Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
CVE-2022-26356
Racy interactions between dirty vram tracking and paging log dirty hypercalls Activation of log dirty mode done by XEN_DMOP_track_dirty_vram (was named HVMOP_track_dirty_vram before Xen 4.9) is racy with ongoing log dirty hypercalls. A suitably timed call to XEN_DMOP_track_dirty_vram can enable log dirty while another CPU is still in the process of tearing down the structures related to a previously enabled log dirty mode (XEN_DOMCTL_SHADOW_OP_OFF). This is due to lack of mutually exclusive locking between both operations and can lead to entries being added in already freed slots, resulting in a memory leak.
[ "cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*" ]
CVE-2018-5676
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader before 9.1 and PhantomPDF before 9.1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of specially crafted pdf files with embedded u3d images. Crafted data in the PDF file can trigger an overflow of a heap-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process, a different vulnerability than CVE-2018-5674 and CVE-2018-5678.
[ "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*" ]
CVE-2010-2218
Adobe Flash Media Server (FMS) before 3.0.6, and 3.5.x before 3.5.4, allows attackers to cause a denial of service via unspecified vectors, related to a "JS method issue."
[ "cpe:2.3:a:adobe:flash_media_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:3.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:3.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server_2:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server_2:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
GHSA-hcwc-2gm5-v9g6
A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. The profile activity page was not restricting the amount of results one could request, potentially resulting in a denial of service.
[]
CVE-2025-1286
Download HTML TinyMCE Button <= 1.2 - Reflected XSS
The Download HTML TinyMCE Button WordPress plugin through 1.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
[]
GHSA-9469-4325-qwhf
Format string vulnerability in wu-ftp 2.6.1 and earlier, when running with debug mode enabled, allows remote attackers to execute arbitrary commands via a malformed argument that is recorded in a PASV port assignment.
[]
GHSA-5cv3-8v9m-mrrf
Unspecified vulnerability in Oracle Database Server 9.0.1.5, 9.2.0.7, and 10.1.0.5 has unknown impact and attack vectors in the Oracle Spatial component, aka Vuln# DB11. NOTE: Oracle has not disputed reliable researcher claims that this issue is SQL injection in MDSYS.SDO_LRS_TRIG_INS.
[]
CVE-2020-24056
A hardcoded credentials vulnerability exists in Verint 5620PTZ Verint_FW_0_42, Verint 4320 V4320_FW_0_23, V4320_FW_0_31, and Verint S5120FD Verint_FW_0_42units. This could cause a confidentiality issue when using the FTP, Telnet, or SSH protocols.
[ "cpe:2.3:o:verint:5620ptz_firmware:verint_fw_0_42:*:*:*:*:*:*:*", "cpe:2.3:h:verint:5620ptz:-:*:*:*:*:*:*:*", "cpe:2.3:o:verint:4320_firmware:v4320_fw_0_23:*:*:*:*:*:*:*", "cpe:2.3:o:verint:4320_firmware:v4320_fw_0_31:*:*:*:*:*:*:*", "cpe:2.3:h:verint:4320:-:*:*:*:*:*:*:*", "cpe:2.3:o:verint:s5120fd_firmware:verint_fw_0_42units:*:*:*:*:*:*:*", "cpe:2.3:h:verint:s5120fd:-:*:*:*:*:*:*:*" ]
GHSA-9w33-c6rh-4qfg
The Forminator plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient blacklisting on the 'forminator_allowed_mime_types' function in versions up to, and including, 1.27.0. This makes it possible for authenticated attackers with administrator-level capabilities or above to upload arbitrary files on the affected site's server, but due to the htaccess configuration, remote code cannot be executed.
[]
GHSA-wvw6-cw89-mr92
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
[]
CVE-2020-27225
In versions 4.18 and earlier of the Eclipse Platform, the Help Subsystem does not authenticate active help requests to the local help web server, allowing an unauthenticated local attacker to issue active help commands to the associated Eclipse Platform process or Eclipse Rich Client Platform process.
[ "cpe:2.3:a:eclipse:platform:*:*:*:*:*:*:*:*" ]
GHSA-gh9v-q4wx-5m5c
Uninitialized Use in Dawn in Google Chrome on Android prior to 127.0.6533.88 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Critical)
[]
GHSA-6234-fx93-pwcr
stunnel 4.0.3 and earlier allows attackers to cause a denial of service (crash) via SIGCHLD signal handler race conditions that cause an inconsistency in the child counter.
[]
GHSA-mq79-4w8g-9qq4
Race condition in SuSE Linux 8.1 through 9.2, when run on SMP systems that have more than 4GB of memory, could allow local users to read unauthorized memory from "foreign memory pages."
[]
CVE-2012-1645
The CDN module 6.x-2.2 and 7.x-2.2 for Drupal, when running in Origin Pull mode with the "Far Future expiration" option enabled, allows remote attackers to read arbitrary PHP files via unspecified vectors, as demonstrated by reading settings.php.
[ "cpe:2.3:a:wimleers:cdn:6.x-2.2:*:*:*:*:*:*:*", "cpe:2.3:a:wimleers:cdn:7.x-2.2:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*" ]
CVE-2013-3414
Cross-site scripting (XSS) vulnerability in the WebVPN portal login page on Cisco Adaptive Security Appliances (ASA) devices allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCug83080.
[ "cpe:2.3:o:cisco:adaptive_security_appliance_software:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*" ]
GHSA-9q9r-fmgh-vv5v
Heimdall Application Dashboard through 2.5.4 allows reflected XSS via "Application name" to the "Add application" page.
[]
GHSA-gqvv-2phg-pg6g
wasm-interp v1.0.29 was discovered to contain an out-of-bounds read via the component OnReturnCallExpr->GetReturnCallDropKeepCount.
[]
CVE-2003-0403
Vignette StoryServer 5 and Vignette V/5 allows remote attackers to read and modify license information, and cause a denial of service (service halt) by directly accessing the /vgn/license template.
[ "cpe:2.3:a:vignette:content_suite:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:vignette:content_suite:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:vignette:content_suite:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:vignette:storyserver:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:vignette:storyserver:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:vignette:storyserver:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:vignette:vignette:5.0:*:*:*:*:*:*:*" ]
GHSA-4g2c-8mg7-7g89
: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in uploaditem.asp of Telos Automated Message Handling System allows a remote attacker to inject arbitrary script into an AMHS session. This issue affects: Telos Automated Message Handling System versions prior to 4.1.5.5.
[]
CVE-2025-46589
Vulnerability of unauthorized access in the app lock module Impact: Successful exploitation of this vulnerability will affect integrity and confidentiality.
[]
GHSA-47v8-4852-5wrf
A vulnerability has been identified in SIMATIC RTLS Locating Manager (6GT2780-0DA00) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA10) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA20) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA30) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-1EA10) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-1EA20) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-1EA30) (All versions < V3.0.1.1). Affected SIMATIC RTLS Locating Manager Report Clients do not properly protect credentials that are used to authenticate to the server. This could allow an authenticated local attacker to extract the credentials and use them to escalate their access rights from the Manager to the Systemadministrator role.
[]
CVE-2015-0695
Cisco IOS XR 4.3.4 through 5.3.0 on ASR 9000 devices, when uRPF, PBR, QoS, or an ACL is configured, does not properly handle bridge-group virtual interface (BVI) traffic, which allows remote attackers to cause a denial of service (chip and card hangs and reloads) by triggering use of a BVI interface for IPv4 packets, aka Bug ID CSCur62957.
[ "cpe:2.3:o:cisco:ios_xr:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:5.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:5.2.1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9001:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9006:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9912:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:*:*" ]
CVE-2008-4425
Directory traversal vulnerability in upload.php in Phlatline's Personal Information Manager (pPIM) 1.0 allows remote attackers to delete arbitrary files via directory traversal sequences in the file parameter within a delfile action.
[ "cpe:2.3:a:phlatline:personal_information_manager:1.0:*:*:*:*:*:*:*" ]
CVE-2018-14366
download.cgi in Pulse Secure Pulse Connect Secure 8.1RX before 8.1R13 and 8.3RX before 8.3R4 and Pulse Policy Secure through 5.2RX before 5.2R10 and 5.4RX before 5.4R4 have an Open Redirect Vulnerability.
[ "cpe:2.3:a:ivanti:connect_secure:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.3:*:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_connect_secure:8.1r1.0:*:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_connect_secure:8.1rx:*:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3rx:*:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r1.0:*:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r2.0:*:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r3.0:*:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r3.2:*:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r4.0:*:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r5.0:*:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r6.0:*:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r7.0:*:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r7.1:*:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r8.0:*:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r9.0:*:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r9.1:*:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2rx:*:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4r1:*:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4r2:*:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4r2.1:*:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4r3:*:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4rx:*:*:*:*:*:*:*" ]
CVE-2014-4451
Apple iOS before 8.1.1 does not properly enforce the failed-passcode limit, which makes it easier for physically proximate attackers to bypass the lock-screen protection mechanism via a series of guesses.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:8.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:8.0.2:*:*:*:*:*:*:*" ]
GHSA-7p67-pjvg-2587
The DefineConstantPool action in the ActionScript 2 virtual machine in Adobe Flash Player 10.x before 10.0.12.36 and 9.x before 9.0.151.0, and Adobe AIR before 1.5, accepts an untrusted input value for a "constant count," which allows remote attackers to read sensitive data from process memory via a crafted PDF file.
[]
GHSA-hm88-xqxr-4jwr
There is an unauthorized access vulnerability in ZTE H388X. If H388X is caused by brute-force serial port cracking,attackers with common user permissions can use this vulnerability to obtain elevated permissions on the affected device by performing specific operations.
[]
CVE-2017-12122
An exploitable code execution vulnerability exists in the ILBM image rendering functionality of SDL2_image-2.0.2. A specially crafted ILBM image can cause a heap overflow resulting in code execution. An attacker can display a specially crafted image to trigger this vulnerability.
[ "cpe:2.3:a:libsdl:sdl_image:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
GHSA-7w47-3wg8-547c
gix traversal outside working tree enables arbitrary code execution
SummaryDuring checkout, gitoxide does not verify that paths point to locations in the working tree. A specially crafted repository can, when cloned, place new files anywhere writable by the application.DetailsAlthough `gix-worktree-state` checks for collisions with existing files, it does not itself check if a path is really in the working tree when performing a checkout, nor do the path checks in `gix-fs` and `gix-worktree` prevent this. Cloning an untrusted repository containing specially crafted tree or blob names will create new files outside the repository, or inside the repository or a submodule's `.git` directory. The simplest cases are:A tree named `..` to traverse upward. This facilitates arbitrary code execution because files can be placed in one or more locations where they are likely to be executed soon.A tree named `.git` to enter a `.git` directory. This facilitates arbitrary code execution because hooks can be installed.A number of alternatives that achieve the same effect are also possible, some of which correspond to specific vulnerabilities that have affected Git in the past:A tree or blob whose name contains one or more `/`, to traverse upward or downward. For example, even without containing any tree named `..` or `.git`, a repository can represent a file named `../outside` or `.git/hooks/pre-commit`. This is distinct from the more intuitive case a repository containing trees that represent those paths.In Windows, a tree or blob whose name contains one or more `\`, to traverse upward or downward. (Unlike `/`, these are valid on other systems.) See [GHSA-xjx4-8694-q2fq](https://github.com/git/git/security/advisories/GHSA-xjx4-8694-q2fq).On a case-insensitive filesystem (such as NTFS, APFS, or HFS+), a tree named as a case variant of `.git`.On HFS+, a tree named like `.git` or a case variant, with characters added that HFS+ ignores [in collation](https://developer.apple.com/library/archive/technotes/tn/tn1150.html#StringComparisonAlgorithm). See https://github.com/git/git/commit/6162a1d323d24fd8cbbb1a6145a91fb849b2568f.On NTFS, a tree equivalent to `.git` (or a case variant) by the use of [NTFS stream](https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-fscc/c54dec26-1551-4d3a-a0ea-4fa40f848eb3) notation, such as `.git::$INDEX_ALLOCATION`. See [GHSA-5wph-8frv-58vj](https://github.com/git/git/security/advisories/GHSA-5wph-8frv-58vj).On an NTFS volume with [8.3 aliasing](https://learn.microsoft.com/en-us/windows/win32/fileio/naming-a-file#short-vs-long-names) enabled, a tree named as `git~1` (or a case variant). See [GHSA-589j-mmg9-733v](https://github.com/git/git/security/advisories/GHSA-589j-mmg9-733v).When a checkout creates some files outside the repository directory but fails to complete, the repository directory is usually removed, but the outside files remain.PoCFor simplicity, these examples stage a stand-in file with a valid name, modify the index, and commit. The instructions assume `sed` supports `-i`, which is the case on most systems. If using Windows, a Git Bash shell should be used.Example: Downward traversal to install hooksCreate a new repository with `git init dangerous-repo-installs-hook` and `cd` into the directory.Create the stand-in called `.git@hooks@pre-commit`, with the *contents*:Stage the stand-in: `git add --chmod=+x .git@hooks@pre-commit`Edit the index: `env LC_ALL=C sed -i.orig 's|\.git@hooks@pre-commit|.git/hooks/pre-commit|' .git/index`Commit: `git commit -m 'Initial commit'`*Optionally*, push to a private remote.Then, on another or the same machine:Clone the repository with a `gix clone …` command.Enter the newly created directory.*Optionally* run `ls -l .git/hooks` to observe that the `pre-commit` hook is already present.Make a new file and commit it with `git`. This causes the payload surreptitiously installed as a `pre-commit` hook to run, printing the message `Vulnerable!` and creating a file in the current directory containing the current date and time.Note that the effect is not limited to modifying the current directory. The payload could be written to perform any action that the user who runs `git commit` is capable of.Example: Upward traversal to create a file above the working treeCreate a new repository with `git init dangerous-repo-reaches-up`, and `cd` into the directory.Create the stand-in: `echo 'A file outside the working tree, somehow.' >..@outside`Stage the stand-in: `git add ..@outside`Edit the index: `env LC_ALL=C sed -i.orig 's|\.\.@outside|../outside|' .git/index`Commit: `git commit -m 'Initial commit'`*Optionally*, push to a private remote.Then, as above, on the same or another machine, clone the repository with a `gix clone …` command. Observe that a file named `outside` is present alongside (not inside) the cloned directory.ImpactAny use of `gix` or another application that makes use of `gix-worktree-state`, or otherwise relies on `gix-fs` and `gix-worktree` for validation, is affected, if used to clone untrusted repositories. The above description focuses on code execution, as that leads to a complete loss of confidentiality, integrity, and availability, but creating files outside a working tree without attempting to execute code can directly impact integrity as well.In use cases where no untrusted repository is ever cloned, this vulnerability has no impact. Furthermore, the impact of this vulnerability *may* be lower when `gix` is used to clone a repository for CI/CD purposes, even if untrusted, since in such uses the environment is usually isolated and arbitrary code is usually run deliberately from the repository with necessary safeguards in place.
[]
GHSA-fm68-q72q-6hjm
In Framework, there is a possible disclosure of the device owner package due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-193033501
[]
CVE-2012-5902
Cross-site scripting (XSS) vulnerability in ptk/lib/modal_bookmark.php in DFLabs PTK 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the arg4 parameter.
[ "cpe:2.3:a:dflabs:ptk:1.0.5:*:*:*:*:*:*:*" ]
GHSA-xgx7-92gq-gr3r
The Axesstel MV 410R has a certain default administrator password, and does not force a password change, which makes it easier for remote attackers to obtain access.
[]
CVE-2024-4697
Cowidgets – Elementor Addons <= 1.1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via heading_tag Parameter
The Cowidgets – Elementor Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘heading_tag’ parameter in all versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
GHSA-c87x-vwf7-v4h5
Horde before 2.2.4 allows remote malicious web sites to steal session IDs and read or create arbitrary email by stealing the ID from a referrer URL.
[]
GHSA-c4pm-f96v-w332
Vulnerability in the Oracle Application Object Library component of Oracle E-Business Suite (subcomponent: Patching). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Application Object Library executes to compromise Oracle Application Object Library. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Application Object Library accessible data as well as unauthorized access to critical data or complete access to all Oracle Application Object Library accessible data. CVSS v3.0 Base Score 6.0 (Confidentiality and Integrity impacts).
[]
CVE-2022-50111
ASoC: mt6359: Fix refcount leak bug
In the Linux kernel, the following vulnerability has been resolved: ASoC: mt6359: Fix refcount leak bug In mt6359_parse_dt() and mt6359_accdet_parse_dt(), we should call of_node_put() for the reference returned by of_get_child_by_name() which has increased the refcount.
[]
GHSA-h726-x36v-rx45
Prototype Pollution in lodash.merge
Versions of `lodash.merge` before 4.6.2 are vulnerable to prototype pollution. The function `merge` may allow a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects.RecommendationUpdate to version 4.6.2 or later.
[]
CVE-2007-6698
The BDB backend for slapd in OpenLDAP before 2.3.36 allows remote authenticated users to cause a denial of service (crash) via a potentially-successful modify operation with the NOOP control set to critical, possibly due to a double free vulnerability.
[ "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*" ]
GHSA-cp8m-fj8q-88fm
VMware vCenter Server Appliance (vCSA) 5.1 before Update 1 allows remote authenticated users to execute arbitrary programs with root privileges by leveraging Virtual Appliance Management Interface (VAMI) access.
[]
CVE-2022-22334
IBM Robotic Process Automation 21.0.0, 21.0.1, and 21.0.2 could allow a user to access information from a tenant of which they should not have access. IBM X-Force ID: 219391.
[ "cpe:2.3:a:ibm:robotic_process_automation:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:robotic_process_automation:21.0.0:*:*:*:*:*:*:*" ]
GHSA-49f3-c8wm-q9gp
TOTOLink N600R V5.3c.7159_B20190425 was discovered to contain a command injection vulnerability via the devicemac parameter in /setting/setDeviceName.
[]
CVE-2014-6759
The Downton Abbey Fan Portal (aka com.downton.abbey.fan.portal) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:downton_abbey_fan_portal_project:downton_abbey_fan_portal:1:*:*:*:*:android:*:*" ]
GHSA-g2vw-77f6-mgg5
Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1736, CVE-2015-1737, and CVE-2015-1755.
[]
CVE-2019-10051
An issue was discovered in Suricata 4.1.3. If the function filetracker_newchunk encounters an unsafe "Some(sfcm) => { ft.new_chunk }" item, then the program enters an smb/files.rs error condition and crashes.
[ "cpe:2.3:a:suricata-ids:suricata:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:suricata-ids:suricata:4.1.4:*:*:*:*:*:*:*" ]
GHSA-968p-vgm4-6fq2
Cross-site scripting (XSS) vulnerability in viewforum.php in JaxUltraBB (JUBB) 2.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the forum parameter.
[]
GHSA-4pj9-6h83-q463
Some Brother printers (such as the HL-L8360CDW v1.20) were affected by a heap buffer overflow vulnerability as the IPP service did not parse attribute names properly. This would allow an attacker to execute arbitrary code on the device.
[]
CVE-2009-1422
Unspecified vulnerability in HP ProCurve Threat Management Services zl Module (J9155A) ST.1.0.090213 and earlier allows remote attackers to gain privileges via unknown vectors, aka PR_41209.
[ "cpe:2.3:h:hp:procurve_threat_management_services_zl_module:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch_5400zl:k.13.40:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch_8200zl:k.13.40:*:*:*:*:*:*:*" ]
CVE-2011-1194
Multiple unspecified vulnerabilities in Google Chrome before 10.0.648.127 allow remote attackers to bypass the pop-up blocker via unknown vectors.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
GHSA-88r5-qmf9-93h9
Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-24539, CVE-2022-26783, CVE-2022-26785.
[]
GHSA-fhx3-h3g7-jmvr
MyBB (aka MyBulletinBoard) 1.4.2 uses insufficient randomness to compose filenames of uploaded files used as attachments, which makes it easier for remote attackers to read these files by guessing filenames.
[]
CVE-2008-5726
SQL injection vulnerability in thread.php in stormBoards 1.0.1 allows remote attackers to execute arbitrary SQL commands via the id parameter.
[ "cpe:2.3:a:stormboards_aaronnemisis:stormboards:1.0.1:*:*:*:*:*:*:*" ]
GHSA-m2cc-xh6j-cr9r
Unrestricted file upload vulnerability in Ultimate Member plugin prior to version 2.0.4 for WordPress allows remote authenticated users to upload arbitrary image files via unspecified vectors.
[]
GHSA-532g-fpxj-7pxx
A vulnerability has been identified in SIMATIC CP 1242-7 V2 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-7 LTE (All versions), SIMATIC CP 1243-8 IRC (All versions), SIMATIC CP 1543-1 (All versions), SINAMICS S210 (6SL5...) (All versions >= V6.1 < V6.1 HF2), SIPLUS NET CP 1543-1 (All versions). The webserver implementation of the affected products does not correctly release allocated memory after it has been used.An attacker with network access could use this vulnerability to cause a denial-of-service condition in the webserver of the affected product.
[]
GHSA-h93f-69cr-g7fq
Multiple vulnerabilities in Cisco SD-WAN products could allow an unauthenticated, remote attacker to execute denial of service (DoS) attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
[]
CVE-2005-2791
BFCommand & Control Server Manager BFCC 1.22_A and earlier, and BFVCC 2.14_B and earlier, allows remote attackers to cause a denial of service (refused new connections) via a series of connections and disconnections without sending the login command.
[ "cpe:2.3:a:bfcommand_and_control_software:bfcc:*:*:*:*:*:*:*:*", "cpe:2.3:a:bfcommand_and_control_software:bfvcc:2.00_a:*:*:*:*:*:*:*", "cpe:2.3:a:bfcommand_and_control_software:bfvcc:2.14_b:*:*:*:*:*:*:*" ]
GHSA-v6cj-rg53-2x2x
Directory traversal vulnerability in function/sources.php in SLAED CMS 2.5 Lite allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the newlang parameter to index.php.
[]
GHSA-jphv-3r8c-vvcp
Arista NG Firewall ExecManagerImpl Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Arista NG Firewall. Authentication is required to exploit this vulnerability.The specific flaw exists within the ExecManagerImpl class. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-24015.
[]
GHSA-gggr-phrh-226m
An exploitable use-after-free vulnerability exists in WPS Spreadsheets ( ET ) as part of WPS Office, version 11.2.0.10351. A specially-crafted XLS file can cause a use-after-free condition, resulting in remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.
[]
GHSA-x955-8xr4-fgcv
Zoho ManageEngine Password Manager Pro 9 before 9.4 (9400) has reflected XSS in SearchResult.ec and BulkAccessControlView.ec.
[]
GHSA-cx98-f2vw-wvr8
NVIDIA nvJPEG2000 library contains a vulnerability where an attacker can cause an out-of-bounds write issue by means of a specially crafted JPEG2000 file. A successful exploit of this vulnerability might lead to code execution and data tampering.
[]
CVE-2019-9677
The specific fields of CGI interface of some Dahua products are not strictly verified, an attacker can cause a buffer overflow by constructing malicious packets. Affected products include: IPC-HDW1X2X,IPC-HFW1X2X,IPC-HDW2X2X,IPC-HFW2X2X,IPC-HDW4X2X,IPC-HFW4X2X,IPC-HDBW4X2X,IPC-HDW5X2X,IPC-HFW5X2X for versions which Build time is before August 18, 2019.
[ "cpe:2.3:o:dahuasecurity:ipc-hdw1x2x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:ipc-hdw1x2x:-:*:*:*:*:*:*:*", "cpe:2.3:o:dahuasecurity:ipc-hfw1x2x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:ipc-hfw1x2x:-:*:*:*:*:*:*:*", "cpe:2.3:o:dahuasecurity:ipc-hdw2x2x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:ipc-hdw2x2x:-:*:*:*:*:*:*:*", "cpe:2.3:o:dahuasecurity:ipc-hfw2x2x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:ipc-hfw2x2x:-:*:*:*:*:*:*:*", "cpe:2.3:o:dahuasecurity:ipc-hdw4x2x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:ipc-hdw4x2x:-:*:*:*:*:*:*:*", "cpe:2.3:o:dahuasecurity:ipc-hfw4x2x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:ipc-hfw4x2x:-:*:*:*:*:*:*:*", "cpe:2.3:o:dahuasecurity:ipc-hdbw4x2x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:ipc-hdbw4x2x:-:*:*:*:*:*:*:*", "cpe:2.3:o:dahuasecurity:ipc-hdw5x2x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:ipc-hdw5x2x:-:*:*:*:*:*:*:*", "cpe:2.3:o:dahuasecurity:ipc-hfw5x2x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:ipc-hfw5x2x:-:*:*:*:*:*:*:*" ]
CVE-2022-47915
The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13. An app may be able to execute arbitrary code with kernel privileges.
[ "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
GHSA-mh9j-g4g3-6xcv
A privilege escalation vulnerability exists in Kepware LinkMaster 3.0.94.0. In its default configuration, an attacker can globally overwrite service configuration to execute arbitrary code with NT SYSTEM privileges.
[]
CVE-2014-5528
The Appsflyer library for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:appsflyer:appsflyer:-:*:*:*:*:android:*:*" ]
CVE-2024-45829
Sharp and Toshiba Tec MFPs provide the web page to download data, where query parameters in HTTP requests are improperly processed and resulting in an Out-of-bounds Read vulnerability. Crafted HTTP requests may cause affected products crashed.
[ "cpe:2.3:o:toshibatec:e-studio1058_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio1058:-:*:*:*:*:*:*:*", "cpe:2.3:o:toshibatec:e-studio1208_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio1208:-:*:*:*:*:*:*:*", "cpe:2.3:o:toshibatec:e-studio908_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio908:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-90c70_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-90c70:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-90c80_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-90c80:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c65_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70c65:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70c55:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70c45:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70c36:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70c31:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-60c45:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-60c36:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-60c31:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c65_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50c65:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50c55:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50c45:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50c36:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50c31:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50c26:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-55c26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-55c26:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-8081_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-8081:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-7081_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-7081:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6071:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-5071:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4071:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3571:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3071:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4061_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4061:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3561_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3561:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3061_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3061:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6051:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-5051:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4051:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3551:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3051:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-2651_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-2651:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6071s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-5071s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4071s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3571s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3571s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3071s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4061s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4061s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3561s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3561s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3061s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3061s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-30c25:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-30c25y:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-30c25z:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-30c25t:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-7580n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-7580n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6580n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6580n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-8090n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-8090n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-7090n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-7090n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6070n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-5070n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4070n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3570n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3570n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3070n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4060n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4060n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3560n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3560n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3060n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3060n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6070v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-5070v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4070v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3570v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3570v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3070v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4060v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4060v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3560v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3560v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3060v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3060v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6070n_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4070n_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3070n_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6070v_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4070v_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3070v_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6050n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-5050n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4050n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3550n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3550n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3050n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6050v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-5050v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4050v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3550v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3550v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3050v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-2630n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-2630n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3050n_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3050v_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c545wd_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-c545wd:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c542wd_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-c542wd:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c535wd_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-c535wd:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c533wd_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-c533wd:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c535wr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-c535wr:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c533wr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-c533wr:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c304w:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c303w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c303w:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c304:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c303_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c303:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c304wh:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c303wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c303wh:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m90_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70m90:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m75_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70m75:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m65_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70m65:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70m55:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70m45:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70m36:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70m31:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50m55:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m50_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50m50:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50m45:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50m36:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50m31:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50m26:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m1206_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m1206:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m1056_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m1056:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m7570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m7570:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m6570:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m6071:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m5071:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m4071:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3571:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3071:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m6051:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m5051:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m4051:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3551:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3051:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2651_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m2651:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3571s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3571s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3071s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m6071s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m5071s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m4071s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m35_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-30m35:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-30m31:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m28_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-30m28:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m35t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-30m35t:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m31t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-30m31t:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m28t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-30m28t:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b476w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b476w:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b376w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b376w:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b456w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b456w:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b356w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b356w:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b476wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b476wh:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b376wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b376wh:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b456wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b456wh:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b356wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b356wh:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m905_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m905:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m6070:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m5070:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m4070:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3570:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3070:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m6050:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m5050:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m4050:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3550:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3050:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m2630:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m6070_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m4070_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3070_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3050_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3050_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2630_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m2630_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b550wd_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-b550wd:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b540wr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-b540wr:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b547wd_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-b547wd:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b537wr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-b537wr:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b455w:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b355w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b355w:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455wz_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b455wz:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b355wz_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b355wz:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455wt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b455wt:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b355wt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b355wt:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-7500n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-7500n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6500n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6500n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-7040n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-7040n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6240n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6240n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5141n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-5141n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5140n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-5140n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4141n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4141n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4140n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4140n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5141n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-5141n_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4140n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4140n_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3640n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3640n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3140n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3140n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-2640n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-2640n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3140n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3140n_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3640nr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3640nr:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3140nr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3140nr:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-2640nr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-2640nr:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3116n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3116n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-2616n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-2616n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3115n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3115n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-2615n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-2615n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-2615_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-2615_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5112n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-5112n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5111n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-5111n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5110n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-5110n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4112n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4112n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4111n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4111n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4110n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4110n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3610n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3610n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3110n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3110n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-2610n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-2610n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3110n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3110n_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3610nr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3610nr:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c301w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c301w:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c301_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c301:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3114n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3114n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-2614n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-2614n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-2314n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-2314n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-2314nr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-2314nr:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3111u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3111u:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-2310u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-2310u:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-2310r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-2310r:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-2010u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-2010u:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-1810u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-1810u:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c401_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c401:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:dx-c401_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:dx-c401:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:dx-c401_j_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:dx-c401_j:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c400:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:dx-c400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:dx-c400:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c381_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c381:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:dx-c381_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:dx-c381:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c380_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c380:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c381b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c381b:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c312_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c312:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c311_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c311:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:dx-c311_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:dx-c311:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:dx-c311j_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:dx-c311j:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c310_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c310:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:dx-c310_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:dx-c310:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c400p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c400p:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c380p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c380p:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c402sc_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c402sc:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c382sc_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c382sc:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c382scb_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c382scb:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5001n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-5001n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5000n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-5000n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4101n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4101n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4100n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4100n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3100n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3100n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3100g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3100g:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-2600n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-2600n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-2600g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-2600g:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3101n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3101n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-2601n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-2601n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-2301n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-2301n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:dx-2500n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:dx-2500n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:dx-2000u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:dx-2000u:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m1205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m1205:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m1055_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m1055:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m1204_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m1204:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m1054_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m1054:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m904_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m904:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m754n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m754n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m654n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m654n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m754n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m754n_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m654n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m654n_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m565n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m565n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m465n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m465n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m365n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m365n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m465n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m465n_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m365n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m365n_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m564n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m564n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m464n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m464n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m364n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m364n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m564n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m564n_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m356n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m356n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m316n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m316n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m315n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m315n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m356u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m356u:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m315u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m315u:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m266n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m266n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m265n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m265n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m265u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m265u:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m315ne_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m315ne:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m265ne_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m265ne:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m356nv_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m356nv:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m316nv_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m316nv:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m315nv_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m315nv:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m356uv_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m356uv:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m315uv_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m315uv:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m266nv_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m266nv:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m265nv_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m265nv:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m265uv_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m265uv:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m315v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m315v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m265v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m265v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m354n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m354n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m314n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m314n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m264n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m264n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m354u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m354u:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m314u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m314u:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m264u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m264u:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m314nv_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m314nv:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m264nv_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m264nv:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m354nr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m354nr:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m314nr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m314nr:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m264nr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m264nr:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b402_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b402:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b382_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b382:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b402p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b402p:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b382p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b382p:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b402sc_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b402sc:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b382sc_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b382sc:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b401_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b401:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b381_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b381:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b400p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b400p:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b380p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b380p:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m753n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m753n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m753u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m753u:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m623n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m623n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m623u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m623u:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m503n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m503n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m453n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m453n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m363n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m363n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m283n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m283n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m503u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m503u:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m453u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m453u:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m363u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m363u:-:*:*:*:*:*:*:*" ]
CVE-2009-3671
Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2009-3674.
[ "cpe:2.3:a:microsoft:ie:8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp4:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:x64:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*" ]
CVE-2024-35571
Tenda AX1806 v1.0.0.1 contains a stack overflow via the iptv.stb.mode parameter in the function formSetIptv.
[ "cpe:2.3:o:tenda:ax1806_firmware:1.0.0.1:*:*:*:*:*:*:*" ]
CVE-2016-8274
Huawei PC client software HiSuite 4.0.5.300_OVE has a dynamic link library (DLL) hijack vulnerability; an attacker can make the system load malicious DLL files to execute arbitrary code.
[ "cpe:2.3:a:huawei:hisuite:4.0.5.300_ove:*:*:*:*:*:*:*" ]
CVE-2024-13483
LTL Freight Quotes – SAIA Edition <= 2.2.10 - Unauthenticated SQL Injection
The LTL Freight Quotes – SAIA Edition plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' and 'dropship_edit_id' parameters in all versions up to, and including, 2.2.10 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
[]
GHSA-vm9c-gv5w-3h2f
The UserPro - Community and User Profile WordPress Plugin plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 5.1.10 via the userpro_fbconnect() function. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
[]
GHSA-c62g-6hm9-x69q
In the Linux kernel, the following vulnerability has been resolved:ceph: fix memory leak in ceph_direct_read_write()The bvecs array which is allocated in iter_get_bvecs_alloc() is leaked and pages remain pinned if ceph_alloc_sparse_ext_map() fails.There is no need to delay the allocation of sparse_ext map until after the bvecs array is set up, so fix this by moving sparse_ext allocation a bit earlier. Also, make a similar adjustment in __ceph_sync_read() for consistency (a leak of the same kind in __ceph_sync_read() has been addressed differently).
[]
CVE-2013-4719
SQL injection vulnerability in the SEO Pack for tt_news extension before 1.3.3 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[ "cpe:2.3:a:lina_wolf:seo_pack_for_tt_news:*:*:*:*:*:*:*:*", "cpe:2.3:a:lina_wolf:seo_pack_for_tt_news:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:lina_wolf:seo_pack_for_tt_news:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:-:*:*:*:*:*:*:*" ]
GHSA-6h7w-fc84-x7p6
StaticFile.fromUrl can leak presence of a directory
Impact`StaticFile.fromUrl` can leak the presence of a directory on a server when the `URL` scheme is not `file://`, and the URL points to a fetchable resource under its scheme and authority. The function returns `F[None]`, indicating no resource, if `url.getFile` is a directory, without first checking the scheme or authority of the URL. If a URL connection to the scheme and URL would return a stream, and the path in the URL exists as a directory on the server, the presence of the directory on the server could be inferred from the 404 response. The contents and other metadata about the directory are not exposed.This affects http4s versions:0.21.7 through 0.21.230.22.0-M1 through 0.22.0-M80.23.0-M11.0.0-M1 through 1.0.0-M22PatchesThe [patch](https://github.com/http4s/http4s/commit/52e1890665410b4385e37b96bc49c5e3c708e4e9) is available in the following versions:v0.21.24v0.22.0-RC1v0.23.0-RC1v1.0.0-M23Note: a previous version of this advisory incorrectly referred to 0.22.0-M9 and 0.23.0-M2.WorkaroundsDon't call `StaticFile.fromUrl` with non-file URLs.For more informationIf you have any questions or comments about this advisory:Open an issue in [the http4s repository](https://github.com/http4s/http4s)Disclose further vulnerabilities according to the [http4s security policy](https://github.com/http4s/http4s/blob/main/SECURITY.md)
[]
GHSA-9rj9-4qhw-j56j
A vulnerability has been found in Morgawr Muon 0.1.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file src/muon/handler.clj. The manipulation leads to insufficiently random values. The attack can be launched remotely. Upgrading to version 0.2.0-indev is able to address this issue. The name of the patch is c09ed972c020f759110c707b06ca2644f0bacd7f. It is recommended to upgrade the affected component. The identifier VDB-216877 was assigned to this vulnerability.
[]
CVE-2023-21543
Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability
Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ]
GHSA-jc9x-3ccm-v3m6
Zarafa WebAccess 4.1 and WebApp uses world-readable permissions for the files in their tmp directory, which allows local users to obtain sensitive information by reading temporary session data.
[]
GHSA-h3qg-w9j5-wh3m
An issue was discovered in Mattermost Server before 3.1.0. It allows XSS because the noreferrer and noopener protection mechanisms were not in place.
[]
GHSA-h4r6-7hxq-5fc9
The Multiple Analyzer in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager allows remote authenticated users to bypass intended upload restrictions via a crafted parameter, aka Bug ID CSCup76297.
[]
GHSA-mc99-9q9v-9cj5
A remote code execution vulnerability exists when Windows Shell improperly handles URIs, aka "Windows Shell Remote Code Execution Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers.
[]
CVE-2024-37566
Infoblox NIOS through 8.6.4 has Improper Authentication for Grids.
[]
GHSA-hw36-cfq9-pqhg
Directory traversal vulnerability in the LYSESOFT AndExplorer application before 20140403 and AndExplorerPro application before 20140405 for Android allows attackers to overwrite or create arbitrary files via unspecified vectors.
[]
CVE-2024-52338
Apache Arrow R package: Arbitrary code execution when loading a malicious data file
Deserialization of untrusted data in IPC and Parquet readers in the Apache Arrow R package versions 4.0.0 through 16.1.0 allows arbitrary code execution. An application is vulnerable if it reads Arrow IPC, Feather or Parquet data from untrusted sources (for example, user-supplied input files). This vulnerability only affects the arrow R package, not other Apache Arrow implementations or bindings unless those bindings are specifically used via the R package (for example, an R application that embeds a Python interpreter and uses PyArrow to read files from untrusted sources is still vulnerable if the arrow R package is an affected version). It is recommended that users of the arrow R package upgrade to 17.0.0 or later. Similarly, it is recommended that downstream libraries upgrade their dependency requirements to arrow 17.0.0 or later. If using an affected version of the package, untrusted data can read into a Table and its internal to_data_frame() method can be used as a workaround (e.g., read_parquet(..., as_data_frame = FALSE)$to_data_frame()). This issue affects the Apache Arrow R package: from 4.0.0 through 16.1.0. Users are recommended to upgrade to version 17.0.0, which fixes the issue.
[ "cpe:2.3:a:apache_software_foundation:apache_arrow_r_package:*:*:*:*:*:*:*:*" ]
GHSA-3fvq-m2x9-rgc7
In Bluetooth, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-113495295
[]
GHSA-9qcp-fr5g-q6j7
Trusted Compute Base Elevation of Privilege Vulnerability
[]
CVE-2023-30963
Stored XSS in Foundry Slate Query Dropdown menu
A security defect was discovered in Foundry Frontend which enabled users to perform Stored XSS attacks in Slate if Foundry's CSP were to be bypassed. This defect was resolved with the release of Foundry Frontend 6.229.0. The service was rolled out to all affected Foundry instances. No further intervention is required.
[ "cpe:2.3:a:palantir:foundry_frontend:*:*:*:*:*:*:*:*" ]
CVE-2021-29854
IBM Maximo Asset Management 7.6.1.1 and 7.6.1.2 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. By sending a specially crafted HTTP request, a remote attacker could exploit this vulnerability to inject HTTP HOST header, which will allow the attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 205680.
[ "cpe:2.3:a:ibm:maximo_application_suite:8.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.6.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.6.1.2:*:*:*:*:*:*:*" ]
CVE-2006-5706
Unspecified vulnerabilities in PHP, probably before 5.2.0, allow local users to bypass open_basedir restrictions and perform unspecified actions via unspecified vectors involving the (1) chdir and (2) tempnam functions. NOTE: the tempnam vector might overlap CVE-2006-1494.
[ "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*" ]
CVE-2024-20817
Out-of-bounds Write vulnerabilities in svc1td_vld_slh of libsthmbc.so prior to SMR Feb-2024 Release 1 allows local attackers to trigger buffer overflow.
[ "cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-apr-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-aug-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-dec-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jan-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jan-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jul-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jun-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-mar-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-may-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-nov-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-nov-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-oct-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-oct-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-sep-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*" ]
GHSA-928w-mwq7-xvqr
The Post Grid Gutenberg Blocks and WordPress Blog Plugin WordPress plugin before 4.0.2 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
[]
CVE-2005-0241
The httpProcessReplyHeader function in http.c for Squid 2.5-STABLE7 and earlier does not properly set the debug context when it is handling "oversized" HTTP reply headers, which might allow remote attackers to poison the cache or bypass access controls based on header size.
[ "cpe:2.3:a:squid:squid:2.5.stable1:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid:2.5.stable2:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid:2.5.stable3:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid:2.5.stable4:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid:2.5.stable5:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid:2.5.stable6:*:*:*:*:*:*:*", "cpe:2.3:a:squid:squid:2.5.stable7:*:*:*:*:*:*:*" ]
CVE-2025-24281
This issue was addressed with improved data protection. This issue is fixed in macOS Sequoia 15.4. An app may be able to access sensitive user data.
[]
GHSA-222h-mmp9-4hcv
WebKit, as used in Apple Safari before 6.1.6 and 7.x before 7.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in HT6367.
[]
CVE-2021-3167
In Cloudera Data Engineering (CDE) 1.3.0, JWT authentication tokens are exposed to administrators in virtual cluster server logs.
[ "cpe:2.3:a:cloudera:data_engineering:1.3.0:*:*:*:*:*:*:*" ]
CVE-2009-1010
Unspecified vulnerability in the Outside In Technology component in Oracle Application Server 8.2.2 and 8.3.0 allows local users to affect confidentiality, integrity, and availability, related to HTML, a different vulnerability than CVE-2009-1008.
[ "cpe:2.3:a:ibm:websphere_portal:6.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:8.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:8.3.0:*:*:*:*:*:*:*" ]
GHSA-3486-w28q-g6jc
Buffer overflow in msgchk in Digital UNIX 4.0G and earlier allows local users to execute arbitrary code via a long command line argument.
[]
GHSA-vjgg-3f8r-g7rm
In the Linux kernel, the following vulnerability has been resolved:drm/amdgpu: don't access invalid schedSince 2320c9e6a768 ("drm/sched: memset() 'job' in drm_sched_job_init()") accessing job->base.sched can produce unexpected results as the initialisation of (*job)->base.sched done in amdgpu_job_alloc is overwritten by the memset.This commit fixes an issue when a CS would fail validation and would be rejected after job->num_ibs is incremented. In this case, amdgpu_ib_free(ring->adev, ...) will be called, which would crash the machine because the ring value is bogus.To fix this, pass a NULL pointer to amdgpu_ib_free(): we can do this because the device is actually not used in this function.The next commit will remove the ring argument completely.(cherry picked from commit 2ae520cb12831d264ceb97c61f72c59d33c0dbd7)
[]
GHSA-rp23-g46j-x9xq
This issue was addressed with improved entitlements. This issue is fixed in iOS 16.1 and iPadOS 16. An app may be able to record audio using a pair of connected AirPods.
[]
GHSA-mfhf-9pvp-rc65
Multiple cross-site scripting (XSS) vulnerabilities in Hitachi Business Logic - Container (BLC) P-2443-9114 01-00 through 02-06 on Windows, and P-1M43-9111 01-01 through 02-00 on AIX, allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors in an unspecified input form.
[]
CVE-2010-4427
Unspecified vulnerability in the Oracle BI Publisher component in Oracle Fusion Middleware 10.1.3.4.0, 10.1.3.4.1, and 11.1.1.3 allows remote authenticated users to affect integrity via unknown vectors related to Web Server.
[ "cpe:2.3:a:oracle:fusion_middleware:10.1.3.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:10.1.3.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:11.1.1.3:*:*:*:*:*:*:*" ]