id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2008-1780 | Unspecified vulnerability in the labeled networking functionality in Solaris 10 Trusted Extensions allows applications in separate labeling zones to bypass labeling restrictions via unknown vectors. | [
"cpe:2.3:o:sun:solaris:10:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:10:*:x86:*:*:*:*:*"
] |
|
GHSA-5972-rpxp-h8vj | Unspecified vulnerability in Shindig-Integrator 5.x, a module for Drupal, has unspecified impact and remote attack vectors related to "numerous flaws" that are not related to XSS or access control, a different vulnerability than CVE-2008-4596 and CVE-2008-4597. | [] |
|
CVE-2022-31758 | The kernel module has the race condition vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. | [
"cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-0930 | Heap buffer overflow in Video in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
CVE-2015-6995 | The Disk Images component in Apple iOS before 9.1 and OS X before 10.11.1 misparses images, which allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted app. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] |
|
GHSA-6hv5-jvfr-j4jm | The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data. | [] |
|
CVE-2004-2573 | PHP remote file inclusion vulnerability in tables_update.inc.php in phpGroupWare 0.9.14.005 and earlier allows remote attackers to execute arbitrary PHP code via an external URL in the appdir parameter. | [
"cpe:2.3:a:phpgroupware:phpgroupware:*:*:*:*:*:*:*:*",
"cpe:2.3:a:phpgroupware:phpgroupware:0.9.14.003:*:*:*:*:*:*:*"
] |
|
CVE-2024-32744 | A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the PAGE KEYWORDS parameter under the CURRENT PAGE module. | [
"cpe:2.3:a:wondercms:wondercms:3.4.3:*:*:*:*:*:*:*"
] |
|
GHSA-w92w-87vr-h7fh | RSA Archer, versions prior to 6.4.0.1, contain a stored cross-site scripting vulnerability. A remote authenticated malicious Archer user could potentially exploit this vulnerability to store malicious HTML or JavaScript code in a trusted application data store. When application users access the corrupted data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application. | [] |
|
CVE-2025-23724 | WordPress University Quizzes Online plugin <= 1.4 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Oleksandr Ustymenko University Quizzes Online allows Reflected XSS. This issue affects University Quizzes Online: from n/a through 1.4. | [] |
CVE-2017-9518 | atmail before 7.8.0.2 has CSRF, allowing an attacker to change the SMTP hostname and hijack all emails. | [
"cpe:2.3:a:atmail:atmail:*:*:*:*:*:*:*:*"
] |
|
GHSA-4jhm-crx9-7qmm | Unspecified vulnerability in the Oracle OLAP component in Oracle Database 9.2.08, 9.2.0.8DV, and 10.1.0.5 allows remote authenticated users to affect availability, related to OLAPSYS.CWM2_OLAP_AW_AWUTIL, a different vulnerability than CVE-2008-3991. | [] |
|
CVE-2006-5492 | Unspecified vulnerability in Maerys Archive (Maarch) before 2.0.1 allows remote authenticated users to obtain sensitive information (document contents) via unspecified attack vectors related to "grants." | [
"cpe:2.3:a:maarch:maarch:*:*:*:*:*:*:*:*"
] |
|
GHSA-hqwv-qv7p-5xvx | A CWE-22: Improper Limitation of a Pathname to a Restricted Directory vulnerability exists in Custom Reports that could cause a remote code execution when a victim tries to open a malicious report. Affected Products: IGSS Data Server(IGSSdataServer.exe)(V16.0.0.23040 and prior), IGSS Dashboard(DashBoard.exe)(V16.0.0.23040 and prior), Custom Reports(RMS16.dll)(V16.0.0.23040 and prior). | [] |
|
CVE-2022-38883 | The d8s-math for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package. The affected version is 0.1.0. | [
"cpe:2.3:a:d8s-math_project:d8s-math:0.1.0:*:*:*:*:python:*:*"
] |
|
GHSA-pq22-mrc2-gx83 | In the Linux kernel, the following vulnerability has been resolved:dm-bufio: don't schedule in atomic contextA BUG was reported as below when CONFIG_DEBUG_ATOMIC_SLEEP and
try_verify_in_tasklet are enabled.
[ 129.444685][ T934] BUG: sleeping function called from invalid context at drivers/md/dm-bufio.c:2421
[ 129.444723][ T934] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 934, name: kworker/1:4
[ 129.444740][ T934] preempt_count: 201, expected: 0
[ 129.444756][ T934] RCU nest depth: 0, expected: 0
[ 129.444781][ T934] Preemption disabled at:
[ 129.444789][ T934] [<ffffffd816231900>] shrink_work+0x21c/0x248
[ 129.445167][ T934] kernel BUG at kernel/sched/walt/walt_debug.c:16!
[ 129.445183][ T934] Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP
[ 129.445204][ T934] Skip md ftrace buffer dump for: 0x1609e0
[ 129.447348][ T934] CPU: 1 PID: 934 Comm: kworker/1:4 Tainted: G W OE 6.6.56-android15-8-o-g6f82312b30b9-debug #1 1400000003000000474e5500b3187743670464e8
[ 129.447362][ T934] Hardware name: Qualcomm Technologies, Inc. Parrot QRD, Alpha-M (DT)
[ 129.447373][ T934] Workqueue: dm_bufio_cache shrink_work
[ 129.447394][ T934] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 129.447406][ T934] pc : android_rvh_schedule_bug+0x0/0x8 [sched_walt_debug]
[ 129.447435][ T934] lr : __traceiter_android_rvh_schedule_bug+0x44/0x6c
[ 129.447451][ T934] sp : ffffffc0843dbc90
[ 129.447459][ T934] x29: ffffffc0843dbc90 x28: ffffffffffffffff x27: 0000000000000c8b
[ 129.447479][ T934] x26: 0000000000000040 x25: ffffff804b3d6260 x24: ffffffd816232b68
[ 129.447497][ T934] x23: ffffff805171c5b4 x22: 0000000000000000 x21: ffffffd816231900
[ 129.447517][ T934] x20: ffffff80306ba898 x19: 0000000000000000 x18: ffffffc084159030
[ 129.447535][ T934] x17: 00000000d2b5dd1f x16: 00000000d2b5dd1f x15: ffffffd816720358
[ 129.447554][ T934] x14: 0000000000000004 x13: ffffff89ef978000 x12: 0000000000000003
[ 129.447572][ T934] x11: ffffffd817a823c4 x10: 0000000000000202 x9 : 7e779c5735de9400
[ 129.447591][ T934] x8 : ffffffd81560d004 x7 : 205b5d3938373434 x6 : ffffffd8167397c8
[ 129.447610][ T934] x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffffffc0843db9e0
[ 129.447629][ T934] x2 : 0000000000002f15 x1 : 0000000000000000 x0 : 0000000000000000
[ 129.447647][ T934] Call trace:
[ 129.447655][ T934] android_rvh_schedule_bug+0x0/0x8 [sched_walt_debug 1400000003000000474e550080cce8a8a78606b6]
[ 129.447681][ T934] __might_resched+0x190/0x1a8
[ 129.447694][ T934] shrink_work+0x180/0x248
[ 129.447706][ T934] process_one_work+0x260/0x624
[ 129.447718][ T934] worker_thread+0x28c/0x454
[ 129.447729][ T934] kthread+0x118/0x158
[ 129.447742][ T934] ret_from_fork+0x10/0x20
[ 129.447761][ T934] Code: ???????? ???????? ???????? d2b5dd1f (d4210000)
[ 129.447772][ T934] ---[ end trace 0000000000000000 ]---dm_bufio_lock will call spin_lock_bh when try_verify_in_tasklet
is enabled, and __scan will be called in atomic context. | [] |
|
CVE-2021-33166 | Incorrect default permissions for the Intel(R) RXT for Chromebook application, all versions, may allow an authenticated user to potentially enable information disclosure via local access. | [
"cpe:2.3:a:intel:retail_experience_tool:-:*:*:*:*:chrome:*:*"
] |
|
CVE-2020-14889 | Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.16. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N). | [
"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-7480 | The blkcg_init_queue function in block/blk-cgroup.c in the Linux kernel before 4.11 allows local users to cause a denial of service (double free) or possibly have unspecified other impact by triggering a creation failure. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] |
|
GHSA-c55j-fmh7-83pp | mappy.py in Splunk Web in Splunk 4.2.x before 4.2.5 does not properly restrict use of the mappy command to access Python classes, which allows remote authenticated administrators to execute arbitrary code by leveraging the sys module in a request to the search application, as demonstrated by a cross-site request forgery (CSRF) attack, aka SPL-45172. | [] |
|
CVE-2008-4642 | SQL injection vulnerability in profile.php in AstroSPACES 1.1.1 allows remote attackers to execute arbitrary SQL commands via the id parameter in a view action. | [
"cpe:2.3:a:astrospaces:astrospaces:1.1.1:*:*:*:*:*:*:*"
] |
|
CVE-2007-6237 | cp.php in DeluxeBB 1.09 does not verify that the membercookie parameter corresponds to the authenticated member during a profile update, which allows remote authenticated users to change the e-mail addresses of arbitrary accounts via a modified membercookie parameter, a different vector than CVE-2006-4078. NOTE: this can be leveraged for administrative access by requesting password-reset e-mail through a lostpw action to misc.php. | [
"cpe:2.3:a:deluxebb:deluxebb:1.09:*:*:*:*:*:*:*"
] |
|
CVE-2018-7080 | A vulnerability exists in the firmware of embedded BLE radios that are part of some Aruba Access points. An attacker who is able to exploit the vulnerability could install new, potentially malicious firmware into the AP's BLE radio and could then gain access to the AP's console port. This vulnerability is applicable only if the BLE radio has been enabled in affected access points. The BLE radio is disabled by default. Note - Aruba products are NOT affected by a similar vulnerability being tracked as CVE-2018-16986. | [
"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:arubanetworks:203rp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:203rp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arubanetworks:203r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:203r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arubanetworks:ap-300_series_access_points_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-300_series_access_points:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arubanetworks:ap-300_series_instant_access_points_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-300_series_instant_access_points:-:*:*:*:*:*:*:*"
] |
|
GHSA-5fqm-f4f4-5vpq | A security feature bypass vulnerability exists where a NETLOGON message is able to obtain the session key and sign messages.To exploit this vulnerability, an attacker could send a specially crafted authentication request, aka 'Microsoft Windows Security Feature Bypass Vulnerability'. | [] |
|
GHSA-8rpc-47fr-2h26 | IBM Connections 5.5 and earlier is vulnerable to possible link manipulation attack that could result in the display of inappropriate background images. | [] |
|
CVE-2018-17667 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the print method of a Host object. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6521. | [
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
CVE-2025-5568 | WpEvently <= 4.4.2 - Authenticated (Contributor+) Stored Cross-Site Scripting | The WpEvently plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple parameters in all versions up to, and including, 4.4.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
GHSA-7456-9w6m-v94r | In versions 16.0.0-16.0.0.1, 15.1.0-15.1.1, 14.1.0-14.1.3, 13.1.0-13.1.3.5, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, in a BIG-IP DNS / BIG-IP LTM GSLB deployment, under certain circumstances, the BIG-IP DNS system may stop using a BIG-IP LTM virtual server for DNS response. | [] |
|
CVE-2008-3417 | SQL injection vulnerability in home/index.asp in fipsCMS light 2.1 and earlier allows remote attackers to execute arbitrary SQL commands via the r parameter, a different vector than CVE-2006-6115 and CVE-2007-2561. | [
"cpe:2.3:a:fipsasp:fipscms_light:*:*:*:*:*:*:*:*"
] |
|
GHSA-xhq4-5269-2ffv | In Qt through 5.14.1, the WebSocket implementation accepts up to 2GB for frames and 2GB for messages. Smaller limits cannot be configured. This makes it easier for attackers to cause a denial of service (memory consumption). | [] |
|
GHSA-9r74-cmm5-qv85 | The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.6 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "AuthType oauth20" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic. | [] |
|
GHSA-g7rg-6958-g2v5 | The Social Sharing Toolkit WordPress plugin through 2.6 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins. | [] |
|
CVE-2021-36426 | File Upload vulnerability in phpwcms 1.9.25 allows remote attackers to run arbitrary code via crafted file upload to include/inc_lib/general.inc.php. | [
"cpe:2.3:a:phpwcms:phpwcms:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-20363 | LibRaw::raw2image in libraw_cxx.cpp in LibRaw 0.19.1 has a NULL pointer dereference. | [
"cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*"
] |
|
CVE-2015-0540 | SQL injection vulnerability in the xAdmin interface in EMC Document Sciences xPression 4.2 before P44 and 4.5 SP1 before P03 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors. | [
"cpe:2.3:a:emc:document_sciences_xpression:4.2:-:-:*:documentum:*:*:*",
"cpe:2.3:a:emc:document_sciences_xpression:4.2:-:-:*:enterprise:-:-:compuset_engine",
"cpe:2.3:a:emc:document_sciences_xpression:4.2:-:-:*:enterprise:-:-:publish_engine",
"cpe:2.3:a:emc:document_sciences_xpression:4.5:sp1:*:*:documentum:*:*:*",
"cpe:2.3:a:emc:document_sciences_xpression:4.5:sp1:*:*:enterprise:*:*:*"
] |
|
GHSA-p6hw-vxmg-57qg | RSA Netwitness Platform versions prior to 11.2.1.1 and RSA Security Analytics versions prior to 10.6.6.1 are vulnerable to a Command Injection vulnerability due to missing input validation in the product. A remote unauthenticated malicious user could exploit this vulnerability to execute arbitrary commands on the server. | [] |
|
GHSA-7vx4-7qfx-ch7x | Unspecified vulnerability in the Siebel UI Framework component in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote authenticated users to affect integrity via unknown vectors related to ActiveX Controls. | [] |
|
CVE-2020-8323 | A potential vulnerability in the SMI callback function used in the Legacy SD driver in some Lenovo ThinkPad, ThinkStation, and Lenovo Notebook models may allow arbitrary code execution. | [
"cpe:2.3:o:lenovo:330-14ast_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:330-14ast:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:330-15ast_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:330-15ast:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:330-17ast_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:330-17ast:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:340c-15api_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:340c-15api:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:340c-15ast_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:340c-15ast:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:720s_touch-15ikb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:720s_touch-15ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:720s-15ikb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:720s-15ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:730s-13iwl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:730s-13iwl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:c640-iml_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:c640-iml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:e42-80_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:e42-80:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:e52-80_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:e52-80:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:k22-80_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:k22-80:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v720-12_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v720-12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:k32-80_kbl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:k32-80_kbl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:k32-80_skl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:k32-80_skl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:miix_720-12ikb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:miix_720-12ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s145-14api_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s145-14api:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s145-14ast_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s145-14ast:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s145-15api_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s145-15api:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s145-15ast_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s145-15ast:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s540-13api_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s540-13api:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s750-iil_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s750-iil:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s940-14iwl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s940-14iwl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_13s-iwl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_13s-iwl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_14s-iwl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_14s-iwl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v110-14ast_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v110-14ast:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v110-14ikb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v110-14ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v110-15ast_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v110-15ast:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v130-15igm_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v130-15igm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v130-15ikb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v130-15ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v310-15igm_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v310-15igm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v330-15igm_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v330-15igm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v330-15ikb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v330-15ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v330-15isk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v330-15isk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v340-iil_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v340-iil:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v340-iml_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v340-iml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v540s-13_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v540s-13:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:14iwl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:14iwl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v730-13ikb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v730-13ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v730-13isk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v730-13isk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v730-15ikb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v730-15ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:wei5-15ikb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:wei5-15ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:xiaoxin_14-ast_qc_2019_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:xiaoxin_14-ast_qc_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:xx-14api_qc_2019_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:xx-14api_qc_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_s730-13iwl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_s730-13iwl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_s940-14iwl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_s940-14iwl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:6_pro-13-iwl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:6_pro-13-iwl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:6_pro-14-iwl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:6_pro-14-iwl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:e53-80_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:e53-80:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:k3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:k3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:k4-iwl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:k4-iwl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_11e_yoga_gen_6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_11e_yoga_gen_6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_11e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_11e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_yoga_11e_3rd_gen_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_yoga_11e_3rd_gen:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_yoga_11e_4th_gen_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_yoga_11e_4th_gen:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_yoga_11e_5th_gen_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_yoga_11e_5th_gen:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_13_2nd_gen_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_13_2nd_gen:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_13_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_13:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_a275_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_a275:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_a285_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_a285:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_a475_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_a475:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_a485_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_a485:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e14_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e14:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e15_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e15:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_r14_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_r14:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_s3_gen_2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s3_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e455_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e455:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e555_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e555:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e460_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e460:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e560_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e560:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e465_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e465:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e565_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e565:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e470_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e470:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e570_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e570:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e475_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e475:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e575_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e575:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e580_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e485_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e485:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e585_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e585:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e490s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e490s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_s3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e490_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e590_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e590:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_r490_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_r490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_r590_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_r590:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l13_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l13:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l1415_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l1415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l380_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_s3_3rd_gen_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s3_3rd_gen:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l380_yoga_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l380_yoga:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_s2_yoga_3rd_gen_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s2_yoga_3rd_gen:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l390_yoga_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l390_yoga:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_s2_yoga_4th_gen_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s2_yoga_4th_gen:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l460_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l460:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l470_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l470:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l580_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l490_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l590_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l590:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l560_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l560:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l570_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l570:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p43s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p43s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p50s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p50s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p51_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p51:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p51s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p51s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p52_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p52:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p52s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p52s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p53_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p53:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p53s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p53s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p70_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p70:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p71_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p71:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p72_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p72:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p73_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p73:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_s5_2nd_gen_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s5_2nd_gen:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_s5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e560p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e560p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t25_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t25:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t460_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t460:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t460p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t460p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t460s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t460s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t470_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t470:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t470p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t470p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t470s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t470s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t480s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t480s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t490_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t490s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t490s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t560_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t560:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t570_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t570:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t580_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t590_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t590:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x1_carbon_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_carbon:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x1_yoga_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_yoga:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x1_extreme_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_extreme:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x1_tablet_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_tablet:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x270_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x270:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x280_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x280:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x380_yoga_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x380_yoga:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x390_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x390_yoga_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x390_yoga:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x395_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x395:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_yoga_260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_yoga_260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_s1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_yoga_370_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_yoga_370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_s1_3rd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s1_3rd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t495_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t495:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t495s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t495s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_helix_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_helix:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_s1_yoga_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s1_yoga:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_s1_yoga_vpro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s1_yoga_vpro:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_s5_yoga_15_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s5_yoga_15:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_s540_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s540:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t440_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t440:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t440s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t440s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t440p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t440p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t540_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t540:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t540p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t540p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t550_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_w540_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_w540:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_w541_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_w541:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_w550s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_w550s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x1_carbon_\\(20ax\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_carbon_\\(20ax\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x1_carbon_\\(20bx\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_carbon_\\(20bx\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x140e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x140e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x240s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x240s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_yoga_11e_\\(20dx\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_yoga_11e_\\(20dx\\):-:*:*:*:*:*:*:*"
] |
|
GHSA-mvvp-jc53-vjxq | FreeType before 2.6.1 has a buffer over-read in skip_comment in psaux/psobjs.c because ps_parser_skip_PS_token is mishandled in an FT_New_Memory_Face operation. | [] |
|
GHSA-xqfj-957m-q7h8 | The kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to obtain information via a specially crafted application. aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-8492, CVE-2017-8491, CVE-2017-8490, CVE-2017-8489, CVE-2017-8488, CVE-2017-8485, CVE-2017-8483, CVE-2017-8482, CVE-2017-8481, CVE-2017-8478, CVE-2017-8476, CVE-2017-8474, CVE-2017-8469, CVE-2017-8462, CVE-2017-0300, CVE-2017-0299, and CVE-2017-0297. | [] |
|
GHSA-jg83-3336-7m7m | SQL injection vulnerability in paidbanner.php in LM Starmail Paidmail 2.0 allows remote attackers to execute arbitrary SQL commands via the ID parameter. | [] |
|
CVE-2022-46843 | WordPress Woocommerce Vietnam Checkout Plugin <= 2.0.4 is vulnerable to Cross Site Scripting (XSS) | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Le Van Toan Woocommerce Vietnam Checkout plugin <= 2.0.4 versions. | [
"cpe:2.3:a:levantoan:woocommerce_vietnam_checkout:*:*:*:*:*:wordpress:*:*"
] |
CVE-2017-10028 | Vulnerability in the BI Publisher component of Oracle Fusion Middleware (subcomponent: Web Server). The supported version that is affected is 11.1.1.7.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise BI Publisher. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in BI Publisher, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all BI Publisher accessible data as well as unauthorized update, insert or delete access to some of BI Publisher accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). | [
"cpe:2.3:a:oracle:business_intelligence_publisher:11.1.1.7.0:*:*:*:*:*:*:*"
] |
|
CVE-2019-15829 | The photoblocks-grid-gallery plugin before 1.1.33 for WordPress has wp-admin/admin.php?page=photoblocks-edit&id= XSS. | [
"cpe:2.3:a:greentreelabs:gallery_photoblocks:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2017-13187 | An information disclosure vulnerability in the Android media framework (libhevc). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-65034175. | [
"cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*"
] |
|
CVE-2019-13511 | Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier contain an INFORMATION EXPOSURE CWE-200. A maliciously crafted Arena file opened by an unsuspecting user may result in the limited exposure of information related to the targeted workstation. | [
"cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*"
] |
|
GHSA-mv59-w8cf-g9q7 | Apport reads and writes information on a crashed process to /proc/pid with elevated privileges. Apport then determines which user the crashed process belongs to by reading /proc/pid through get_pid_info() in data/apport. An unprivileged user could exploit this to read information about a privileged running process by exploiting PID recycling. This information could then be used to obtain ASLR offsets for a process with an existing memory corruption vulnerability. The initial fix introduced regressions in the Python Apport library due to a missing argument in Report.add_proc_environ in apport/report.py. It also caused an autopkgtest failure when reading /proc/pid and with Python 2 compatibility by reading /proc maps. The initial and subsequent regression fixes are in 2.20.11-0ubuntu16, 2.20.11-0ubuntu8.6, 2.20.9-0ubuntu7.12, 2.20.1-0ubuntu2.22 and 2.14.1-0ubuntu3.29+esm3. | [] |
|
CVE-2002-1598 | Buffer overflows in Computer Associates MLink (CA-MLink) 6.5 and earlier may allow local users to execute arbitrary code via long command line arguments to (1) mlclear or (2) mllock. | [
"cpe:2.3:a:broadcom:mlink:6.5:*:*:*:*:*:*:*"
] |
|
CVE-2023-38467 | In urild service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] |
|
GHSA-4gxp-6chj-c99r | Mesa 23.0.4 was discovered to contain a NULL pointer dereference in check_xshm() for the has_error state. NOTE: this is disputed because there is no scenario in which the vulnerability was demonstrated. | [] |
|
CVE-2018-9233 | Sophos Endpoint Protection 10.7 uses an unsalted SHA-1 hash for password storage in %PROGRAMDATA%\Sophos\Sophos Anti-Virus\Config\machine.xml, which makes it easier for attackers to determine a cleartext password, and subsequently choose unsafe malware settings, via rainbow tables or other approaches. | [
"cpe:2.3:a:sophos:endpoint_protection:10.7:*:*:*:*:*:*:*"
] |
|
CVE-2023-25165 | getHostByName Function Information Disclosure | Helm is a tool that streamlines installing and managing Kubernetes applications.`getHostByName` is a Helm template function introduced in Helm v3. The function is able to accept a hostname and return an IP address for that hostname. To get the IP address the function performs a DNS lookup. The DNS lookup happens when used with `helm install|upgrade|template` or when the Helm SDK is used to render a chart. Information passed into the chart can be disclosed to the DNS servers used to lookup the IP address. For example, a malicious chart could inject `getHostByName` into a chart in order to disclose values to a malicious DNS server. The issue has been fixed in Helm 3.11.1. Prior to using a chart with Helm verify the `getHostByName` function is not being used in a template to disclose any information you do not want passed to DNS servers. | [
"cpe:2.3:a:helm:helm:*:*:*:*:*:*:*:*"
] |
GHSA-8hc3-223h-5c5w | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). | [] |
|
CVE-2019-1010101 | Akeo Consulting Rufus 3.0 and earlier is affected by: Insecure Permissions. The impact is: arbitrary code execution with escalation of privilege. The component is: Executable installer, portable executable (ALL executables available). The attack vector is: CWE-29, CWE-377, CWE-379. | [
"cpe:2.3:a:akeo:rufus:*:*:*:*:*:*:*:*"
] |
|
GHSA-9p8x-f768-wp2g | xml-crypto Vulnerable to XML Signature Verification Bypass via Multiple SignedInfo References | ImpactAn attacker may be able to exploit this vulnerability to bypass authentication or authorization mechanisms in systems that rely on xml-crypto for verifying signed XML documents. The vulnerability allows an attacker to modify a valid signed XML message in a way that still passes signature verification checks. For example, it could be used to alter critical identity or access control attributes, enabling an attacker with a valid account to escalate privileges or impersonate another user.PatchesAll versions <= 6.0.0 are affected. Please upgrade to version 6.0.1.If you are still using v2.x or v3.x please upgrade to the associated patch version.Indicators of CompromiseWhen logging XML payloads, check for the following indicators. If the payload includes encrypted elements, ensure you analyze the decrypted version for a complete assessment. (If encryption is not used, analyze the original XML document directly). This applies to various XML-based authentication and authorization flows, such as SAML Response payloads.Multiple SignedInfo NodesThere should not be more than one SignedInfo node inside a Signature. If you find multiple SignedInfo nodes, it could indicate an attack.Code to testPass in the decrypted version of the document | [] |
GHSA-hh45-jmxc-j9rr | OS command injection vulnerability in ELECOM wireless LAN routers allows an attacker who can access the product to execute an arbitrary OS command by sending a specially crafted request. Affected products and versions are as follows: WRC-F1167ACF all versions, WRC-1750GHBK all versions, WRC-1167GHBK2 all versions, WRC-1750GHBK2-I all versions, and WRC-1750GHBK-E all versions. | [] |
|
GHSA-f34g-hcmw-4g52 | The SendCombinedStatusInfo implementation in Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 7.0SU before 7.0(2a)SU3, 7.1 before 7.1(5), and 8.0 before 8.0(3) allows remote attackers to cause a denial of service (process failure) via a malformed SIP REGISTER message, aka Bug ID CSCtf66305. | [] |
|
CVE-2022-2185 | A critical issue has been discovered in GitLab affecting all versions starting from 14.0 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 where an authenticated user authorized to import projects could import a maliciously crafted project leading to remote code execution. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:15.1.0:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:15.1.0:*:*:*:enterprise:*:*:*"
] |
|
CVE-2018-25063 | Zenoss Dashboard defaultportlets.js cross site scripting | A vulnerability classified as problematic was found in Zenoss Dashboard up to 1.3.4. Affected by this vulnerability is an unknown functionality of the file ZenPacks/zenoss/Dashboard/browser/resources/js/defaultportlets.js. The manipulation of the argument HTMLString leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.3.5 is able to address this issue. The identifier of the patch is f462285a0a2d7e1a9255b0820240b94a43b00a44. It is recommended to upgrade the affected component. The identifier VDB-217153 was assigned to this vulnerability. | [
"cpe:2.3:a:zenoss:dashboard:*:*:*:*:*:zenoss:*:*"
] |
GHSA-4jrw-3q8x-9gpf | An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 software in all versions through 2.6.2. Inproper use of access validation allows a logged in user to see devices in the account he should not have access to. | [] |
|
CVE-2024-23531 | An Integer Overflow vulnerability in WLInfoRailService component of Ivanti Avalanche before 6.4.3 allows an unauthenticated remote attacker to perform denial of service attacks. In certain rare conditions this could also lead to reading content from memory. | [
"cpe:2.3:a:ivanti:avalanche:6.4.3:*:*:*:*:*:*:*"
] |
|
CVE-2016-1000222 | Logstash prior to version 2.1.2, the CSV output can be attacked via engineered input that will create malicious formulas in the CSV data. | [
"cpe:2.3:a:elastic:logstash:*:*:*:*:*:*:*:*"
] |
|
CVE-2006-1954 | SQL injection vulnerability in authent.php4 in Nicolas Fischer (aka NFec) RechnungsZentrale V2 1.1.3, and possibly earlier versions, allows remote attackers to execute arbitrary SQL commands via the User field. | [
"cpe:2.3:a:nfec.de:rechnungszentrale:v2_1.1.3:*:*:*:*:*:*:*"
] |
|
GHSA-pgrj-3jmg-f2wq | In all Qualcomm products with Android releases from CAF using the Linux kernel, a buffer over-read vulnerability exists in a TrustZone syscall. | [] |
|
CVE-2018-18248 | Icinga Web 2 has XSS via the /icingaweb2/monitoring/list/services dir parameter, the /icingaweb2/user/list query string, the /icingaweb2/monitoring/timeline query string, or the /icingaweb2/setup query string. | [
"cpe:2.3:a:icinga:icinga_web_2:2.6.1:*:*:*:*:*:*:*"
] |
|
CVE-2019-20685 | Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects D3600 before 1.0.0.75, D6000 before 1.0.0.75, D6200 before 1.1.00.32, D7000 before 1.0.1.68, DM200 before 1.0.0.58, JR6150 before 1.0.1.18, PR2000 before 1.0.0.28, R6020 before 1.0.0.38, R6050 before 1.0.1.18, R6080 before 1.0.0.38, R6120 before 1.0.0.46, R6220 before 1.1.0.80, R6260 before 1.1.0.40, R6700v2 before 1.2.0.36, R6800 before 1.2.0.36, R6900v2 before 1.2.0.36, WNR2020 before 1.1.0.62, and XR500 before 2.3.2.32. | [
"cpe:2.3:o:netgear:d3600_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d3600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d6000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d6200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:jr6150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:jr6150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:pr2000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:pr2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6050_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6050:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6080_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6080:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6120_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6120:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6220_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6220:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6700:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6900:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr2020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr2020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:xr500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:xr500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:dm200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:dm200:-:*:*:*:*:*:*:*"
] |
|
GHSA-pm3v-7943-w34p | The Ibtana WordPress plugin before 1.1.4.9 does not have authorisation and CSRF checks in the ive_save_general_settings AJAX action, allowing any authenticated users, such as subscriber to call it and change the plugin's settings which could lead to Stored Cross-Site Scripting issue. | [] |
|
GHSA-5497-w594-j5r2 | Multiple cross-site scripting (XSS) vulnerabilities in the Search Module in PHP-Nuke allow remote attackers to inject arbitrary web script or HTML via a trailing "<" instead of a ">" in (1) the onerror attribute of an IMG element, (2) the onload attribute of an IFRAME element, or (3) redirect users to other sites via the META tag. | [] |
|
GHSA-m9q2-px3p-j8fg | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Sendsmaily LLC Smaily for WP allows Stored XSS.This issue affects Smaily for WP: from n/a through 3.1.2. | [] |
|
CVE-2018-19832 | The NETM() function of a smart contract implementation for NewIntelTechMedia (NETM), an tradable Ethereum ERC20 token, allows attackers to change the owner of the contract, because the function does not check the caller's identity. | [
"cpe:2.3:a:newinteltechmedia_project:newinteltechmedia:-:*:*:*:*:*:*:*"
] |
|
GHSA-fvfg-7v3r-g9v3 | The function "generate_app_certificates" in controllers/saml2/saml2.js of FIWARE Keyrock <= 8.4 does not neutralize special elements used in an OS Command properly. This allows an authenticated user with permissions to create applications to execute commands by creating an application with a malicious organisationname. | [] |
|
GHSA-jh8w-c4jf-q549 | The Document::open function in WebKit/Source/core/dom/Document.cpp in Google Chrome before 47.0.2526.73 does not ensure that page-dismissal event handling is compatible with modal-dialog blocking, which makes it easier for remote attackers to spoof Omnibox content via a crafted web site. | [] |
|
GHSA-xr7q-92rc-hj9g | In onUidStateChanged of AppOpsService.java, there is a possible way to access location without a visible indicator due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-208662370 | [] |
|
GHSA-c8q3-rcwc-qf4v | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Padam Shankhadev Nepali Post Date allows Stored XSS. This issue affects Nepali Post Date: from n/a through 5.1.1. | [] |
|
GHSA-6mjq-9x4w-m3w9 | FOSUserBundle Session Hijacking Vulnerability | Versions of FOSUserBundle from 1.2.x to 1.2.4 have been found to contain a security vulnerability related to session hijacking. This issue has been addressed in version 1.2.4, and users are strongly advised to upgrade to the latest version to prevent potential session-related security risks. | [] |
GHSA-gvj6-3w5f-w6x2 | The all-in-one-wp-security-and-firewall plugin before 4.0.5 for WordPress has XSS in the blacklist, file system, and file change detection settings pages. | [] |
|
CVE-2020-35776 | A buffer overflow in res_pjsip_diversion.c in Sangoma Asterisk versions 13.38.1, 16.15.1, 17.9.1, and 18.1.1 allows remote attacker to crash Asterisk by deliberately misusing SIP 181 responses. | [
"cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-0173 | Authentication bypass in the web console for Intel(R) Raid Web Console 2 all versions may allow an unauthenticated attacker to potentially enable disclosure of information via network access. | [
"cpe:2.3:a:intel:raid_web_console_2:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-28938 | Uncontrolled resource consumption in some Intel(R) SSD Tools software before version mdadm-4.2-rc2 may allow a priviledged user to potentially enable denial of service via local access. | [
"cpe:2.3:a:mdadm_project:mdadm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mdadm_project:mdadm:4.2:rc1:*:*:*:*:*:*"
] |
|
CVE-2025-32809 | W. W. Norton InQuizitive through 2025-04-08 allows students to conduct stored XSS attacks against educators via a bonus description, feedback.choice_fb[], or question_id. | [] |
|
GHSA-v9v4-7jp6-8c73 | rails Cross-site Scripting vulnerability | The cross-site scripting (XSS) prevention feature in Ruby on Rails 2.x before 2.3.12, 3.0.x before 3.0.8, and 3.1.x before 3.1.0.rc2 does not properly handle mutation of safe buffers, which makes it easier for remote attackers to conduct XSS attacks via crafted strings to an application that uses a problematic string method, as demonstrated by the sub method. | [] |
CVE-2020-3313 | Cisco Firepower Management Center Cross-Site Scripting Vulnerability | A vulnerability in the web UI of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of the FMC Software. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or to access sensitive, browser-based information. | [
"cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*"
] |
GHSA-qx57-q6j5-g6mg | A race condition vulnerability exists where an authenticated, local attacker on a Windows Nessus host could modify installation parameters at installation time, which could lead to the execution of arbitrary code on the Nessus host | [] |
|
GHSA-77gf-xcq5-37mm | dedecmdv6 6.1.9 is vulnerable to SQL Injection. via sys_sql_query.php. | [] |
|
GHSA-qp94-wj83-fxfq | Directory traversal vulnerability in the save_config function in ntpd in ntp_control.c in NTP before 4.2.8p4, when used on systems that do not use '\' or '/' characters for directory separation such as OpenVMS, allows remote authenticated users to overwrite arbitrary files. | [] |
|
CVE-2020-16142 | On Mercedes-Benz C Class AMG Premium Plus c220 BlueTec vehicles, the Bluetooth stack mishandles %x and %c format-string specifiers in a device name in the COMAND infotainment software. | [
"cpe:2.3:o:mercedes-benz:comand:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mercedes-benz:c220:-:*:*:*:*:*:*:*"
] |
|
GHSA-w6xv-37jv-7cjr | Windows Libarchive Remote Code Execution Vulnerability | [] |
|
CVE-2014-8563 | Synacor Zimbra Collaboration before 8.0.9 allows plaintext command injection during STARTTLS. | [
"cpe:2.3:a:synacor:zimbra_collaboration_server:*:*:*:*:*:*:*:*"
] |
|
GHSA-m8ff-4vvh-r9f2 | An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1486, CVE-2020-1566. | [] |
|
GHSA-px9x-q62h-7x5r | Multiple cross-site scripting (XSS) vulnerabilities in Vision Source 0.6 and earlier allow remote attackers to inject arbitrary web script or HTML via the fields in a user's profile. | [] |
|
GHSA-crf6-458w-xw5q | The svc_run function in the RPC implementation in glibc before 2.15 allows remote attackers to cause a denial of service (CPU consumption) via a large number of RPC connections. | [] |
|
GHSA-px9q-gpw3-m3qw | Open redirect vulnerability in the Forms Authentication feature in the ASP.NET subsystem in Microsoft .NET Framework 2.0 SP2, 3.5 SP1, 3.5.1, and 4.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a crafted return URL, aka "Insecure Redirect in .NET Form Authentication Vulnerability." | [] |
|
CVE-2020-4767 | IBM Sterling Connect Direct for Microsoft Windows 4.7, 4.8, 6.0, and 6.1 could allow a remote attacker to cause a denial of service, caused by a buffer over-read. Bysending a specially crafted request, the attacker could cause the application to crash. IBM X-Force ID: 188906. | [
"cpe:2.3:a:ibm:sterling_connect\\:direct:*:*:*:*:*:windows:*:*"
] |
|
GHSA-r6fc-r595-mg6f | An elevation of privilege vulnerability exists in Microsoft Dynamics 365 Server, aka 'Microsoft Dynamics 365 Elevation of Privilege Vulnerability'. | [] |
|
GHSA-jp35-3cfx-prf3 | The MSM camera driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to obtain sensitive information from kernel stack memory via (1) a crafted MSM_MCR_IOCTL_EVT_GET ioctl call, related to drivers/media/platform/msm/camera_v1/mercury/msm_mercury_sync.c, or (2) a crafted MSM_JPEG_IOCTL_EVT_GET ioctl call, related to drivers/media/platform/msm/camera_v2/jpeg_10/msm_jpeg_sync.c. | [] |
|
GHSA-g34w-4mj2-gjww | Multiple cross-site scripting (XSS) vulnerabilities in JBPM KIE Workbench 6.0.x allow remote authenticated users to inject arbitrary web script or HTML via vectors related to task name html inputs. | [] |
|
CVE-2022-48345 | sanitize-url (aka @braintree/sanitize-url) before 6.0.2 allows XSS via HTML entities. | [
"cpe:2.3:a:paypal:braintree\\/sanitize-url:*:*:*:*:*:node.js:*:*"
] |
|
CVE-2021-44206 | Local privilege escalation due to DLL hijacking vulnerability in Acronis Media Builder service | Local privilege escalation due to DLL hijacking vulnerability in Acronis Media Builder service. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287 | [
"cpe:2.3:a:acronis:true_image:2021:-:*:*:*:windows:*:*",
"cpe:2.3:a:acronis:true_image:2021:update_1:*:*:*:windows:*:*",
"cpe:2.3:a:acronis:true_image:2021:update_2:*:*:*:windows:*:*",
"cpe:2.3:a:acronis:true_image:2021:update_3:*:*:*:windows:*:*",
"cpe:2.3:a:acronis:true_image:2021:update_4:*:*:*:windows:*:*",
"cpe:2.3:a:acronis:cyber_protect_home_office:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
CVE-2025-23952 | WordPress Custom Field List Widget Plugin <= 1.5.1 - Local File Inclusion vulnerability | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ntm custom-field-list-widget allows PHP Local File Inclusion. This issue affects custom-field-list-widget: from n/a through 1.5.1. | [] |
GHSA-f2f3-h72c-p996 | NVIDIA GPU Display Driver for Windows contains a vulnerability in the user mode layer, where an unprivileged regular user can cause an out-of-bounds read. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.