GHSA-mmr9-p6pg-2mp3 | A vulnerability in the CLI of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, local attacker to gain privileges of the root user on the underlying operating system.This vulnerability is due to insufficient input validation. An authenticated attacker with read-only privileges on the SD-WAN Manager system could exploit this vulnerability by sending a crafted request to the CLI of the SD-WAN Manager. A successful exploit could allow the attacker to gain root privileges on the underlying operating system. | [] |
|
CVE-2024-47518 | Specially constructed queries targeting ETM could discover active remote access sessions | Specially constructed queries targeting ETM could discover active remote access sessions | [] |
GHSA-w7xh-7rjh-xqj4 | GetXXX method SQL injection remote code execution (RCE) vulnerabilities in Trend Micro Control Manager 6.0 could allow a remote attacker to execute arbitrary code on vulnerable installations. | [] |
|
GHSA-5vh9-p65r-w95h | Use-after-free vulnerability in the mozilla::dom::workers::WorkerPrivateParent function in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors. | [] |
|
CVE-2024-10617 | Tongda OA check_seal.php sql injection | A vulnerability classified as critical was found in Tongda OA up to 11.10. This vulnerability affects unknown code of the file /pda/workflow/check_seal.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:tongda:oa_2017:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tongda2000:office_anywhere:*:*:*:*:*:*:*:*"
] |
GHSA-85p3-g932-hx25 | A race condition in the Twilio Authy 2-Factor Authentication application before 24.3.7 for Android allows a user to potentially approve/deny an access request prior to unlocking the application with a PIN on older Android devices (effectively bypassing the PIN requirement). | [] |
|
GHSA-8wx2-h54g-674g | On F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.2, or 11.2.1-11.6.3.1, Enterprise Manager 3.1.1, BIG-IQ Centralized Management 5.0.0-5.4.0 or 4.6.0, BIG-IQ Cloud and Orchestration 1.0.0, or F5 iWorkflow 2.0.2-2.3.0, authenticated users granted TMOS Shell (tmsh) access can access objects on the file system which would normally be disallowed by tmsh restrictions. This allows for authenticated, low privileged attackers to exfiltrate objects on the file system which should not be allowed. | [] |
|
CVE-2023-3922 | URL Redirection to Untrusted Site ('Open Redirect') in GitLab | An issue has been discovered in GitLab affecting all versions starting from 8.15 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible to hijack some links and buttons on the GitLab UI to a malicious page. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:16.4.0:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:16.4.0:*:*:*:enterprise:*:*:*"
] |
CVE-2015-3831 | Buffer overflow in the readAt function in BpMediaHTTPConnection in media/libmedia/IMediaHTTPConnection.cpp in the mediaserver service in Android before 5.1.1 LMY48I allows attackers to execute arbitrary code via a crafted application, aka internal bug 19400722. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] |
|
GHSA-6723-3r89-pw82 | In the Linux kernel, the following vulnerability has been resolved:staging: bcm2835-camera: Initialise dev in v4l2_devCommit 42a2f6664e18 ("staging: vc04_services: Move global g_state to
vchiq_state") changed mmal_init to pass dev->v4l2_dev.dev to
vchiq_mmal_init, however nothing iniitialised dev->v4l2_dev, so we got
a NULL pointer dereference.Set dev->v4l2_dev.dev during bcm2835_mmal_probe. The device pointer
could be passed into v4l2_device_register to set it, however that also
has other effects that would need additional changes. | [] |
|
GHSA-624j-wgxh-4x2w | Possible buffer overflow due to lack of range check while processing a DIAG command for COEX management in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables | [] |
|
CVE-2023-0773 | Unauthorized Access Control Vulnerability in Uniview IP Camera | The vulnerability exists in Uniview IP Camera due to identification and authentication failure at its web-based management interface. A remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable device.
Successful exploitation of this vulnerability could allow the attacker to gain complete control of the targeted device.
| [
"cpe:2.3:h:uniview:ip_camera_ipc322lb-sf28-a:*:*:*:*:*:*:*:*",
"cpe:2.3:o:uniview:ipc322lb-sf28-a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:uniview:ipc322lb-sf28-a:-:*:*:*:*:*:*:*"
] |
CVE-2006-3459 | Multiple stack-based buffer overflows in the TIFF library (libtiff) before 3.8.2, as used in Adobe Reader 9.3.0 and other products, allow context-dependent attackers to execute arbitrary code or cause a denial of service via unspecified vectors, including a large tdir_count value in the TIFFFetchShortPair function in tif_dirread.c. | [
"cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:beta18:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:beta24:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:beta28:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:beta29:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:beta31:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:beta32:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:beta34:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:beta35:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:beta36:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:beta37:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.6:beta:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.7:alpha:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.7:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.7:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.7:alpha4:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.7:beta:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.6.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.7.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.7.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.7.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.0:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.