Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
GHSA-wq5q-28hc-6vmg
Apple Safari Beta 3.0.1 for Windows allows remote attackers to execute arbitrary commands via shell metacharacters in a URI in the SRC of an IFRAME, as demonstrated using a gopher URI.
[]
GHSA-x3v8-g92v-wp97
Visual Basic for Applications Information Disclosure Vulnerability
[]
GHSA-pv9j-f2mw-rm75
Animate versions 24.0.2, 23.0.5 and earlier Answer: are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
CVE-2024-20052
In flashc, there is a possible information disclosure due to an uncaught exception. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541757; Issue ID: ALPS08541761.
[]
CVE-2007-2187
Stack-based buffer overflow in eXtremail 2.1.1 and earlier allows remote attackers to execute arbitrary code via a long DNS response. NOTE: this might be related to CVE-2006-6926.
[ "cpe:2.3:a:extremail:extremail:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:extremail:extremail:2.1.1:*:*:*:*:*:*:*" ]
GHSA-jfc5-x82h-wvpp
Apple Safari 4.0.3 does not properly block javascript: and data: URIs in Refresh headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header that contains a javascript: URI, (2) entering a javascript: URI when specifying the content of a Refresh header, (3) injecting a Refresh header that contains JavaScript sequences in a data:text/html URI, or (4) entering a data:text/html URI with JavaScript sequences when specifying the content of a Refresh header.
[]
CVE-2001-0423
Buffer overflow in ipcs in Solaris 7 x86 allows local users to execute arbitrary code via a long TZ (timezone) environmental variable, a different vulnerability than CAN-2002-0093.
[ "cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*" ]
CVE-2018-0493
remctld in remctl before 3.14, when an attacker is authorized to execute a command that uses the sudo option, has a use-after-free that leads to a daemon crash, memory corruption, or arbitrary command execution.
[ "cpe:2.3:a:eyrie:remctl:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
GHSA-2wmv-xp85-m57j
In bt driver, there is a thread competition leads to early release of resources to be accessed. This could lead to local denial of service in kernel.
[]
CVE-2024-35431
ZKTeco ZKBio CVSecurity 6.1.1 is vulnerable to Directory Traversal via photoBase64. An unauthenticated user can download local files from the server.
[ "cpe:2.3:a:zkteco:zkbio_cvsecurity:6.11:*:*:*:*:*:*:*" ]
CVE-2014-8668
SQL injection vulnerability in SAP Contract Accounting allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[ "cpe:2.3:a:sap:contract_accounting:-:*:*:*:*:*:*:*" ]
CVE-2019-14204
An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_umountall_reply.
[ "cpe:2.3:a:denx:u-boot:*:*:*:*:*:*:*:*" ]
CVE-2024-37536
WordPress Easy Custom Code (LESS/CSS/JS) Plugin <= 1.0.8 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Web357 Easy Custom Code (LESS/CSS/JS) – Live editing allows Stored XSS.This issue affects Easy Custom Code (LESS/CSS/JS) – Live editing: from n/a through 1.0.8.
[ "cpe:2.3:a:web357:easy_custom_code:*:*:*:*:*:wordpress:*:*" ]
GHSA-2hff-34p4-2jhh
In bta_scan_results_cb_impl of btif_ble_scanner.cc, there is possible resource exhaustion if a large number of repeated BLE scan results are received. This could lead to a remote denial of service of a critical system process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 8.0. Android ID: A-65174158.
[]
CVE-2019-8130
A SQL injection vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. A user with store manipulation privileges can execute arbitrary SQL queries by getting access to the database connection through group instance in email templates.
[ "cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*", "cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*", "cpe:2.3:a:magento:magento:2.3.2:-:*:*:commerce:*:*:*", "cpe:2.3:a:magento:magento:2.3.2:-:*:*:open_source:*:*:*" ]
GHSA-65jc-w8gm-x2mq
Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug before 0.8.8.2 allows remote attackers to execute arbitrary code via a crafted S3M file.
[]
GHSA-8v7x-8cw9-9c5c
Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g, when the TLS server name extensions are enabled, allows remote attackers to cause a denial of service (crash) via a malformed Client Hello packet. NOTE: some of these details are obtained from third party information.
[]
CVE-2011-3729
dotproject 2.1.4 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by style/dp-grey-theme/footer.php and certain other files.
[ "cpe:2.3:a:dotproject:dotproject:2.1.4:*:*:*:*:*:*:*" ]
CVE-2012-4538
The HVMOP_pagetable_dying hypercall in Xen 4.0, 4.1, and 4.2 does not properly check the pagetable state when running on shadow pagetables, which allows a local HVM guest OS to cause a denial of service (hypervisor crash) via unspecified vectors.
[ "cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*" ]
CVE-2011-2738
Multiple unspecified vulnerabilities in Cisco Unified Service Monitor before 8.6, as used in Unified Operations Manager before 8.6 and CiscoWorks LAN Management Solution 3.x and 4.x before 4.1; and multiple EMC Ionix products including Application Connectivity Monitor (Ionix ACM) 2.3 and earlier, Adapter for Alcatel-Lucent 5620 SAM EMS (Ionix ASAM) 3.2.0.2 and earlier, IP Management Suite (Ionix IP) 8.1.1.1 and earlier, and other Ionix products; allow remote attackers to execute arbitrary code via crafted packets to TCP port 9002, aka Bug IDs CSCtn42961 and CSCtn64922, related to a buffer overflow.
[ "cpe:2.3:a:cisco:unified_service_monitor:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_service_monitor:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_service_monitor:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_service_monitor:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_service_monitor:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_service_monitor:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_service_monitor:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_service_monitor:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ciscoworks_lan_management_solution:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ciscoworks_lan_management_solution:3.0:december_2007:*:*:*:*:*:*", "cpe:2.3:a:cisco:ciscoworks_lan_management_solution:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ciscoworks_lan_management_solution:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ciscoworks_lan_management_solution:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ciscoworks_lan_management_solution:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_operations_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_operations_manager:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_operations_manager:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_operations_manager:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_operations_manager:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_operations_manager:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_operations_manager:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_operations_manager:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_operations_manager:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_operations_manager:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_operations_manager:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:emc:ionix_acm:*:*:*:*:*:*:*:*", "cpe:2.3:a:emc:ionix_asam:*:*:*:*:*:*:*:*", "cpe:2.3:a:emc:ionix_ip:*:*:*:*:*:*:*:*" ]
CVE-2020-25200
Pritunl 1.29.2145.25 allows attackers to enumerate valid VPN usernames via a series of /auth/session login attempts. Initially, the server will return error 401. However, if the username is valid, then after 20 login attempts, the server will start responding with error 400. Invalid usernames will receive error 401 indefinitely. Note: This has been disputed by the vendor as not a vulnerability. They argue that this is an intended design
[ "cpe:2.3:a:pritunl:pritunl:1.29.2145.25:*:*:*:*:*:*:*" ]
GHSA-35hc-96mm-v6rf
An issue was discovered in Phalcon Eye through 0.4.1. The vulnerability exists due to insufficient filtration of user-supplied data in multiple HTTP GET parameters passed to the "phalconeye-master/public/external/pydio/plugins/editor.webodf/frame.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
[]
CVE-2015-9294
The all-in-one-wp-security-and-firewall plugin before 3.9.5 for WordPress has XSS in add_query_arg and remove_query_arg function instances.
[ "cpe:2.3:a:tipsandtricks-hq:all_in_one_wp_security_\\&_firewall:*:*:*:*:*:wordpress:*:*" ]
GHSA-c976-3hhm-7m57
The Firebird/Interbase dissector in Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of service (infinite loop or crash) via unknown vectors.
[]
GHSA-x6g9-g4wf-qrf7
Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant to only to be executed as CGI.Users are recommended to upgrade to version 2.4.60, which fixes this issue.Some RewriteRules that capture and substitute unsafely will now fail unless rewrite flag "UnsafeAllow3F" is specified.
[]
GHSA-8jmr-mx2q-g3m8
Out-of-bounds read vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may affect service confidentiality.
[]
GHSA-hrmc-jmp7-mpm2
H2O.ai H2O through 3.46.0.4 allows attackers to arbitrarily set the JDBC URL, leading to deserialization attacks, file reads, and command execution. Exploitation can occur when an attacker has access to post to the ImportSQLTable URI with a JSON document containing a connection_url property with any typical JDBC Connection URL attack payload such as one that uses queryInterceptors.
[]
CVE-2024-53193
clk: clk-loongson2: Fix memory corruption bug in struct loongson2_clk_provider
In the Linux kernel, the following vulnerability has been resolved: clk: clk-loongson2: Fix memory corruption bug in struct loongson2_clk_provider Some heap space is allocated for the flexible structure `struct clk_hw_onecell_data` and its flexible-array member `hws` through the composite structure `struct loongson2_clk_provider` in function `loongson2_clk_probe()`, as shown below: 289 struct loongson2_clk_provider *clp; ... 296 for (p = data; p->name; p++) 297 clks_num++; 298 299 clp = devm_kzalloc(dev, struct_size(clp, clk_data.hws, clks_num), 300 GFP_KERNEL); Then some data is written into the flexible array: 350 clp->clk_data.hws[p->id] = hw; This corrupts `clk_lock`, which is the spinlock variable immediately following the `clk_data` member in `struct loongson2_clk_provider`: struct loongson2_clk_provider { void __iomem *base; struct device *dev; struct clk_hw_onecell_data clk_data; spinlock_t clk_lock; /* protect access to DIV registers */ }; The problem is that the flexible structure is currently placed in the middle of `struct loongson2_clk_provider` instead of at the end. Fix this by moving `struct clk_hw_onecell_data clk_data;` to the end of `struct loongson2_clk_provider`. Also, add a code comment to help prevent this from happening again in case new members are added to the structure in the future. This change also fixes the following -Wflex-array-member-not-at-end warning: drivers/clk/clk-loongson2.c:32:36: warning: structure containing a flexible array member is not at the end of another structure [-Wflex-array-member-not-at-end]
[]
CVE-2020-20508
Shopkit v2.7 contains a reflective cross-site scripting (XSS) vulnerability in the /account/register component, which allows attackers to hijack user credentials via a crafted payload in the E-Mail text field.
[ "cpe:2.3:a:shopkit_project:shopkit:2.7:*:*:*:*:*:*:*" ]
GHSA-cg8x-876m-56f7
Integer overflow in KmxSbx.sys 6.2.0.22 in CA Internet Security Suite Plus 2010 allows local users to cause a denial of service (pool corruption) and execute arbitrary code via crafted arguments to the 0x88000080 IOCTL, which triggers a buffer overflow.
[]
CVE-2024-46054
OpenVidReview 1.0 is vulnerable to Incorrect Access Control. The /upload route is accessible without authentication, allowing any user to upload files.
[ "cpe:2.3:a:openvidreview_project:openvidreview:1.0:*:*:*:*:*:*:*" ]
GHSA-3q8w-82vq-p7rq
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: ISO: Check socket flag instead of hconThis fixes the following Smatch static checker warning:net/bluetooth/iso.c:1364 iso_sock_recvmsg() error: we previously assumed 'pi->conn->hcon' could be null (line 1359)net/bluetooth/iso.c 1347 static int iso_sock_recvmsg(struct socket *sock, struct msghdr *msg, 1348 size_t len, int flags) 1349 { 1350 struct sock *sk = sock->sk; 1351 struct iso_pinfo *pi = iso_pi(sk); 1352 1353 BT_DBG("sk %p", sk); 1354 1355 if (test_and_clear_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) { 1356 lock_sock(sk); 1357 switch (sk->sk_state) { 1358 case BT_CONNECT2: 1359 if (pi->conn->hcon && ^^^^^^^^^^^^^^ If ->hcon is NULL1360 test_bit(HCI_CONN_PA_SYNC, &pi->conn->hcon->flags)) { 1361 iso_conn_big_sync(sk); 1362 sk->sk_state = BT_LISTEN; 1363 } else { --> 1364 iso_conn_defer_accept(pi->conn->hcon); ^^^^^^^^^^^^^^ then we're toast1365 sk->sk_state = BT_CONFIG; 1366 } 1367 release_sock(sk); 1368 return 0; 1369 case BT_CONNECTED: 1370 if (test_bit(BT_SK_PA_SYNC,
[]
CVE-2018-8020
Apache Tomcat Native 1.2.0 to 1.2.16 and 1.1.23 to 1.1.34 has a flaw that does not properly check OCSP pre-produced responses, which are lists (multiple entries) of certificate statuses. Subsequently, revoked client certificates may not be properly identified, allowing for users to authenticate with revoked certificates to connections that require mutual TLS. Users not using OCSP checks are not affected by this vulnerability.
[ "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat_native:*:*:*:*:*:*:*:*" ]
GHSA-75rq-26mw-g7fp
TOTOlink A7100RU V7.4cu.2313_B20191024 was discovered to contain a command injection vulnerability via the FileName parameter in the setting/setOpenVpnCertGenerationCfg function.
[]
GHSA-c3jp-9rg8-8vx4
Buffer overflow in the Microsoft Office MSODataSourceControl ActiveX object allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the DeleteRecordSourceIfUnused method.
[]
CVE-2022-28101
Turtlapp Turtle Note v0.7.2.6 does not filter the <meta> tag during markdown parsing, allowing attackers to execute HTML injection.
[ "cpe:2.3:a:lyonbros:turtl:0.7.2.6:*:*:*:-:android:*:*", "cpe:2.3:a:lyonbros:turtl:0.7.2.6:*:*:*:-:ios:*:*" ]
CVE-2016-6884
TLS cipher suites with CBC mode in TLS 1.1 and 1.2 in MatrixSSL before 3.8.3 allow remote attackers to cause a denial of service (out-of-bounds read) via a crafted message.
[ "cpe:2.3:a:matrixssl:matrixssl:*:*:*:*:*:*:*:*" ]
GHSA-9cr4-jvh8-pr25
A Cross-Site Scripting (XSS) issue was discovered in webpagetest 3.0. The vulnerability exists due to insufficient filtration of user-supplied data (bgcolor) passed to the webpagetest-master/www/video/view.php URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
[]
GHSA-pcfp-7jjr-h74h
An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server.
[]
GHSA-4p8m-v8wq-rq77
Emlog pro v1.1.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the component /admin/configure.php via the parameter footer_info.
[]
CVE-2025-25896
A buffer overflow vulnerability was discovered in D-Link DSL-3782 v1.01 via the destination, netmask, and gateway parameters. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet.
[]
GHSA-8w5q-5fpq-v4pm
usememos/memos Cross-site Scripting vulnerability
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1.
[]
GHSA-g8w3-6gm2-8f4h
The Widget Shortcode WordPress plugin through 0.3.5 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
[]
CVE-2020-24604
A Reflected XSS vulnerability was discovered in Ignite Realtime Openfire version 4.5.1. The XSS vulnerability allows remote attackers to inject arbitrary web script or HTML via the GET request "searchName", "searchValue", "searchDescription", "searchDefaultValue","searchPlugin", "searchDescription" and "searchDynamic" in server-properties.jsp and security-audit-viewer.jsp
[ "cpe:2.3:a:igniterealtime:openfire:4.5.1:*:*:*:*:*:*:*" ]
CVE-2023-0811
Omron CJ1M unit v4.0 and prior has improper access controls on the memory region where the UM password is stored. If an adversary issues a PROGRAM AREA WRITE command to a specific memory region, they could overwrite the password. This may lead to disabling UM protections or setting a non-ASCII password (non-keyboard characters) and preventing an engineer from viewing or modifying the user program.
[ "cpe:2.3:o:omron:sysmac_cj2h-cpu64_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2h-cpu64:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2h-cpu64-eip_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2h-cpu64-eip:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2h-cpu65_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2h-cpu65:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2h-cpu65-eip_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2h-cpu65-eip:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2h-cpu66_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2h-cpu66:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2h-cpu66-eip_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2h-cpu66-eip:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2h-cpu67_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2h-cpu67:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2h-cpu67-eip_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2h-cpu67-eip:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2h-cpu68_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2h-cpu68:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2h-cpu68-eip_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2h-cpu68-eip:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2m-cpu11_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2m-cpu11:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2m-cpu12_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2m-cpu12:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2m-cpu13_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2m-cpu13:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2m-cpu14_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2m-cpu14:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2m-cpu15_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2m-cpu15:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2m-cpu31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2m-cpu31:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2m-cpu32_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2m-cpu32:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2m-cpu33_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2m-cpu33:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2m-cpu34_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2m-cpu34:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2m-cpu35_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2m-cpu35:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-e10dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-e10dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-e10dr-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-e10dr-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-e10dt-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-e10dt-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-e10dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-e10dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-e10dt1-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-e10dt1-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-e10dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-e10dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-e14dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-e14dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-e14sdr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-e14sdr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-e20dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-e20dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-e20sdr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-e20sdr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-e30dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-e30dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-e30sdr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-e30sdr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-e40dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-e40dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-e40sdr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-e40sdr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-e60sdr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-e60sdr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-na20dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-na20dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-na20dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-na20dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-na20dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-na20dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1h-x40dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1h-x40dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1h-x40dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1h-x40dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1h-x40dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1h-x40dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1h-xa40dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1h-xa40dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1h-xa40dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1h-xa40dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1h-xa40dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1h-xa40dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1h-y20dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1h-y20dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-el20dr-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-el20dr-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-em30dr-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-em30dr-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-em30dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-em30dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-em30dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-em30dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-em40dr-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-em40dr-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-em40dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-em40dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-em40dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-em40dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-l10dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-l10dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-l10dr-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-l10dr-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-l10dt-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-l10dt-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-l10dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-l10dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-l10dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-l10dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-l14dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-l14dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-l14dr-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-l14dr-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-l14dt-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-l14dt-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-l14dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-l14dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-l14dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-l14dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-l20dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-l20dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-l20dr-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-l20dr-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-l20dt-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-l20dt-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-l20dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-l20dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-l20dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-l20dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-m30dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-m30dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-m30dr-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-m30dr-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-m30dt-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-m30dt-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-m30dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-m30dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-m30dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-m30dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-m40dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-m40dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-m40dr-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-m40dr-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-m40dt-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-m40dt-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-m40dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-m40dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-m40dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-m40dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-m60dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-m60dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-m60dr-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-m60dr-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-m60dt-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-m60dt-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-m60dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-m60dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-m60dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-m60dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-e14dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-e14dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-e20dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-e20dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-e30dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-e30dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-e40dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-e40dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-e60dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-e60dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n14dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n14dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n14dr-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n14dr-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n14dt-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n14dt-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n14dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n14dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n14dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n14dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n20dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n20dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n20dr-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n20dr-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n20dt-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n20dt-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n20dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n20dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n20dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n20dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n30dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n30dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n30dr-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n30dr-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n30dt-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n30dt-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n30dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n30dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n30dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n30dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n40dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n40dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n40dr-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n40dr-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n40dt-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n40dt-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n40dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n40dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n40dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n40dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n60dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n60dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n60dr-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n60dr-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n60dt-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n60dt-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n60dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n60dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n60dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n60dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-s30dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-s30dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-s30dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-s30dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-s30dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-s30dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-s40dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-s40dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-s40dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-s40dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-s40dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-s40dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-s60dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-s60dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-s60dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-s60dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-s60dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-s60dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cs1w-drm21-v1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cs1w-drm21-v1:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cs1w-eip21_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cs1w-eip21:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cs1w-etn21_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cs1w-etn21:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cs1w-fln22_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cs1w-fln22:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cs1w-nc\\[\\]71_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cs1w-nc\\[\\]71:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cs1w-spu01-v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cs1w-spu01-v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cs1w-spu02-v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cs1w-spu02-v2:-:*:*:*:*:*:*:*" ]
GHSA-fppw-cm5c-3hfp
The Exchange Support component in Apple iPhone OS before 3.1, and iPhone OS before 3.1.1 for iPod touch, does not properly implement the "Maximum inactivity time lock" functionality, which allows local users to bypass intended Microsoft Exchange restrictions by choosing a large Require Passcode time value.
[]
GHSA-w3rc-2whg-w934
Mingsoft MCMS SQL injection vulnerability in /mdiy/model/delete URI via models List
Mingsoft MCMS 5.2.8 was discovered to contain a SQL injection vulnerability in /mdiy/model/delete URI via models Lists.
[]
GHSA-vmvc-m45v-29vq
The Internet Key Exchange version 1 (IKEv1) implementation in Avaya VSU 100, 2000, 7500, 10000, and CSU 5000, when running IPSec, allows remote attackers to cause a denial of service (crash) via certain IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the lack of details in the advisory, it is unclear which of CVE-2005-3666, CVE-2005-3667, and/or CVE-2005-3668 this issue applies to.
[]
GHSA-qg75-vrpw-cgq6
The Language Translate Widget for WordPress – ConveyThis plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'api_key’ parameter in all versions up to, and including, 223 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
GHSA-cw24-qhxr-6g89
Directory traversal vulnerability in Jeuce Personal Web Server 2.13 allows remote attackers to read arbitrary files via a .. (dot dot) in the URL.
[]
CVE-2022-23006
Buffer Overflow Vulnerability in Western Digital My Cloud Home Products and SanDisk ibi
A stack-based buffer overflow vulnerability was found on Western Digital My Cloud Home, My Cloud Home Duo, and SanDisk ibi that could allow an attacker accessing the system locally to read information from /etc/version file. This vulnerability can only be exploited by chaining it with another issue. If an attacker is able to carry out a remote code execution attack, they can gain access to the vulnerable file, due to the presence of insecure functions in code. User interaction is required for exploitation. Exploiting the vulnerability could result in exposure of information, ability to modify files, memory access errors, or system crashes.
[ "cpe:2.3:o:westerndigital:my_cloud_home_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:my_cloud_home:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:my_cloud_home_duo_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:my_cloud_home_duo:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_ibi_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_ibi:-:*:*:*:*:*:*:*" ]
CVE-2010-4615
Multiple SQL injection vulnerabilities in Oto Galeri Sistemi 1.0 allow remote attackers to execute arbitrary SQL commands via the (1) arac parameter to carsdetail.asp and the (2) marka parameter to twohandscars.asp.
[ "cpe:2.3:a:iskenderaltuntas:oto_galeri_sistemi:1.0:*:*:*:*:*:*:*" ]
CVE-2024-1078
The Quiz Maker plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ays_quick_start() and add_question_rows() functions in all versions up to, and including, 6.5.2.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to create arbitrary quizzes.
[ "cpe:2.3:a:ays-pro:quiz_maker:*:*:*:*:*:wordpress:*:*" ]
GHSA-8h32-rch7-92w4
An issue was discovered in JFrog Artifactory 6.7.3. By default, the access-admin account is used to reset the password of the admin account in case an administrator gets locked out from the Artifactory console. This is only allowable from a connection directly from localhost, but providing a X-Forwarded-For HTTP header to the request allows an unauthenticated user to login with the default credentials of the access-admin account while bypassing the whitelist of allowed IP addresses. The access-admin account can use Artifactory's API to request authentication tokens for all users including the admin account and, in turn, assume full control of all artifacts and repositories managed by Artifactory.
[]
CVE-2009-0934
Cross-site scripting (XSS) vulnerability in ejabberd before 2.0.4 allows remote attackers to inject arbitrary web script or HTML via unknown vectors related to links and MUC logs.
[ "cpe:2.3:a:process-one:ejabberd:*:*:*:*:*:*:*:*", "cpe:2.3:a:process-one:ejabberd:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:process-one:ejabberd:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:process-one:ejabberd:0.9.8:*:*:*:*:*:*:*", "cpe:2.3:a:process-one:ejabberd:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:process-one:ejabberd:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:process-one:ejabberd:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:process-one:ejabberd:1.1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:process-one:ejabberd:1.1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:process-one:ejabberd:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:process-one:ejabberd:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:process-one:ejabberd:1.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:process-one:ejabberd:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:process-one:ejabberd:2.0.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:process-one:ejabberd:2.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:process-one:ejabberd:2.0.1_2:*:*:*:*:*:*:*", "cpe:2.3:a:process-one:ejabberd:2.0.2:*:*:*:*:*:*:*" ]
CVE-2021-36260
A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.
[ "cpe:2.3:o:hikvision:ds-2cd2026g2-iu\\/sl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2026g2-iu\\/sl:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2046g2-iu\\/sl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2046g2-iu\\/sl:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2066g2-i\\(u\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2066g2-i\\(u\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2066g2-iu\\/sl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2066g2-iu\\/sl:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2086g2-i\\(u\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2086g2-i\\(u\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2086g2-iu\\/sl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2086g2-iu\\/sl:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2166g2-i\\(su\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2166g2-i\\(su\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2186g2-i\\(su\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2186g2-i\\(su\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2186g2-isu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2186g2-isu:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2326g2-isu\\/sl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2326g2-isu\\/sl:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2346g2-isu\\/sl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2346g2-isu\\/sl:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2366g2-i\\(u\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2366g2-i\\(u\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2366g2-isu\\/sl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2366g2-isu\\/sl:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2386g2-i\\(u\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2386g2-i\\(u\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2386g2-isu\\/sl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2386g2-isu\\/sl:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2426g2-i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2426g2-i:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2446g2-i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2446g2-i:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2526g2-i\\(s\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2526g2-i\\(s\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2526g2-is_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2526g2-is:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2546g2-i\\(s\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2546g2-i\\(s\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2566g2-i\\(s\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2566g2-i\\(s\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2586g2-i\\(s\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2586g2-i\\(s\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2626g2-izsu\\/sl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2626g2-izsu\\/sl:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2646g2-izsu\\/sl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2646g2-izsu\\/sl:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2666g2-izs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2666g2-izs:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2666g2-izsu\\/sl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2666g2-izsu\\/sl:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2686g2-izs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2686g2-izs:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2686g2-izsu\\/sl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2686g2-izsu\\/sl:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2766g2-izs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2766g2-izs:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2786g2-izs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2786g2-izs:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2027g2-l\\(u\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2027g2-l\\(u\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2047g2-l\\(u\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2047g2-l\\(u\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2027g2-lu\\/sl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2027g2-lu\\/sl:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2087g2-l\\(u\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2087g2-l\\(u\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2127g2-\\(-su\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2127g2-\\(-su\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2147g2-l\\(su\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2147g2-l\\(su\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2327g2-l\\(u\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2327g2-l\\(u\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2347g2-l\\(u\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2347g2-l\\(u\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2347g2-lsu\\/sl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2347g2-lsu\\/sl:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2387g2-l\\(u\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2387g2-l\\(u\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2527g2-ls_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2527g2-ls:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2547g2-ls_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2547g2-ls:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2547g2-lzs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2547g2-lzs:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2121g0-i\\(w\\)\\(s\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2121g0-i\\(w\\)\\(s\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2321g0-i\\/nf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2321g0-i\\/nf:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2421g0-i\\(d\\)\\(w\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2421g0-i\\(d\\)\\(w\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2421g0-i\\(d\\)w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2421g0-i\\(d\\)w:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2621g0-i\\(z\\)\\(s\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2621g0-i\\(z\\)\\(s\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2721g0-i\\(z\\)\\(s\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2721g0-i\\(z\\)\\(s\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2121g1-i\\(w\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2121g1-i\\(w\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2121g1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2121g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2121g1-idw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2121g1-idw:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2023g2-i\\(u\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2023g2-i\\(u\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2043g2-i\\(u\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2043g2-i\\(u\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2063g2-i\\(u\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2063g2-i\\(u\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2083g2-i\\(u\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2083g2-i\\(u\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2123g2-i\\(s\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2123g2-i\\(s\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2123g2-iu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2123g2-iu:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2143g2-i\\(s\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2143g2-i\\(s\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2143g2-iu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2143g2-iu:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2163g2-i\\(s\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2163g2-i\\(s\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2163g2-iu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2163g2-iu:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2183g2-i\\(s\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2183g2-i\\(s\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2183g2-iu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2183g2-iu:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2323g2-i\\(u\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2323g2-i\\(u\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2343g2-i\\(u\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2343g2-i\\(u\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2363g2-i\\(u\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2363g2-i\\(u\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2183g2-i\\(u\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2183g2-i\\(u\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2523g2-i\\(s\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2523g2-i\\(s\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2543g2-i\\(ws\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2543g2-i\\(ws\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2563g2-i\\(s\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2563g2-i\\(s\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2583g2-i\\(s\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2583g2-i\\(s\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2623g2-izs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2623g2-izs:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2643g2-izs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2643g2-izs:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2663g2-izs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2663g2-izs:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2683g2-izs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2683g2-izs:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2723g2-izs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2723g2-izs:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2743g2-izs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2743g2-izs:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2763g2-izs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2763g2-izs:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2783g2-izs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2783g2-izs:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3023g2-iu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3023g2-iu:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3043g2-iu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3043g2-iu:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3063g2-iu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3063g2-iu:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3123g2-i\\(s\\)u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3123g2-i\\(s\\)u:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3143g2-i\\(s\\)u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3143g2-i\\(s\\)u:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3163g2-i\\(s\\)u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3163g2-i\\(s\\)u:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3323g2-iu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3323g2-iu:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3343g2-iu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3343g2-iu:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3363g2-iu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3363g2-iu:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3523g2-is_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3523g2-is:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3543g2-is_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3543g2-is:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3563g2-is_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3563g2-is:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3623g2-izs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3623g2-izs:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3643g2-izs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3643g2-izs:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3663g2-izs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3663g2-izs:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3723g2-izs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3723g2-izs:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3743g2-izs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3743g2-izs:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3763g2-izs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3763g2-izs:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2021g1-i\\(w\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2021g1-i\\(w\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2383g2-i\\(u\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2383g2-i\\(u\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2523g2-i\\(u\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2523g2-i\\(u\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3026g2-iu\\/sl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3026g2-iu\\/sl:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3056g2iu\\/sl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3056g2iu\\/sl:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3126g2-is_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3126g2-is:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3126g2-is\\(u\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3126g2-is\\(u\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3156g2-is_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3156g2-is:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3156g2-is\\(u\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3156g2-is\\(u\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3186g2-is\\(u\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3186g2-is\\(u\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3326g2-isu\\/sl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3326g2-isu\\/sl:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3356g2-is_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3356g2-is:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3356g2-is\\(u\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3356g2-is\\(u\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3356g2-isu\\/sl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3356g2-isu\\/sl:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3386g2-is_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3386g2-is:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3386g2-is\\(u\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3386g2-is\\(u\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3526g2-is_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3526g2-is:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3556g2-is_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3556g2-is:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3586g2-is_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3586g2-is:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3626g2-izs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3626g2-izs:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3726g2-izs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3726g2-izs:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3026g2-is_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3026g2-is:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3056g2-is_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3056g2-is:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3056g2-iu\\/sl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3056g2-iu\\/sl:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3086g2-is_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3086g2-is:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3656g2-izs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3656g2-izs:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3686g2-izs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3686g2-izs:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3756g2-izs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3756g2-izs:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3786g2-izs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3786g2-izs:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3047g2-ls_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3047g2-ls:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3347g2-ls\\(u\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3347g2-ls\\(u\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd3547g2-ls_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd3547g2-ls:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2xe6242f-is\\/316l\\(b\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2xe6242f-is\\/316l\\(b\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2xe6422fwd-izhrs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2xe6422fwd-izhrs:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2xe6442f-izhrs\\(b\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2xe6442f-izhrs\\(b\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2xe6452f-izh\\(r\\)s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2xe6452f-izh\\(r\\)s:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2xe6482f-izhrs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2xe6482f-izhrs:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2dyh2a0ixs-d\\(t2\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2dyh2a0ixs-d\\(t2\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2dy9236i8x-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2dy9236i8x-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2dy9236i8x-a\\(t3\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2dy9236i8x-a\\(t3\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2dy9236ix-a\\(t3\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2dy9236ix-a\\(t3\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2dy9236x-a\\(t3\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2dy9236x-a\\(t3\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2dy9240ix-a\\(t5\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2dy9240ix-a\\(t5\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2dy9250izs-a\\(t5\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2dy9250izs-a\\(t5\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2dy92500x-a\\(t5\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2dy92500x-a\\(t5\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ptz-n2204i-de3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ptz-n2204i-de3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ptz-n2404i-de3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ptz-n2404i-de3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ptz-n4215-de3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ptz-n4215-de3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ptz-n4215i-de_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ptz-n4215i-de:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ptz-n4225i-de_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ptz-n4225i-de:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ptz-n5225i-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ptz-n5225i-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df5225x-ae3\\(t3\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df5225x-ae3\\(t3\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df5225x-ael\\(t3\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df5225x-ael\\(t3\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df5232x-ae3\\)t3\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df5232x-ae3\\)t3\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df5232x-ael\\(t3\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df5232x-ael\\(t3\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df6a225x-ael\\)t3\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df6a225x-ael\\)t3\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df6a236x-ael\\(t3\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df6a236x-ael\\(t3\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df6a425x-ael\\(t3\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df6a425x-ael\\(t3\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df6a436x-ael\\(t3\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df6a436x-ael\\(t3\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df6a436x-ael\\(t5\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df6a436x-ael\\(t5\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df6a436x-aely\\(t5\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df6a436x-aely\\(t5\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df6a825x-ael_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df6a825x-ael:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df6a836x-ael\\(t5\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df6a836x-ael\\(t5\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df7225ix-ael\\(t3\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df7225ix-ael\\(t3\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df7225ix-aelw\\(t3\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df7225ix-aelw\\(t3\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df7232ix-ael\\(t3\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df7232ix-ael\\(t3\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df7232ix-aelw\\(t3\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df7232ix-aelw\\(t3\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df8225ih-ael_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df8225ih-ael:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df8225ih-ael\\(w\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df8225ih-ael\\(w\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df8225ix-ael\\(t3\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df8225ix-ael\\(t3\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df8225ix-ael\\(t5\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df8225ix-ael\\(t5\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df8225ix-aelw\\(t3\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df8225ix-aelw\\(t3\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df8225ix-aelw\\(t5\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df8225ix-aelw\\(t5\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df8236i5x-aelw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df8236i5x-aelw:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df8242i5x-aelw\\(t3\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df8242i5x-aelw\\(t3\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df8242i5x-aelw\\(t5\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df8242i5x-aelw\\(t5\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df8242i5x-ael\\(t3\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df8242i5x-ael\\(t3\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df8242ix-ael\\(t5\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df8242ix-ael\\(t5\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df8242ix-aelw\\(t3\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df8242ix-aelw\\(t3\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df8242ix-aely\\(t3\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df8242ix-aely\\(t3\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df8250i8x-ael\\(t3\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df8250i8x-ael\\(t3\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df8425ix-ael\\(t3\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df8425ix-ael\\(t3\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df8425ix-ael\\(t5\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df8425ix-ael\\(t5\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df8425ix-aelw\\(t3\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df8425ix-aelw\\(t3\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df8425ix-aelw\\(t5\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df8425ix-aelw\\(t5\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df8436i5x-aelw\\(t3\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df8436i5x-aelw\\(t3\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df8442ixs-ael\\(t5\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df8442ixs-ael\\(t5\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df8442ixs-aelw\\(t2\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df8442ixs-aelw\\(t2\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df8442ixs-aelw\\(t5\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df8442ixs-aelw\\(t5\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df8442ixs-aelwy\\(t5\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df8442ixs-aelwy\\(t5\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df8442ixs-aely\\(t5\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df8442ixs-aely\\(t5\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df8a442ixs-ael\\(t2\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df8a442ixs-ael\\(t2\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df8a442ixs-ael\\(t5\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df8a442ixs-ael\\(t5\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df8a442ixs-aely\\(t5\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df8a442ixs-aely\\(t5\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df8a442ixs-af\\/sp\\(t5\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df8a442ixs-af\\/sp\\(t5\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df8a442nxs-ael\\(t5\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df8a442nxs-ael\\(t5\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2df8a842ixs-ael\\(t5\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2df8a842ixs-ael\\(t5\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ids-2pt9a144mxs-d\\/t2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ids-2pt9a144mxs-d\\/t2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ids-2sk718mxs-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ids-2sk718mxs-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ids-2sk8144ixs-d\\/j_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ids-2sk8144ixs-d\\/j:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ids-2vs435-f840-ey_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ids-2vs435-f840-ey:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ids-2vs435-f840-ey\\(t3\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ids-2vs435-f840-ey\\(t3\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2td1217b-3\\/pa_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2td1217b-3\\/pa:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2td1217b-6\\/pa_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2td1217b-6\\/pa:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2td1117-2\\/pa_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2td1117-2\\/pa:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2td1117-3\\/pa_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2td1117-3\\/pa:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2td1117-6\\/pa_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2td1117-6\\/pa:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2td4136t-9_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2td4136t-9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2td4137-25\\/w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2td4137-25\\/w:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2td4137-50\\/w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2td4137-50\\/w:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2td4166t-9_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2td4166t-9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2td4167-25\\/w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2td4167-25\\/w:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2td4167-50\\/w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2td4167-50\\/w:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2td6236t-50h2l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2td6236t-50h2l:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2td6237-50h4l\\/w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2td6237-50h4l\\/w:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2td6237-75c4l\\/w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2td6237-75c4l\\/w:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2td6266t-25h2l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2td6266t-25h2l:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2td6266t-50h2l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2td6266t-50h2l:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2td6267-100c4l\\/w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2td6267-100c4l\\/w:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2td6267-100c4l\\/wy_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2td6267-100c4l\\/wy:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2td6267-50h4l\\/w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2td6267-50h4l\\/w:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2td6267-75c4l\\/w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2td6267-75c4l\\/w:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2td6267-75c4l\\/wy_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2td6267-75c4l\\/wy:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2td8166-100c2f\\/v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2td8166-100c2f\\/v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2td8166-150ze2f\\/v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2td8166-150ze2f\\/v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2td8166-150zh2f\\/v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2td8166-150zh2f\\/v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2td8166-180ze2f\\/v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2td8166-180ze2f\\/v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2td8166-75c2f\\/v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2td8166-75c2f\\/v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2td8167-150zc4f\\/w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2td8167-150zc4f\\/w:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2td8167-190ze2f\\/w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2td8167-190ze2f\\/w:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2td8167-190ze2f\\/wy_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2td8167-190ze2f\\/wy:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2td8167-230zg2f\\/w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2td8167-230zg2f\\/w:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2td8167-230zg2f\\/wy_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2td8167-230zg2f\\/wy:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-7604ni-k1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-7604ni-k1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-760ni-k1\\/4p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-760ni-k1\\/4p:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-7604ni-k1\\/4p\\/4g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-7604ni-k1\\/4p\\/4g:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-7608ni-k1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-7608ni-k1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-7608ni-k1\\/4g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-7608ni-k1\\/4g:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-7608ni-k1\\/8p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-7608ni-k1\\/8p:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-7608ni-k1\\/8p\\/4g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-7608ni-k1\\/8p\\/4g:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-7616ni-k1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-7616ni-k1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-7604ni-q1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-7604ni-q1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-7604ni-q1\\/4p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-7604ni-q1\\/4p:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-7608ni-q1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-7608ni-q1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-7608ni-q1\\/8p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-7608ni-q1\\/8p:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-7608ni-q2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-7608ni-q2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-7608ni-q2\\/8p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-7608ni-q2\\/8p:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-7616ni-q1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-7616ni-q1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-7616ni-q2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-7616ni-q2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-7616ni-q2\\/16p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-7616ni-q2\\/16p:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-7104ni-q1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-7104ni-q1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-7104ni-q1\\/4p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-7104ni-q1\\/4p:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-7104ni-q1\\/4p\\/m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-7104ni-q1\\/4p\\/m:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-7104ni-q1\\/m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-7104ni-q1\\/m:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-7108ni-q1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-7108ni-q1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-7108ni-q1\\/8p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-7108ni-q1\\/8p:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-7108ni-q1\\/8p\\/m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-7108ni-q1\\/8p\\/m:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-7108ni-q1\\/m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-7108ni-q1\\/m:-:*:*:*:*:*:*:*" ]
CVE-2004-0069
Format string vulnerability in HD Soft Windows FTP Server 1.6 and earlier allows remote attackers to execute arbitrary code via format string specifiers in the username, which is processed by the wscanf function.
[ "cpe:2.3:a:hd_soft:windows_ftp_server:*:*:*:*:*:*:*:*" ]
GHSA-3hg5-8vh7-qpf7
A remote code execution vulnerability in the Android libraries (sfntly). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-32096780.
[]
CVE-2024-48903
An improper access control vulnerability in Trend Micro Deep Security Agent 20 could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
[ "cpe:2.3:a:trend_micro_inc:deep_security_agent:*:*:*:*:*:*:*:*" ]
GHSA-63j8-5cj3-gwpp
IBM WebSphere Application Server 9 installations using Form Login could allow a remote attacker to conduct spoofing attacks. IBM X-Force ID: 137031.
[]
CVE-2024-40425
File Upload vulnerability in Nanjin Xingyuantu Technology Co Sparkshop (Spark Mall B2C Mall v.1.1.6 and before allows a remote attacker to execute arbitrary code via the contorller/common.php component.
[ "cpe:2.3:a:nanjing_xingyuantu_technology:sparkshop:*:*:*:*:*:*:*:*" ]
CVE-2000-0526
mailview.cgi CGI program in MailStudio 2000 2.0 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) attack.
[ "cpe:2.3:a:3r_soft:mailstudio_2000:2.0:*:*:*:*:*:*:*" ]
CVE-2019-8058
Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2023-5228
User Registration < 3.0.4.2 - Admin+ Stored XSS
The User Registration WordPress plugin before 3.0.4.2 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
[ "cpe:2.3:a:wpeverest:user_registration:*:*:*:*:*:wordpress:*:*" ]
CVE-2009-1482
Multiple cross-site scripting (XSS) vulnerabilities in action/AttachFile.py in MoinMoin 1.8.2 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) an AttachFile sub-action in the error_msg function or (2) multiple vectors related to package file errors in the upload_form function, different vectors than CVE-2009-0260.
[ "cpe:2.3:a:moinmo:moinmoin:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:*:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:0.1:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:0.10:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:0.11:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:1.5.3_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:1.5.3_rc2:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:1.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:1.5.5_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:1.5.5a:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:1.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:1.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:1.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:1.6:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:1.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:1.7:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:1.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:1.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:1.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:1.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:moinmoin:moinmoin:1.8.1:*:*:*:*:*:*:*" ]
GHSA-qgvm-92m2-j87g
GitLab before 12.8.2 allows Information Disclosure. Badge images were not being proxied, causing mixed content warnings as well as leaking the IP address of the user.
[]
CVE-2003-0477
wzdftpd 0.1rc4 and earlier allows remote attackers to cause a denial of service (crash) via a PORT command without an argument.
[ "cpe:2.3:a:wzdftpd:wzdftpd:*:*:*:*:*:*:*:*" ]
GHSA-3m99-jh3v-v6mf
Buffer overflow in Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on Windows and Mac OS X, before 10.3.183.43 and 11.x before 11.2.202.251 on Linux, before 11.1.111.24 on Android 2.x and 3.x, and before 11.1.115.27 on Android 4.x; Adobe AIR before 3.5.0.600; and Adobe AIR SDK before 3.5.0.600 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-5274, CVE-2012-5275, CVE-2012-5276, and CVE-2012-5277.
[]
CVE-2021-25773
JetBrains TeamCity before 2020.2 was vulnerable to reflected XSS on several pages.
[ "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*" ]
GHSA-482h-xg25-ghqh
Integer overflow in _hashopenssl.c in the hashlib module in Python 2.5.2 and earlier might allow context-dependent attackers to defeat cryptographic digests, related to "partial hashlib hashing of data exceeding 4GB."
[]
CVE-2009-4526
The Send by e-mail sub-module in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.9 and 6.x before 6.x-1.9, a module for Drupal, does not properly enforce privilege requirements, which allows remote attackers to read page titles by requesting a "Send to friend" form.
[ "cpe:2.3:a:joao_ventura:print:5.x-4.0:*:*:*:*:*:*:*", "cpe:2.3:a:joao_ventura:print:5.x-4.1:*:*:*:*:*:*:*", "cpe:2.3:a:joao_ventura:print:5.x-4.2:*:*:*:*:*:*:*", "cpe:2.3:a:joao_ventura:print:5.x-4.3:*:*:*:*:*:*:*", "cpe:2.3:a:joao_ventura:print:5.x-4.4:*:*:*:*:*:*:*", "cpe:2.3:a:joao_ventura:print:5.x-4.5:*:*:*:*:*:*:*", "cpe:2.3:a:joao_ventura:print:5.x-4.6:*:*:*:*:*:*:*", "cpe:2.3:a:joao_ventura:print:5.x-4.7:*:*:*:*:*:*:*", "cpe:2.3:a:joao_ventura:print:5.x-4.8:*:*:*:*:*:*:*", "cpe:2.3:a:joao_ventura:print:5.x-4.x:dev:*:*:*:*:*:*", "cpe:2.3:a:joao_ventura:print:6.x-1.0:*:*:*:*:*:*:*", "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc8:*:*:*:*:*:*", "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc9:*:*:*:*:*:*", "cpe:2.3:a:joao_ventura:print:6.x-1.1:*:*:*:*:*:*:*", "cpe:2.3:a:joao_ventura:print:6.x-1.2:*:*:*:*:*:*:*", "cpe:2.3:a:joao_ventura:print:6.x-1.3:*:*:*:*:*:*:*", "cpe:2.3:a:joao_ventura:print:6.x-1.4:*:*:*:*:*:*:*", "cpe:2.3:a:joao_ventura:print:6.x-1.5:*:*:*:*:*:*:*", "cpe:2.3:a:joao_ventura:print:6.x-1.6:*:*:*:*:*:*:*", "cpe:2.3:a:joao_ventura:print:6.x-1.7:*:*:*:*:*:*:*", "cpe:2.3:a:joao_ventura:print:6.x-1.x:dev:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*" ]
GHSA-j6pg-h597-gcx9
A host header injection vulnerability in MEANStore 1.0 allows attackers to obtain the password reset token via user interaction with a crafted password reset link. This allows attackers to arbitrarily reset other users' passwords and compromise their accounts.
[]
GHSA-rvpc-w57p-q95f
HTTP Response Splitting in WSO2 transport-http
Netty in WSO2 transport-http before v6.3.1 is vulnerable to HTTP Response Splitting due to HTTP Header validation being disabled.
[]
CVE-2013-0886
Google Chrome before 25.0.1364.99 on Mac OS X does not properly implement signal handling for Native Client (aka NaCl) code, which has unspecified impact and attack vectors.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.40:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.41:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.42:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.43:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.44:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.45:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.46:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.47:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.50:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.51:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.52:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.53:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.54:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.55:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.56:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.57:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.58:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.61:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.62:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.63:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.65:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.66:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.67:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.68:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.70:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.72:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.73:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.74:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.75:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.76:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.77:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.78:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.79:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.80:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.81:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.82:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.84:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.85:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.86:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.87:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.88:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.89:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.90:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.91:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.92:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.93:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.95:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
GHSA-mrrp-vrqf-8vqm
NVIDIA Triton Inference Server for Linux and Windows contains a vulnerability where a user can inject forged logs and executable commands by injecting arbitrary data as a new log entry. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
[]
CVE-2016-9333
An issue was discovered in Moxa SoftCMS versions prior to Version 1.6. The SoftCMS Application does not properly sanitize input that may allow a remote attacker access to SoftCMS with administrator's privilege through specially crafted input (SQL INJECTION).
[ "cpe:2.3:a:moxa:softcms:*:*:*:*:*:*:*:*" ]
CVE-2024-26001
PHOENIX CONTACT: Out of bounds write only memory access
An unauthenticated remote attacker can write memory out of bounds due to improper input validation in the MQTT stack. The brute force attack is not always successful because of memory randomization.
[ "cpe:2.3:a:phoenixcontact:charx_sec_3000:*:*:*:*:*:*:*:*", "cpe:2.3:a:phoenixcontact:charx_sec_3050:*:*:*:*:*:*:*:*", "cpe:2.3:a:phoenixcontact:charx_sec_3100:*:*:*:*:*:*:*:*", "cpe:2.3:a:phoenixcontact:charx_sec_3150:*:*:*:*:*:*:*:*" ]
CVE-2024-32001
SpiceDB: LookupSubjects may return partial results if a specific kind of relation is used
SpiceDB is a graph database purpose-built for storing and evaluating access control data. Use of a relation of the form: `relation folder: folder | folder#parent` with an arrow such as `folder->view` can cause LookupSubjects to only return the subjects found under subjects for either `folder` or `folder#parent`. This bug only manifests if the same subject type is used multiple types in a relation, relationships exist for both subject types and an arrow is used over the relation. Any user making a negative authorization decision based on the results of a LookupSubjects request with version before v1.30.1 is affected. Version 1.30.1 contains a patch for the issue. As a workaround, avoid using LookupSubjects for negative authorization decisions and/or avoid using the broken schema.
[]
CVE-2007-1973
Race condition in the Virtual DOS Machine (VDM) in the Windows Kernel in Microsoft Windows NT 4.0 allows local users to modify memory and gain privileges via the temporary \Device\PhysicalMemory section handle, a related issue to CVE-2007-1206.
[ "cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*" ]
CVE-2022-29620
FileZilla v3.59.0 allows attackers to obtain cleartext passwords of connected SSH or FTP servers via a memory dump.- NOTE: the vendor does not consider this a vulnerability
[ "cpe:2.3:a:filezilla-project:filezilla_client:3.59.0:*:*:*:*:*:*:*" ]
GHSA-2r6v-6pxx-64x8
A uncontrolled search path element issue was discovered in Vyaire Medical CareFusion Upgrade Utility used with Windows XP systems, Versions 2.0.2.2 and prior versions. A successful exploit of this vulnerability requires the local user to install a crafted DLL on the target machine. The application loads the DLL and gives the attacker access at the same privilege level as the application.
[]
CVE-2005-3364
Multiple SQL injection vulnerabilities in DboardGear allow remote attackers to execute arbitrary SQL commands via (1) the buddy parameter in buddy.php, (2) the u2uid parameter in u2u.php, and (3) an invalid theme file in the themes action to ctrtools.php.
[ "cpe:2.3:a:platinum:dboardgear:*:*:*:*:*:*:*:*" ]
CVE-2021-0623
In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05585817.
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt5522:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt5527:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt5597:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt5598:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt5599:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8186:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt9931:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt9950:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt9970:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt9980:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt9981:-:*:*:*:*:*:*:*" ]
CVE-2023-34447
iTop XSS vulnerability on pages/UI.php
iTop is an open source, web-based IT service management platform. Prior to versions 3.0.4 and 3.1.0, on `pages/UI.php`, cross site scripting is possible. This issue is fixed in versions 3.0.4 and 3.1.0.
[ "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*" ]
CVE-2019-0814
An information disclosure vulnerability exists when the win32k component improperly provides kernel information, aka 'Win32k Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-0848.
[ "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
CVE-2018-10511
A vulnerability in Trend Micro Control Manager (versions 6.0 and 7.0) could allow an attacker to conduct a server-side request forgery (SSRF) attack on vulnerable installations.
[ "cpe:2.3:a:trendmicro:control_manager:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:trendmicro:control_manager:7.0:*:*:*:*:*:*:*" ]
CVE-2024-20476
Cisco Identity Services Engine Authorization Bypass Vulnerability
A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to bypass the authorization mechanisms for specific file management functions. This vulnerability is due to lack of server-side validation of Administrator permissions. An attacker could exploit this vulnerability by submitting a crafted HTTP request to an affected system. A successful exploit could allow the attacker to upload files to a location that should be restricted. To exploit this vulnerability, an attacker would need valid Read-Only Administrator&nbsp;credentials.
[]
GHSA-qrq3-38m6-9m5j
In GetMBheader of combined_decode.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-136175447
[]
CVE-2019-11676
The user defined DNS name in Zoho ManageEngine Firewall Analyzer before 12.3 Build 123224 is vulnerable to stored XSS attacks.
[ "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:7.2:7020:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:7.2:7021:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:7.4:7400:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:7.6:7600:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:8.0:8000:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:8.1:8110:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:8.3:8300:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:8.5:8500:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.0:12000:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.2:12200:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:12300:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123008:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123027:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123045:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123057:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123064:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123070:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123083:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123092:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123126:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123129:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123137:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123151:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123156:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123164:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123169:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123177:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123182:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123185:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123186:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123194:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123197:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123208:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123218:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123222:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123223:*:*:*:*:*:*" ]
GHSA-3wvq-9p67-m439
Roothub v2.5 was discovered to contain an arbitrary file upload vulnerability via the customPath parameter in the upload() function. This vulnerability allows attackers to execute arbitrary code via a crafted JSP file.
[]
GHSA-3xch-65wc-4ghp
An exploitable vulnerability exists in the HTTP client functionality of the Webroot BrightCloud SDK. The configuration of the HTTP client does not enforce a secure connection by default, resulting in a failure to validate TLS certificates. An attacker could impersonate a remote BrightCloud server to exploit this vulnerability.
[]
CVE-2011-4595
Pretty-Link WordPress plugin 1.5.2 has XSS
[ "cpe:2.3:a:caseproof:pretty_link:1.5.2:*:*:*:lite:wordpress:*:*" ]
GHSA-43gg-m8j9-xmqj
A vulnerability, which was classified as critical, was found in SourceCodester Kortex Lite Advocate Office Management System 1.0. Affected is an unknown function of the file /control/activate_case.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-260274 is the identifier assigned to this vulnerability.
[]
CVE-2017-16866
dayrui FineCms 5.2.0 before 2017.11.16 has Cross Site Scripting (XSS) in core/M_Controller.php via the DR_URI field.
[ "cpe:2.3:a:finecms:finecms:5.2.0:*:*:*:*:*:*:*" ]
GHSA-qv32-7r6p-xhhh
Moderate severity vulnerability that affects com.adobe.xmp:xmpcore
XMPCore in Adobe XMP Toolkit for Java before 5.1.3 allows remote attackers to read arbitrary files via XML data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
[]
GHSA-qr7h-8pv2-xvx2
yuan1994 tpAdmin vulnerable to Server-Side Request Forgery
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in yuan1994 tpAdmin 1.3.12. Affected is the function remote of the file application\admin\controller\Upload.php. The manipulation of the argument url leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225408. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
[]
GHSA-rv96-qgg3-4gv7
The Firefox sandbox in Adobe Flash Player before 10.3.183.67 and 11.x before 11.6.602.171 on Windows and Mac OS X, and before 10.3.183.67 and 11.x before 11.2.202.273 on Linux, does not properly restrict privileges, which makes it easier for remote attackers to execute arbitrary code via crafted SWF content, as exploited in the wild in February 2013.
[]
GHSA-gfmf-9j98-4w68
Directory traversal vulnerability in captcha.php in Captcha PHP 0.9 allows remote attackers to read arbitrary files via the _tcf parameter.
[]
CVE-2016-0393
IBM Maximo Asset Management 7.5 before 7.5.0.10-TIV-MBS-IFIX002 and 7.6 before 7.6.0.5-TIV-MAMMT-FP001 allows remote attackers to obtain sensitive URL information by reading log files.
[ "cpe:2.3:a:ibm:maximo_asset_management:7.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.6.0.5:*:*:*:*:*:*:*" ]
CVE-2024-25984
In dumpBatteryDefend of dump_power.cpp, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
[]