id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
---|---|---|---|
CVE-2025-22792
|
WordPress Js O3 Lite theme <= 1.5.8.2 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in jinwen Js O3 Lite allows Reflected XSS.This issue affects Js O3 Lite: from n/a through 1.5.8.2.
|
[] |
CVE-2022-44910
|
Binbloom 2.0 was discovered to contain a heap buffer overflow via the read_pointer function at /binbloom-master/src/helpers.c.
|
[
"cpe:2.3:a:quarkslab:binbloom:2.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-3123
|
CHANGING Mobile One Time Password - Arbitrary File Upload
|
CHANGING Mobile One Time Password's uploading function in a hidden page does not filter file type properly. Remote attackers with administrator privilege can exploit this vulnerability to upload and run malicious file to execute system commands.
|
[
"cpe:2.3:a:changingtec:mobile_one_time_password:3.11:*:*:*:*:*:*:*"
] |
CVE-2010-2882
|
DIRAPI.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x3812 of a certain file.
|
[
"cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*"
] |
|
CVE-2021-46179
|
Reachable Assertion vulnerability in upx before 4.0.0 allows attackers to cause a denial of service via crafted file passed to the the readx function.
|
[
"cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*"
] |
|
GHSA-ph62-9j8f-j6ff
|
An argument injection vulnerability in the browser-based authentication component of the Magnitude Simba Amazon Redshift ODBC Driver (1.4.14 through 1.4.21.1001 and 1.4.22 through 1.4.x before 1.4.52) may allow a local user to execute arbitrary code.
|
[] |
|
GHSA-29jj-q7hj-hfcf
|
An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. XSS exists via the wp-admin/admin.php logo_width parameter.
|
[] |
|
GHSA-8cwf-cg6r-crcf
|
RADOS Gateway in Ceph 12.1.0 through 12.2.1 allows remote authenticated users to cause a denial of service (assertion failure and application exit) by leveraging "full" (not necessarily admin) privileges to post an invalid profile to the admin API, related to rgw/rgw_iam_policy.cc, rgw/rgw_basic_types.h, and rgw/rgw_iam_types.h.
|
[] |
|
CVE-2024-47406
|
Sharp and Toshiba Tec MFPs improperly process HTTP authentication requests, resulting in an authentication bypass vulnerability.
|
[
"cpe:2.3:o:sharp:bp-90c70_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-90c80_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-50c26_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-50c31_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-50c36_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-50c45_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-50c55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-50c65_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-55c26_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-60c31_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-60c36_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-60c45_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-70c31_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-70c36_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-70c45_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-70c55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-70c65_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-7081_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-8081_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b356w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b356wh_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b376w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b376wh_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b456w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b456wh_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b476w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b476wh_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m905_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-2651_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3051_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3061_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3061s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3071_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3071s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3551_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3561_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3561s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3571_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3571s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4051_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4061_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4061s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4071_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4071s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-5051_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-5071_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-5071s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-6051_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-6071_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-6071s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-30c25t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-30c25y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-30c25z_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-30c25_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-6580n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-7580n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-7090n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-8090n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-2630n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3050n_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3050n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3050v_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3050v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3550n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3550v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4050n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4050v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-5050n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-5050v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-6050n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-6050v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3060n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3060v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3070n_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3070n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3070v_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3070v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3560n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3560v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3570n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3570v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4060n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4060v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4070n_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4070n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4070v_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4070v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-5070n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-5070v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-6070n_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-6070n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-6070v_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-6070v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-c533wd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-c533wr_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-c535wd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-c535wr_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-c542wd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-c545wd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-c303_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-c303w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-c303wh_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-c304_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-c304w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-c304wh_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-70m75_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-70m90_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-50m26_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-50m31_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-50m36_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-50m45_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-50m50_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-50m55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-70m31_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-70m36_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-70m45_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-70m55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-70m65_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m1056_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m1206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m6570_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m7570_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m5051_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m4051_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m2651_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m3051_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m3071_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m3071s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m3551_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m3571_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m3571s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m4071_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m4071s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m5071_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m5071s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m6051_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m6071_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m6071s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-30m28_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-30m28t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-30m31_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-30m31t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-30m35_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-30m35t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m3550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m2630_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m2630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m3050_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m3050_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m3070_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m3070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m3570_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m4050_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m4070_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m4070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m5050_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m5070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m6050_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m6070_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m6070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-b537wr_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-b540wr_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-b547wd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-b550wd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b355w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b355wt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b355wz_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b455w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b455wt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b455wz_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:toshibatec:e-studio-908_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:toshibatec:e-studio-1058_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:toshibatec:e-studio-1208_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:toshibatec:e-studio1058_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio1058:-:*:*:*:*:*:*:*",
"cpe:2.3:o:toshibatec:e-studio1208_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio1208:-:*:*:*:*:*:*:*",
"cpe:2.3:o:toshibatec:e-studio908_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio908:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-90c70_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-90c70:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-90c80_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-90c80:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-70c65:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-70c55:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-70c45:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-70c36:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-70c31:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-60c45:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-60c36:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-60c31:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-50c65:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-50c55:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-50c45:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-50c36:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-50c31:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-50c26:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-55c26:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-8081:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-7081:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-6071:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-5071:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4071:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3571:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3071:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4061:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3561:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3061:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-6051:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-5051:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4051:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3551:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3051:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-2651:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-6071s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-5071s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4071s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3571s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3071s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4061s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3561s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3061s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-30c25:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-30c25y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-30c25z:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-30c25t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-7580n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-6580n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-8090n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-7090n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-6070n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-5070n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4070n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3570n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3070n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4060n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3560n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3060n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-6070v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-5070v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4070v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3570v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3070v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4060v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3560v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3060v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-6070n_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4070n_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3070n_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-6070v_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4070v_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3070v_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-6050n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-5050n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4050n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3550n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3050n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-6050v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-5050v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4050v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3550v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3050v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-2630n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3050n_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3050v_a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-c545wd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-c545wd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-c542wd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-c542wd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-c535wd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-c535wd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-c533wd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-c533wd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-c535wr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-c535wr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-c533wr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-c533wr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-c304w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-c303w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-c304:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-c303:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-c304wh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-c303wh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-70m90:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-70m75:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-70m65:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-70m55:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-70m45:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-70m36:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-70m31:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-50m55:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-50m50:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-50m45:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-50m36:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-50m31:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-50m26:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m1206:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m1056:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m7570:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m6570:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m6071:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m5071:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m4071:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m3571:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m3071:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m6051:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m5051:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m4051:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m3551:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m3051:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m2651:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m3571s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m3071s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m6071s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m5071s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m4071s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-30m35:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-30m31:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-30m28:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-30m35t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-30m31t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-30m28t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b476w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b376w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b456w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b356w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b476wh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b376wh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b456wh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b356wh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m905:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m6070:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m5070:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m4070:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m3570:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m3070:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m6050:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m5050:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m4050:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m3550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m3050:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m2630:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m6070_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m4070_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m3070_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m3050_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m2630_a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-b550wd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-b550wd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-b540wr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-b540wr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-b547wd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-b547wd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-b537wr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-b537wr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b455w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b355w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b455wz:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b355wz:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b455wt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b355wt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-7500n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-7500n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-6500n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-6500n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-7040n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-7040n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-6240n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-6240n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-5141n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-5141n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-5140n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-5140n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4141n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4141n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4140n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4140n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-5141n_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-5141n_a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4140n_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4140n_a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3640n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3640n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3140n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3140n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-2640n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-2640n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3140n_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3140n_a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3640nr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3640nr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3140nr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3140nr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-2640nr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-2640nr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3116n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3116n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-2616n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-2616n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3115n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3115n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-2615n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-2615n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-2615_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-2615_a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-5112n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-5112n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-5111n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-5111n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-5110n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-5110n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4112n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4112n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4111n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4111n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4110n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4110n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3610n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3610n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3110n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3110n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-2610n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-2610n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3110n_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3110n_a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3610nr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3610nr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-c301w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-c301w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-c301_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-c301:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3114n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3114n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-2614n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-2614n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-2314n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-2314n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-2314nr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-2314nr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3111u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3111u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-2310u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-2310u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-2310r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-2310r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-2010u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-2010u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-1810u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-1810u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-c401_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-c401:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:dx-c401_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:dx-c401:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:dx-c401_j_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:dx-c401_j:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-c400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-c400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:dx-c400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:dx-c400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-c381_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-c381:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:dx-c381_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:dx-c381:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-c380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-c380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-c381b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-c381b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-c312_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-c312:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-c311_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-c311:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:dx-c311_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:dx-c311:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:dx-c311j_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:dx-c311j:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-c310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-c310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:dx-c310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:dx-c310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-c400p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-c400p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-c380p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-c380p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-c402sc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-c402sc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-c382sc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-c382sc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-c382scb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-c382scb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-5001n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-5001n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-5000n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-5000n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4101n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4101n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4100n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4100n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3100n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3100n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3100g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3100g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-2600n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-2600n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-2600g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-2600g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3101n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3101n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-2601n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-2601n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-2301n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-2301n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:dx-2500n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:dx-2500n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:dx-2000u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:dx-2000u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m1205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m1205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m1055_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m1055:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m1204_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m1204:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m1054_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m1054:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m904_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m904:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m754n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m754n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m654n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m654n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m754n_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m754n_a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m654n_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m654n_a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m565n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m565n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m465n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m465n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m365n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m365n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m465n_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m465n_a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m365n_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m365n_a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m564n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m564n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m464n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m464n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m364n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m364n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m564n_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m564n_a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m356n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m356n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m316n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m316n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m315n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m315n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m356u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m356u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m315u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m315u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m266n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m266n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m265n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m265n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m265u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m265u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m315ne_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m315ne:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m265ne_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m265ne:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m356nv_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m356nv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m316nv_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m316nv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m315nv_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m315nv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m356uv_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m356uv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m315uv_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m315uv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m266nv_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m266nv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m265nv_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m265nv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m265uv_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m265uv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m315v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m315v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m265v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m265v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m354n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m354n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m314n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m314n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m264n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m264n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m354u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m354u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m314u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m314u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m264u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m264u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m314nv_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m314nv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m264nv_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m264nv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m354nr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m354nr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m314nr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m314nr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m264nr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m264nr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b402_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b402:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b382_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b382:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b402p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b402p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b382p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b382p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b402sc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b402sc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b382sc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b382sc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b401_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b401:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b381_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b381:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b400p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b400p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b380p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b380p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m753n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m753n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m753u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m753u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m623n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m623n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m623u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m623u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m503n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m503n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m453n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m453n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m363n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m363n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m283n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m283n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m503u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m503u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m453u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m453u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m363u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m363u:-:*:*:*:*:*:*:*"
] |
|
GHSA-3xcc-p2pv-9q9p
|
PHPIDS before 20070703 does not properly handle (1) arithmetic expressions and (2) unclosed comments, which allows remote attackers to inject arbitrary web script.
|
[] |
|
GHSA-88gc-h5ch-vcch
|
RosarioSIS 6.7.2 is vulnerable to XSS, caused by improper validation of user-supplied input by the PrintSchedules.php script. A remote attacker could exploit this vulnerability using the include_inactive parameter in a crafted URL.
|
[] |
|
CVE-2024-43212
|
WordPress WpTravelly plugin <= 1.7.7 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in MagePeople Team WpTravelly allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects WpTravelly: from n/a through 1.7.7.
|
[
"cpe:2.3:a:magepeople:wptravelly:*:*:*:*:*:*:*:*"
] |
CVE-2022-42348
|
AEM Reflected XSS Arbitrary code execution
|
Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
[
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*"
] |
CVE-2018-12010
|
In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, Absence of length sanity check may lead to possible stack overflow resulting in memory corruption in trustzone region.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
GHSA-m9r4-3v2g-qcj7
|
The veth (aka virtual Ethernet) driver in the Linux kernel before 2.6.34 does not properly manage skbs during congestion, which allows remote attackers to cause a denial of service (system crash) by leveraging lack of skb consumption in conjunction with a double-free error.
|
[] |
|
GHSA-2qrc-2p98-7jhh
|
Use-after-free vulnerability in modules/speech/SpeechSynthesis.cpp in Blink, as used in Google Chrome before 33.0.1750.149, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of a certain utterance data structure.
|
[] |
|
CVE-2009-0857
|
Cross-site scripting (XSS) vulnerability in /prm/reports in the Performance Reporting Module (PRM) for Sun Management Center (SunMC) 3.6.1 and 4.0 allows remote attackers to inject arbitrary web script or HTML via the msg parameter. NOTE: this can be leveraged for access to the SunMC Web Console.
|
[
"cpe:2.3:a:sun:management_center:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:8:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:9:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:10:*:sparc:*:*:*:*:*",
"cpe:2.3:a:sun:management_center:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:10:*:x86:*:*:*:*:*"
] |
|
CVE-2021-44630
|
A Buffer Overflow vulnerability exists in TP-LINK WR-886N 20190826 2.3.8 in the /cloud_config/router_post/modify_account_pwd feature, which allows malicious users to execute arbitrary code on the system via a crafted post request.
|
[
"cpe:2.3:o:tp-link:tl-wr886n_firmware:20190826_2.3.8:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr886n:-:*:*:*:*:*:*:*"
] |
|
CVE-2012-6084
|
modules/m_capab.c in (1) ircd-ratbox before 3.0.8 and (2) Charybdis before 3.4.2 does not properly support capability negotiation during server handshakes, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed request.
|
[
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.4:rc2:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ircd-ratbox:ircd-ratbox:2.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ratbox:ircd-ratbox:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-14700
|
Incorrect access control in the /mysql/api/logfile.php endpoint in Drobo 5N2 NAS version 4.0.5-13.28.96115 allows unauthenticated attackers to retrieve MySQL log files via the "name" URL parameter.
|
[
"cpe:2.3:o:drobo:5n2_firmware:4.0.5-13.28.96115:*:*:*:*:*:*:*",
"cpe:2.3:h:drobo:5n2:-:*:*:*:*:*:*:*"
] |
|
GHSA-7x25-8cjm-2rj9
|
Improper access control in clipboard service in Samsung mobile devices prior to SMR Mar-2021 Release 1 allows untrusted applications to read or write certain local files.
|
[] |
|
CVE-2014-2870
|
The default configuration of PaperThin CommonSpot before 7.0.2 and 8.x before 8.0.3 uses cleartext for storage of credentials in a database, which makes it easier for context-dependent attackers to obtain sensitive information via unspecified vectors.
|
[
"cpe:2.3:a:paperthin:commonspot_content_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:paperthin:commonspot_content_server:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:paperthin:commonspot_content_server:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:paperthin:commonspot_content_server:8.0.2:*:*:*:*:*:*:*"
] |
|
GHSA-cv7m-77hj-cr43
|
Cross-site scripting (XSS) vulnerability in the help pages in IBM Rational AppScan Enterprise Edition 5.5.0.2 allows remote attackers to inject arbitrary web script or HTML via the query string.
|
[] |
|
GHSA-c947-9vf2-6vg3
|
A vulnerability, which was classified as critical, was found in Campcodes Online College Library System 1.0. Affected is an unknown function of the file /admin/category_row.php of the component HTTP POST Request Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-249366 is the identifier assigned to this vulnerability.
|
[] |
|
GHSA-cp2p-pp43-5pm7
|
GoAhead 3.4.0 through 3.6.5 has a NULL Pointer Dereference in the websDecodeUrl function in http.c, leading to a crash for a "POST / HTTP/1.1" request.
|
[] |
|
GHSA-g8ph-74m6-8m7r
|
ClickHouse vulnerable to client certificate password exposure in client exception
|
SummaryAs initially reported in issue #1331, when client certificate authentication is enabled with password protection, the password (referred to as the client option `sslkey`) may be exposed in client exceptions (e.g., ClickHouseException or SQLException). This vulnerability can potentially lead to unauthorized access, data breaches, and violations of user privacy.DetailsDuring the handling of ClickHouseException, the client certificate password may be inadvertently exposed when sslkey is specified. This issue can arise when an exception is thrown during the execution of a query or a database operation. The client certificate password is then included in the exception message, which could be logged or exposed to unauthorized parties.ImpactThis vulnerability enables an attacker with access to client exception error messages or logs to obtain client certificate passwords, potentially allowing unauthorized access to sensitive information, data manipulation, and denial of service attacks. The extent of the risk depends on the specific implementation and usage of the affected systems. However, any exposure of client certificate passwords should be treated as a high-priority security concern.
|
[] |
CVE-2018-16876
|
ansible before versions 2.5.14, 2.6.11, 2.7.5 is vulnerable to a information disclosure flaw in vvv+ mode with no_log on that can lead to leakage of sensible data.
|
[
"cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:ansible_engine:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:ansible_engine:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:ansible_engine:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:ansible_engine:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:14:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"
] |
|
GHSA-fw6p-93fm-p636
|
In exec.c in zsh before 5.0.7, there is a buffer overflow for very long fds in the ">& fd" syntax.
|
[] |
|
GHSA-m47g-ghr5-3734
|
An unauthorized file deletion vulnerability exists in the latest version of the Polyaxon platform, which can lead to denial of service by terminating critical containers. An attacker can delete important files within the containers, such as `polyaxon.sock`, causing the API container to exit unexpectedly. This disrupts related services and prevents the system from functioning normally, without requiring authentication or UUID parameters.
|
[] |
|
GHSA-v3vw-5ppq-6vr8
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in razvypp Tidy.ro allows Reflected XSS. This issue affects Tidy.ro: from n/a through 1.3.
|
[] |
|
CVE-2019-9265
|
In Bluetooth, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-37994606
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-30131
|
An issue discovered in IXP EasyInstall 6.6.14884.0 allows attackers to run arbitrary commands, gain escalated privilege, and cause other unspecified impacts via unauthenticated API calls.
|
[
"cpe:2.3:a:ixpdata:easyinstall:6.6.148840:*:*:*:*:*:*:*"
] |
|
GHSA-g86x-2j88-7hg8
|
Multiple cross-site scripting (XSS) vulnerabilities in includes/core/um-actions-login.php in the "Ultimate Member - User Profile & Membership" plugin before 2.0.28 for WordPress allow remote attackers to inject arbitrary web script or HTML via the "Primary button Text" or "Second button text" field.
|
[] |
|
GHSA-3834-xp98-q4q8
|
Unspecified vulnerability in the Oracle HTTP Server component in Oracle Fusion Middleware 11.1.1.2 and 11.1.1.3 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Apache Plugin.
|
[] |
|
CVE-2014-7202
|
stream_engine.cpp in libzmq (aka ZeroMQ/C++)) 4.0.5 before 4.0.5 allows man-in-the-middle attackers to conduct downgrade attacks via a crafted connection request.
|
[
"cpe:2.3:a:zeromq:zeromq:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zeromq:zeromq:4.0.4:*:*:*:*:*:*:*"
] |
|
GHSA-q487-6fjf-jx4g
|
Adobe LiveCycle Data Services 3.1 and earlier, LiveCycle 9.0.0.2 and earlier, and BlazeDS 4.0.1 and earlier do not properly handle object graphs, which allows attackers to cause a denial of service via unspecified vectors, related to a "complex object graph vulnerability."
|
[] |
|
GHSA-rjmx-4pf7-6fpx
|
Windows USB Print Driver Elevation of Privilege Vulnerability
|
[] |
|
GHSA-j6cv-46xj-fq52
|
The mintToken function of a smart contract implementation for UPayToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
|
[] |
|
GHSA-69fg-8p7w-p9g6
|
An issue was found on TRENDnet TEW-831DR 1.0 601.130.1.1356 devices. The default pre-shared key for the Wi-Fi networks is the same for every router except for the last four digits. The device default pre-shared key for both 2.4 GHz and 5 GHz networks can be guessed or brute-forced by an attacker within range of the Wi-Fi network.
|
[] |
|
GHSA-w6gf-7vvp-94w7
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Campaign Monitor Campaign Monitor for WordPress allows Reflected XSS.This issue affects Campaign Monitor for WordPress: from n/a through 2.8.12.
|
[] |
|
GHSA-9xhv-3vhq-92w6
|
A stack-based buffer overflow vulnerability has been identified in Teledyne DALSA Sherlock Version 7.2.7.4 and prior, which may allow remote code execution.
|
[] |
|
CVE-2008-5287
|
SQL injection vulnerability in catagorie.php in Werner Hilversum FAQ Manager 1.2 allows remote attackers to execute arbitrary SQL commands via the cat_id parameter.
|
[
"cpe:2.3:a:scripts4you:faq_manager:1.2:*:*:*:*:*:*:*"
] |
|
CVE-2014-7926
|
The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN revision 292944, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors related to a zero-length quantifier.
|
[
"cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.6.z:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:communications_messaging_server:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:communications_messaging_server:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:icu-project:international_components_for_unicode:*:*:*:*:*:c\\/c\\+\\+:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*"
] |
|
CVE-2021-32975
|
Cscape (All Versions prior to 9.90 SP5) lacks proper validation of user-supplied data when parsing project files. This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to execute code in the context of the current process.
|
[
"cpe:2.3:a:hornerautomation:cscape:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hornerautomation:cscape:9.90:-:*:*:*:*:*:*",
"cpe:2.3:a:hornerautomation:cscape:9.90:sp1:*:*:*:*:*:*",
"cpe:2.3:a:hornerautomation:cscape:9.90:sp2:*:*:*:*:*:*",
"cpe:2.3:a:hornerautomation:cscape:9.90:sp3:*:*:*:*:*:*",
"cpe:2.3:a:hornerautomation:cscape:9.90:sp4:*:*:*:*:*:*"
] |
|
GHSA-cm8g-p75f-jwq6
|
In the WifiConfigManager, there is a possible storage of location history which can only be deleted by triggering a factory reset. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-140065828
|
[] |
|
CVE-2023-43087
|
Dell PowerScale OneFS 8.2.x, 9.0.0.x-9.5.0.x contains an improper handling of insufficient permissions. A low privileged remote attacker could potentially exploit this vulnerability to cause information disclosure.
|
[
"cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*"
] |
|
GHSA-gcm3-fp5x-qvwp
|
The Beginner package in PyPI v0.0.2 to v0.0.4 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.
|
[] |
|
CVE-2018-9374
|
In installPackageLI of PackageManagerService.java, there is a possible permissions bypass. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.
|
[
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*"
] |
|
GHSA-6p88-w6c7-7m2h
|
A vulnerability was found in barronwaffles dwc_network_server_emulator. It has been declared as critical. This vulnerability affects the function update_profile of the file gamespy/gs_database.py. The manipulation of the argument firstname/lastname leads to sql injection. The attack can be initiated remotely. The name of the patch is f70eb21394f75019886fbc2fb536de36161ba422. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216772.
|
[] |
|
GHSA-h96q-v6x9-fvm4
|
Multiple unspecified vulnerabilities in the template files in Soumu Workflow for Groupmax 01-00 through 01-01, Soumu Workflow 02-00 through 03-03, and Koukyoumuke Soumu Workflow 01-00 through 01-01 allow remote attackers to bypass authentication mechanisms on web pages via unknown vectors.
|
[] |
|
GHSA-6f2m-vhfx-gqwf
|
A stored cross site scripting (XSS) vulnerability in /administration/setting_security.php of PHP-Fusion 9.03.60 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload.
|
[] |
|
GHSA-7fmf-h6vh-qp27
|
In the Linux kernel, the following vulnerability has been resolved:l2tp: close all race conditions in l2tp_tunnel_register()The code in l2tp_tunnel_register() is racy in several ways:It modifies the tunnel socket _after_ publishing it.It calls setup_udp_tunnel_sock() on an existing socket without
locking.It changes sock lock class on fly, which triggers many syzbot
reports.This patch amends all of them by moving socket initialization code
before publishing and under sock lock. As suggested by Jakub, the
l2tp lockdep class is not necessary as we can just switch to
bh_lock_sock_nested().
|
[] |
|
CVE-2016-4370
|
HPE Project and Portfolio Management Center (PPM) 9.2x and 9.3x before 9.32.0002 allows remote authenticated users to execute arbitrary commands or obtain sensitive information via unspecified vectors.
|
[
"cpe:2.3:a:hpe:project_and_portfolio_management_center:9.20:*:*:*:*:*:*:*",
"cpe:2.3:a:hpe:project_and_portfolio_management_center:9.21:*:*:*:*:*:*:*",
"cpe:2.3:a:hpe:project_and_portfolio_management_center:9.22:*:*:*:*:*:*:*",
"cpe:2.3:a:hpe:project_and_portfolio_management_center:9.30:*:*:*:*:*:*:*",
"cpe:2.3:a:hpe:project_and_portfolio_management_center:9.31:*:*:*:*:*:*:*",
"cpe:2.3:a:hpe:project_and_portfolio_management_center:9.32:*:*:*:*:*:*:*"
] |
|
GHSA-x2gw-hrqg-xq6x
|
gf2n.cpp in Crypto++ (aka cryptopp) through 8.9.0 allows attackers to cause a denial of service (application crash) via DER public-key data for an F(2^m) curve, if the degree of each term in the polynomial is not strictly decreasing.
|
[] |
|
CVE-2018-18249
|
Icinga Web 2 before 2.6.2 allows injection of PHP ini-file directives via vectors involving environment variables as the channel to send information to the attacker, such as a name=${PATH}_${APACHE_RUN_DIR}_${APACHE_RUN_USER} parameter to /icingaweb2/navigation/add or /icingaweb2/dashboard/new-dashlet.
|
[
"cpe:2.3:a:icinga:icinga_web_2:*:*:*:*:*:*:*:*"
] |
|
GHSA-gghc-6wpq-rr46
|
The effective key space used to encrypt the cache in CyberArk Credential Provider prior to 12.1 has low entropy, and under certain conditions a local malicious user can obtain the plaintext of cache files.
|
[] |
|
GHSA-hgpx-7mjh-m574
|
Improper input validation in some Intel(R) Server board and Intel(R) Server System BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.
|
[] |
|
CVE-2020-7164
|
A operationselect expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).
|
[
"cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:-:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0501:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p2:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p4:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p03:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p07:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p09:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h05:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605p06:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705p06:*:*:*:*:*:*"
] |
|
GHSA-w9mv-fwxv-4f37
|
An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (use-after-free) via a crafted app.
|
[] |
|
CVE-2021-39648
|
In gadget_dev_desc_UDC_show of configfs.c, there is a possible disclosure of kernel heap memory due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-160822094References: Upstream kernel
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
GHSA-prp3-rrcq-rrx9
|
Resource reuse vulnerability in the GPU module. Successful exploitation of this vulnerability may affect service confidentiality.
|
[] |
|
CVE-2023-24454
|
Jenkins TestQuality Updater Plugin 1.3 and earlier stores the TestQuality Updater password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
|
[
"cpe:2.3:a:jenkins:testquality_updater:*:*:*:*:*:jenkins:*:*"
] |
|
CVE-2024-39623
|
WordPress ListingPro theme <= 2.9.4 - Cross Site Request Forgery (CSRF) to Account Takeover vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in CridioStudio ListingPro allows Authentication Bypass.This issue affects ListingPro: from n/a through 2.9.4.
|
[] |
GHSA-rmxc-vhg5-px7x
|
webTareas version 2.4 and earlier allows an unauthenticated user to perform Time and Boolean-based blind SQL Injection on the endpoint /includes/library.php, via the sor_cible, sor_champs, and sor_ordre HTTP POST parameters. This allows an attacker to access all the data in the database and obtain access to the webTareas application.
|
[] |
|
CVE-2022-49290
|
mac80211: fix potential double free on mesh join
|
In the Linux kernel, the following vulnerability has been resolved:
mac80211: fix potential double free on mesh join
While commit 6a01afcf8468 ("mac80211: mesh: Free ie data when leaving
mesh") fixed a memory leak on mesh leave / teardown it introduced a
potential memory corruption caused by a double free when rejoining the
mesh:
ieee80211_leave_mesh()
-> kfree(sdata->u.mesh.ie);
...
ieee80211_join_mesh()
-> copy_mesh_setup()
-> old_ie = ifmsh->ie;
-> kfree(old_ie);
This double free / kernel panics can be reproduced by using wpa_supplicant
with an encrypted mesh (if set up without encryption via "iw" then
ifmsh->ie is always NULL, which avoids this issue). And then calling:
$ iw dev mesh0 mesh leave
$ iw dev mesh0 mesh join my-mesh
Note that typically these commands are not used / working when using
wpa_supplicant. And it seems that wpa_supplicant or wpa_cli are going
through a NETDEV_DOWN/NETDEV_UP cycle between a mesh leave and mesh join
where the NETDEV_UP resets the mesh.ie to NULL via a memcpy of
default_mesh_setup in cfg80211_netdev_notifier_call, which then avoids
the memory corruption, too.
The issue was first observed in an application which was not using
wpa_supplicant but "Senf" instead, which implements its own calls to
nl80211.
Fixing the issue by removing the kfree()'ing of the mesh IE in the mesh
join function and leaving it solely up to the mesh leave to free the
mesh IE.
|
[] |
CVE-2015-6705
|
Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allow attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2015-5583, CVE-2015-6706, and CVE-2015-7624.
|
[
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-389x-3xpr-86vp
|
Multiple cross-site scripting (XSS) vulnerabilities in WeBid 1.1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) TPL_name, (2) TPL_nick, (3) TPL_email, (4) TPL_year, (5) TPL_address, (6) TPL_city, (7) TPL_prov, (8) TPL_zip, (9) TPL_phone, (10) TPL_pp_email, (11) TPL_authnet_id, (12) TPL_authnet_pass, (13) TPL_worldpay_id, (14) TPL_toocheckout_id, or (15) TPL_moneybookers_email in a first action to register.php or the (16) username parameter in a login action to user_login.php.
|
[] |
|
CVE-2020-35845
|
FastStone Image Viewer 7.5 has an out-of-bounds write (via a crafted image file) at FSViewer.exe+0x96cf.
|
[
"cpe:2.3:a:faststone:image_viewer:7.5:*:*:*:*:*:*:*"
] |
|
GHSA-2822-476f-3j55
|
Missing Authorization vulnerability in fromdoppler Doppler Forms allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Doppler Forms: from n/a through 2.4.5.
|
[] |
|
CVE-2024-8685
|
Path-Traversal vulnerability in Revolution Pi
|
Path-Traversal vulnerability in Revolution Pi version 2022-07-28-revpi-buster from KUNBUS GmbH. This vulnerability could allow an authenticated attacker to list device directories via the ‘/pictory/php/getFileList.php’ endpoint in the ‘dir’ parameter.
|
[] |
GHSA-wvxq-988m-ccxf
|
A vulnerability was found in NextBX QWAlerter 4.50. It has been rated as critical. Affected by this issue is some unknown functionality of the file QWAlerter.exe. The manipulation leads to unquoted search path. It is possible to launch the attack on the local host. The identifier of this vulnerability is VDB-239804. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] |
|
CVE-2019-19799
|
Zoho ManageEngine Applications Manager before 14600 allows a remote unauthenticated attacker to disclose license related information via WieldFeedServlet servlet.
|
[
"cpe:2.3:a:zohocorp:manageengine_applications_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_applications_manager:14.5:-:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_applications_manager:14.5:build14500:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_applications_manager:14.5:build14510:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_applications_manager:14.5:build14520:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_applications_manager:14.5:build14530:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_applications_manager:14.5:build14540:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_applications_manager:14.5:build14560:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_applications_manager:14.5:build14570:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_applications_manager:14.5:build14580:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_applications_manager:14.5:build14590:*:*:*:*:*:*"
] |
|
CVE-2017-1000396
|
Jenkins 2.73.1 and earlier, 2.83 and earlier bundled a version of the commons-httpclient library with the vulnerability CVE-2012-6153 that incorrectly verified SSL certificates, making it susceptible to man-in-the-middle attacks. This library is widely used as a transitive dependency in Jenkins plugins. The fix for CVE-2012-6153 was backported to the version of commons-httpclient that is bundled in core and made available to plugins.
|
[
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*"
] |
|
CVE-2014-6140
|
IBM Tivoli Endpoint Manager Mobile Device Management (MDM) before 9.0.60100 uses the same secret HMAC token across different customers' installations, which allows remote attackers to execute arbitrary code via crafted marshalled Ruby objects in cookies to (1) Enrollment and Apple iOS Management Extender, (2) Self-service portal, (3) Trusted Services provider, or (4) Admin Portal.
|
[
"cpe:2.3:a:ibm:tivoli_endpoint_manager_mobile_device_management:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-19531
|
HTTL (aka Hyper-Text Template Language) through 1.0.11 allows remote command execution because the decodeXml function uses java.beans.XMLEncoder unsafely when configured without an xml.codec= setting.
|
[
"cpe:2.3:a:httl_project:httl:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-25006
|
MOLIE <= 0.5 - Reflected Cross-Site Scripting
|
The MOLIE WordPress plugin through 0.5 does not escape the course_id parameter before outputting it back in the admin dashboard, leading to a Reflected Cross-Site Scripting issue
|
[
"cpe:2.3:a:molie_instructure_canvas_linking_tool_project:molie_instructure_canvas_linking_tool:*:*:*:*:*:wordpress:*:*"
] |
GHSA-xvwh-qhvg-2jjx
|
While processing QCA_NL80211_VENDOR_SUBCMD_AVOID_FREQUENCY vendor command, driver does not validate the data obtained from the user space which could be invalid and thus leads to an undesired behaviour in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in MDM9206, MDM9607, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCS605, SD 600, SD 625, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDM630, SDM660, SDX24
|
[] |
|
GHSA-g6xj-5g63-h824
|
D-Link DAP-2622 DDP Set Date-Time Auth Password Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.The specific flaw exists within the DDP service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20084.
|
[] |
|
GHSA-4wmv-xgwv-p79p
|
The default privileges for the running service Normand Remisol Advance Launcher in Beckman Coulter Remisol Advance v2.0.12.1 and prior allows non-privileged users to overwrite and manipulate executables and libraries. This allows attackers to access sensitive data.
|
[] |
|
GHSA-rcw8-56q4-fh4w
|
An issue was addressed with improved validation of environment variables. This issue is fixed in macOS Sequoia 15. An app may be able to access user-sensitive data.
|
[] |
|
GHSA-9q72-xwf6-7f4h
|
Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1287, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291.
|
[] |
|
CVE-2023-43554
|
Improper Restriction of Operations withing the Bounds of a Memory Buffer in DSP Services
|
Memory corruption while processing IOCTL handler in FastRPC.
|
[
"cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm5430:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs5430:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc3_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180x\\+sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180x\\+sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8380xp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180x-ad_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180x-ad:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180xp-ad_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180xp-ad:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180x-aa_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180x-aa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180x-ab_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180x-ab:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180xp-ac_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180xp-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180xp-af_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180xp-af:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180x-ac_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180x-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180x-af_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180x-af:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180xp-aa_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180xp-aa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180xp-ab_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180xp-ab:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8280xp-ab_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8280xp-ab:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8280xp-bb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8280xp-bb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*"
] |
GHSA-39g6-g4qf-fmh4
|
Multiple cross-site scripting (XSS) vulnerabilities in links.php in PHP Linkliste 1.0b allow remote attackers to inject arbitrary web script or HTML via the (1) new_input, (2) new_url, or (3) new_name parameter.
|
[] |
|
CVE-2023-22465
|
Http4s has fatal error parsing User-Agent and Server headers
|
Http4s is a Scala interface for HTTP services. Starting with version 0.1.0 and prior to versions 0.21.34, 0.22.15, 0.23.17, and 1.0.0-M38, the `User-Agent` and `Server` header parsers are susceptible to a fatal error on certain inputs. In http4s, modeled headers are lazily parsed, so this only applies to services that explicitly request these typed headers. Fixes are released in 0.21.34, 0.22.15, 0.23.17, and 1.0.0-M38. As a workaround, use the weakly typed header interface.
|
[
"cpe:2.3:a:typelevel:http4s:*:*:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone1:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone10:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone11:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone12:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone13:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone14:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone15:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone16:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone17:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone18:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone19:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone2:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone20:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone21:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone22:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone23:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone24:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone25:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone26:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone27:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone28:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone29:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone3:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone30:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone31:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone32:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone33:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone34:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone35:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone36:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone37:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone4:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone5:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone6:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone7:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone8:*:*:*:*:*:*",
"cpe:2.3:a:typelevel:http4s:1.0.0:milestone9:*:*:*:*:*:*"
] |
GHSA-7g8p-vjpv-mhfm
|
A wrong lowering instruction in the ARM64 Ion compiler resulted in a wrong optimization result. This vulnerability affects Firefox < 112, Focus for Android < 112, Firefox ESR < 102.10, Firefox for Android < 112, and Thunderbird < 102.10.
|
[] |
|
GHSA-f3cp-jv3x-c5jx
|
PHP remote file include vulnerability in admin/config_settings.tpl.php in I-RATER Platinum allows remote attackers to execute arbitrary code via a URL in the include_path parameter. NOTE: this is a different vector, and possibly a different vulnerability, than CVE-2006-1929.
|
[] |
|
GHSA-wh48-jpcr-2cx7
|
SQL injection vulnerability in sign_in.aspx in WebEvents (Online Event Registration Template) allows remote attackers to execute arbitrary SQL commands via the Password parameter.
|
[] |
|
GHSA-3wr3-v78q-x45g
|
A partial authentication bypass vulnerability exists on Realtek RTL8812AR 1.21WW, RTL8196D 1.0.0, RTL8192ER 2.10, and RTL8881AN 1.09 devices. The vulnerability allows sending an unencrypted data frame to a WPA2-protected WLAN router where the packet is routed through the network. If successful, a response is sent back as an encrypted frame, which would allow an attacker to discern information or potentially modify data.
|
[] |
|
CVE-2018-4263
|
Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.
|
[
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
CVE-2022-23627
|
Inadequate access verification when using proxy commands in ArchiSteamFarm
|
ArchiSteamFarm (ASF) is a C# application with primary purpose of idling Steam cards from multiple accounts simultaneously. Due to a bug in ASF code, introduced in version V5.2.2.2, the program didn't adequately verify effective access of the user sending proxy (i.e. `[Bots]`) commands. In particular, a proxy-like command sent to bot `A` targeting bot `B` has incorrectly verified user's access against bot `A` - instead of bot `B`, to which the command was originally designated. This in result allowed access to resources beyond those configured, being a security threat affecting confidentiality of other bot instances. A successful attack exploiting this bug requires a significant access granted explicitly by original owner of the ASF process prior to that, as attacker has to control at least a single bot in the process to make use of this inadequate access verification loophole. The issue is patched in ASF V5.2.2.5, V5.2.3.2 and future versions. Users are advised to update as soon as possible.
|
[
"cpe:2.3:a:archisteamfarm_project:archisteamfarm:*:*:*:*:*:*:*:*"
] |
GHSA-94cx-m6gv-p8qw
|
Vulnerability in IIS 5.0 allows remote attackers to cause a denial of service (restart) via a long, invalid WebDAV request.
|
[] |
|
CVE-2023-52440
|
ksmbd: fix slub overflow in ksmbd_decode_ntlmssp_auth_blob()
|
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix slub overflow in ksmbd_decode_ntlmssp_auth_blob()
If authblob->SessionKey.Length is bigger than session key
size(CIFS_KEY_SIZE), slub overflow can happen in key exchange codes.
cifs_arc4_crypt copy to session key array from SessionKey from client.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
CVE-2021-1747
|
An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Processing maliciously crafted web content may lead to code execution.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
GHSA-xgx2-r4f9-h8w3
|
Cross-Site Request Forgery (CSRF) vulnerability in maxfoundry MaxA/B allows Stored XSS. This issue affects MaxA/B: from n/a through 2.2.2.
|
[] |
|
CVE-2018-5825
|
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel before security patch level 2018-04-05, in the kernel IPA driver, a Use After Free condition can occur.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
GHSA-fc33-g257-p9q6
|
The Picture Gallery – Frontend Image Uploads, AJAX Photo List plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'videowhisper_pictures' shortcode in all versions up to, and including, 1.5.19 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] |
|
GHSA-j59c-pv3w-ph9q
|
** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability has been found in D-Link DAR-8000 up to 20151231 and classified as critical. This vulnerability affects unknown code of the file /sysmanage/changelogo.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-240250 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
|
[] |
|
CVE-2024-33528
|
A Stored Cross-site Scripting (XSS) vulnerability in ILIAS 7 before 7.30 and ILIAS 8 before 8.11 allows remote authenticated attackers with tutor privileges to inject arbitrary web script or HTML via XML file upload.
|
[
"cpe:2.3:a:ilias:ilias:*:*:*:*:*:*:*:*"
] |
|
GHSA-9m48-54pj-h248
|
Improper Neutralization of Input During Web Page Generation in Jenkins
|
A stored cross-site scripting vulnerability in Jenkins 2.191 and earlier, LTS 2.176.2 and earlier allowed attackers with Overall/Administer permission to configure the update site URL to inject arbitrary HTML and JavaScript in update center web pages.
|
[] |
GHSA-7x9j-ghjr-74hq
|
The Disable User Login WordPress plugin through 1.0.1 does not have authorisation and CSRF checks when updating its settings, allowing unauthenticated attackers to block (or unblock) users at will.
|
[] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.