id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-94q8-x74c-h24h
It was found that the log file viewer in Red Hat JBoss Enterprise Application 6 and 7 allows arbitrary file read to authenticated user via path traversal.
[]
null
null
6.5
null
CVE-2022-20861
Cisco Nexus Dashboard Unauthorized Access Vulnerabilities
Multiple vulnerabilities in Cisco Nexus Dashboard could allow an unauthenticated, remote attacker to execute arbitrary commands, read or upload container image files, or perform a cross-site request forgery attack. For more information about these vulnerabilities, see the Details section of this advisory.
[ "cpe:2.3:a:cisco:nexus_dashboard:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-52f4-cjg2-mpf2
Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects DGN2200v1 before 1.0.0.58, D8500 before 1.0.3.42, D7000v2 before 1.0.0.51, D6400 before 1.0.0.78, D6220 before 1.0.0.44, JNDR3000 before 1.0.0.24, R8000 before 1.0.4.18, R8500 before 1.0.2.122, R8300 before 1.0.2.122, R7900 before 1.0.2.16, R7000P before 1.3.2.34, R7300DST before 1.0.0.68, R7100LG before 1.0.0.46, R6900P before 1.3.2.34, R7000 before 1.0.9.28, R6900 before 1.0.1.46, R6700 before 1.0.1.46, R6400v2 before 1.0.2.56, R6400 before 1.0.1.42, R6300v2 before 1.0.4.28, R6250 before 1.0.4.26, WNDR3400v3 before 1.0.1.22, WNDR4500v2 before 1.0.0.72, and WNR3500Lv2 before 1.2.0.50.
[]
null
null
null
null
GHSA-8wv4-58g4-2v58
An OS Command Injection vulnerability exists in the '/open_code_folder' endpoint of the parisneo/lollms-webui application, due to improper validation of user-supplied input in the 'discussion_id' parameter. Attackers can exploit this vulnerability by injecting malicious OS commands, leading to unauthorized command execution on the underlying operating system. This could result in unauthorized access, data leakage, or complete system compromise.
[]
null
null
9.8
null
CVE-2022-0636
A denial of service vulnerability was reported in Lenovo Thin Installer prior to version 1.3.0039 that could trigger a system crash.
[ "cpe:2.3:a:lenovo:thin_installer:*:*:*:*:*:*:*:*" ]
null
5
null
null
GHSA-fh8q-78h2-p9mm
Incorrect Authorization vulnerability in Supsystic Data Tables Generator.This issue affects Data Tables Generator: from n/a through 1.10.25.
[]
null
5
null
null
GHSA-hcjv-p364-2wjf
In the Linux kernel, the following vulnerability has been resolved:rpmsg: qcom_smd: Fix refcount leak in qcom_smd_parse_edgeof_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when done.
[]
null
null
null
null
CVE-2010-1743
SQL injection vulnerability in projects.php in Scratcher allows remote attackers to execute arbitrary SQL commands via the id parameter.
[ "cpe:2.3:a:satyadeep:scratcher:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2012-5274
Buffer overflow in Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on Windows and Mac OS X, before 10.3.183.43 and 11.x before 11.2.202.251 on Linux, before 11.1.111.24 on Android 2.x and 3.x, and before 11.1.115.27 on Android 4.x; Adobe AIR before 3.5.0.600; and Adobe AIR SDK before 3.5.0.600 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-5275, CVE-2012-5276, CVE-2012-5277, and CVE-2012-5280.
[ "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-g4gr-f4c2-2wx2
The cryptographically insecure random number generator being used in TravianZ 8.3.4 and 8.3.3 in the password reset function allows an attacker to guess the password reset.parameters and to take over accounts.
[]
null
9.8
null
null
GHSA-5j52-m6jh-ch5g
The Music Player for Elementor – Audio Player & Podcast Player plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the import_mpfe_template() function in all versions up to, and including, 2.4.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to import templates.
[]
null
4.3
null
null
CVE-2005-3488
Scorched 3D 39.1 (bf) and earlier allows remote attackers to cause a denial of service (long loop and server hang) via a negative numplayers value that bypasses a signed check in ServerConnectHandler.cpp.
[ "cpe:2.3:a:scorched_3d:scorched_3d:39.1:*:*:*:*:*:*:*" ]
null
null
null
7.8
GHSA-69r9-55p9-j6ww
In l2cble_process_sig_cmd of l2c_ble.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure over bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
null
6.5
null
null
GHSA-rm26-gpm4-m74x
Experion server may experience a DoS due to a heap overflow which could occur when handling a specially crafted message
[]
null
7.5
null
null
CVE-2024-7713
AI Chatbot with ChatGPT by AYS <= 2.0.9 - Unauthenticated OpenAI Key Disclosure
The AI ChatBot with ChatGPT and Content Generator by AYS WordPress plugin before 2.1.0 discloses the Open AI API Key, allowing unauthenticated users to obtain it
[ "cpe:2.3:a:ays-pro:ai_chatbot_with_chatgpt:*:*:*:*:*:*:*:*", "cpe:2.3:a:ays-pro:chatgpt_assistant:*:*:*:*:free:wordpress:*:*" ]
null
7.5
null
null
CVE-2022-36922
Jenkins Lucene-Search Plugin 370.v62a5f618cd3a and earlier does not escape the search query parameter displayed on the 'search' result page, resulting in a reflected cross-site scripting (XSS) vulnerability.
[ "cpe:2.3:a:jenkins:lucene-search:*:*:*:*:*:jenkins:*:*" ]
null
6.1
null
null
RHSA-2021:1079
Red Hat Security Advisory: Red Hat Ansible Automation Platform Operator 1.2 security update
ansible: multiple modules expose secured values ansible: user data leak in snmp_facts module module: bitbucket_pipeline_variable exposes secured values ansible: multiple modules expose secured values ansible: basic.py no_log with fallback option
[ "cpe:/a:redhat:ansible_automation_platform:1.2::el7" ]
null
5
null
null
GHSA-c8f7-r83w-637g
Netis WF2780 v2.1.40144 was discovered to contain a command injection vulnerability via the config_sequence parameter in other_para of cgitest.cgi.
[]
null
8
null
null
CVE-1999-0480
Local attackers can conduct a denial of service in Midnight Commander 4.x with a symlink attack.
[ "cpe:2.3:a:midnight_commander:midnight_commander:4:*:*:*:*:*:*:*" ]
null
null
null
2.1
CVE-2018-4347
A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, macOS Mojave 10.14, tvOS 12, watchOS 5, iTunes 12.9 for Windows, iCloud for Windows 7.7.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
GHSA-v8p8-4vxj-fh58
An authenticated Stored XSS (Cross-site Scripting) exists in the "captive.cgi" Captive Portal via the "Title of Login Page" text box or "TITLE" parameter in IPFire 2.21 (x86_64) - Core Update 130. It allows an authenticated WebGUI user with privileges for the affected page to execute Stored Cross-site Scripting in the Captive Portal page.
[]
null
null
null
null
CVE-2012-6081
Multiple unrestricted file upload vulnerabilities in the (1) twikidraw (action/twikidraw.py) and (2) anywikidraw (action/anywikidraw.py) actions in MoinMoin before 1.9.6 allow remote authenticated users with write permissions to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory, as exploited in the wild in July 2012.
[ "cpe:2.3:a:moinmo:moinmoin:*:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:0.1:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:0.10:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:0.11:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.3.5:rc1:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.5.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.5.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.5.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.5.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.5.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.5.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.5.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.5.3:rc1:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.5.3:rc2:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.5.5:a:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.5.5:rc1:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.5.5a:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.6.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.6.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.6.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.7.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.7.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.7.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.7.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.7.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.8.8:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:moinmo:moinmoin:1.9.4:*:*:*:*:*:*:*" ]
null
null
null
6
GHSA-jxwx-85vp-gvwm
Regular Expression Denial of Service in jquery-validation
The GitHub Security Lab team has identified potential security vulnerabilities in jquery.validation.The project contains one or more regular expressions that are vulnerable to ReDoS (Regular Expression Denial of Service)This issue was discovered and reported by GitHub team member @erik-krogh (Erik Krogh Kristensen).
[]
null
7.5
null
null
RHSA-2022:5730
Red Hat Security Advisory: OpenShift Container Platform 4.10.25 bug fix and security update
golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString golang: encoding/pem: fix stack overflow in Decode golang: regexp: stack exhaustion via a deeply nested expression
[ "cpe:/a:redhat:openshift:4.10::el8" ]
null
7.5
null
null
CVE-2024-3298
Out-Of-Bounds Write and Type Confusion vulnerabilities exist in the DWG and DXF file reading procedure in eDrawings from Release SOLIDWORKS 2023 through Release SOLIDWORKS 2024
Out-Of-Bounds Write and Type Confusion vulnerabilities exist in the file reading procedure in eDrawings from Release SOLIDWORKS 2023 through Release SOLIDWORKS 2024. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted DWG or DXF. NOTE: this vulnerability was SPLIT from CVE-2024-1847.
[ "cpe:2.3:a:3ds:edrawings:2023:sp0:*:*:*:*:*:*", "cpe:2.3:a:3ds:edrawings:2024:sp0:*:*:*:*:*:*" ]
null
7.8
null
null
RHSA-2010:0578
Red Hat Security Advisory: freetype security update
freetype: invalid free vulnerability with possible heap corruption freetype: buffer overflow vulnerability freetype: integer overflow vulnerability in smooth/ftgrays.c freetype: heap buffer overflow vulnerability when processing certain font files Freetype demos multiple buffer overflows Freetype ftmulti buffer overflow
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
CVE-2023-1088
WP Plugin Manager < 1.1.8 - Arbitrary Plugin Activation via CSRF
The WP Plugin Manager WordPress plugin before 1.1.8 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
[ "cpe:2.3:a:hasthemes:wp_plugin_manager:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
GHSA-9hmm-98mx-mp8j
A remote unauthenticated user can overflow a stack buffer in the Belkin N750 using firmware version 1.10.22 by sending a crafted HTTP request to proxy.cgi.
[]
null
null
9.8
null
GHSA-g7wc-qp54-cppx
A vulnerability, which was classified as problematic, has been found in code-projects Car Rental Management System 1.0. This issue affects some unknown processing of the file /admin/manage-pages.php. The manipulation of the argument pgdetails leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
5.1
2.4
null
null
GHSA-5pcf-vxm3-frph
CSRF vulnerability in Jenkins Checkmarx Plugin allow capturing credentials
Checkmarx Plugin 2022.1.2 and earlier does not perform permission checks in several HTTP endpoints.This allows attackers with Overall/Read permission to connect to an attacker-specified webserver using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
[]
null
4.2
null
null
GHSA-5m8c-qqq3-wm8x
An authenticated remote attacker may use a stack based  out-of-bounds write vulnerability in multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
[]
null
8.8
null
null
CVE-2024-11070
Sanluan PublicCMS Tag Type save cross site scripting
A vulnerability, which was classified as problematic, has been found in Sanluan PublicCMS 5.202406.d. This issue affects some unknown processing of the file /admin/cmsTagType/save of the component Tag Type Handler. The manipulation of the argument name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:sanluan:publiccms:5.202406.d:*:*:*:*:*:*:*", "cpe:2.3:a:publiccms:publiccms:5.202406.d:*:*:*:*:*:*:*" ]
5.3
3.5
3.5
4
GHSA-82j7-7f93-vq2v
A vulnerability in Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an authenticated, local attacker to elevate privileges on an affected device. This vulnerability is due to insufficient restrictions during the execution of a specific CLI command. An attacker with administrative privileges could exploit this vulnerability by performing a command injection attack on the vulnerable command. A successful exploit could allow the attacker to access the underlying operating system as root.
[]
null
null
null
null
CVE-2020-14524
Softing Industrial Automation OPC
Softing Industrial Automation all versions prior to the latest build of version 4.47.0, The affected product is vulnerable to a heap-based buffer overflow, which may allow an attacker to remotely execute arbitrary code.
[ "cpe:2.3:a:softing:opc:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2014-2380
Schneider Electric Wonderware Information Server (WIS) Portal 4.0 SP1 through 5.5 uses weak encryption, which allows remote attackers to obtain sensitive information by reading a credential file.
[ "cpe:2.3:a:invensys:wonderware_information_server:4.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:invensys:wonderware_information_server:4.0:sp1:*:*:portal:*:*:*", "cpe:2.3:a:invensys:wonderware_information_server:4.5:-:portal:*:*:*:*:*", "cpe:2.3:a:invensys:wonderware_information_server:5.0:-:portal:*:*:*:*:*", "cpe:2.3:a:invensys:wonderware_information_server:5.5:*:*:*:portal:*:*:*" ]
null
null
null
7.8
GHSA-78vh-6phv-92x4
Missing Authorization vulnerability in JoomSky JS Help Desk allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects JS Help Desk: from n/a through 2.9.2.
[]
null
7.5
null
null
GHSA-59vp-vp33-qhx3
The Royal Elementor Addons plugin for WordPress is vulnerable to insufficient access control in the 'wpr_save_mega_menu_settings' AJAX action in versions up to, and including, 1.3.59. This allows any authenticated user, including those with subscriber-level permissions, to enable and modify Mega Menu settings for any menu item.
[]
null
4.3
null
null
CVE-2016-5185
Blink in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android incorrectly allowed reentrance of FrameView::updateLifecyclePhasesInternal(), which allowed a remote attacker to perform an out of bounds memory read via crafted HTML pages.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
RHSA-2020:0796
Red Hat Security Advisory: OpenShift Container Platform 3.11 openshift-enterprise-apb-base-container security update
openshift/apb-base: /etc/passwd is given incorrect privileges
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
7
null
null
GHSA-wvj7-73j3-j4p2
Multiple cross-site scripting (XSS) vulnerabilities in ZeusCart 4 allow remote attackers to inject arbitrary web script or HTML via the (1) schltr parameter in a brands action or (2) brand parameter in a viewbrands action to index.php. NOTE: The search parameter vector is already covered by CVE-2010-5322.
[]
null
null
null
null
CVE-2018-12386
A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
[ "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*" ]
null
null
8.1
5.8
GHSA-c5rc-w46c-83hh
IBM Robotic Process Automation for Cloud Pak 21.0.0 through 21.0.7.4 and 23.0.0 through 23.0.5 is vulnerable to disclosing server version information which may be used to determine software vulnerabilities at the operating system level. IBM X-Force ID: 259368.
[]
null
4.3
null
null
GHSA-cwc2-4hmh-9q9r
Mercury SiteScope 8.2 (8.1.2.0) allows remote authenticated users to cause a denial of service (loss of connectivity to the classic interface) via attempted HTML injection into the "new monitor description" field.
[]
null
null
null
null
ICSA-24-046-06
Siemens Unicam FX
The windows installer agent used in affected product contains incorrect use of privileged APIs that trigger the Windows Console Host (conhost.exe) as a child process with SYSTEM privileges. This could be exploited by an attacker to perform a local privilege escalation attack.
[]
null
7.8
null
null
GHSA-xgg8-892p-f458
Multiple vulnerabilities in the CLI of Cisco IOS XR Software could allow an authenticated, local attacker with a low-privileged account to elevate privileges on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
[]
null
null
null
null
GHSA-4xpm-jj66-x7r5
Unspecified vulnerability in the BI Publisher (formerly XML Publisher) component in Oracle Fusion Middleware 11.1.1.7.0, 11.1.1.9.0, and 12.2.1.0.0 allows remote authenticated users to affect confidentiality via unknown vectors.
[]
null
null
7.7
null
GHSA-c8jx-wgmp-xj28
A vulnerability classified as problematic has been found in eXo Chat Application. Affected is an unknown function of the file application/src/main/webapp/vue-app/components/ExoChatMessageComposer.vue of the component Mention Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 3.3.0-20220417 is able to address this issue. The name of the patch is 26bf307d3658d1403cfd5c3ad423ce4c4d1cb2dc. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-220212.
[]
null
6.1
null
null
GHSA-j2wq-fwmf-pw74
Mahara 15.04 before 15.04.7 and 15.10 before 15.10.3 are vulnerable to prevent session IDs from being regenerated on login or logout. This makes users of the site more vulnerable to session fixation attacks.
[]
null
null
8.8
null
CVE-2025-22800
WordPress Post SMTP plugin <= 2.9.11 - Broken Access Control vulnerability
Missing Authorization vulnerability in Post SMTP Post SMTP allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Post SMTP: from n/a through 2.9.11.
[]
null
4.3
null
null
RHSA-2021:1007
Red Hat Security Advisory: OpenShift Container Platform 4.7.5 security and bug fix update
gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation containernetworking-cni: Arbitrary path injection via type field in CNI configuration
[ "cpe:/a:redhat:openshift:4.7::el8" ]
null
7.2
null
null
CVE-2019-25158
pedroetb tts-api app.js onSpeechDone os command injection
A vulnerability has been found in pedroetb tts-api up to 2.1.4 and classified as critical. This vulnerability affects the function onSpeechDone of the file app.js. The manipulation leads to os command injection. Upgrading to version 2.2.0 is able to address this issue. The patch is identified as 29d9c25415911ea2f8b6de247cb5c4607d13d434. It is recommended to upgrade the affected component. VDB-248278 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:pedroetb:tts-api:*:*:*:*:*:*:*:*" ]
null
5.5
5.5
5.2
RHSA-2025:3856
Red Hat Security Advisory: OpenJDK 21.0.7 Security Update for Portable Linux Builds
openjdk: Better TLS connection support (Oracle CPU 2025-04) openjdk: Improve compiler transformations (Oracle CPU 2025-04) openjdk: Enhance Buffered Image handling (Oracle CPU 2025-04)
[ "cpe:/a:redhat:openjdk:21" ]
null
5.6
null
null
CVE-2022-49354
ata: pata_octeon_cf: Fix refcount leak in octeon_cf_probe
In the Linux kernel, the following vulnerability has been resolved: ata: pata_octeon_cf: Fix refcount leak in octeon_cf_probe of_find_device_by_node() takes reference, we should use put_device() to release it when not need anymore. Add missing put_device() to avoid refcount leak.
[]
null
5.5
null
null
CVE-2018-1093
The ext4_valid_block_bitmap function in fs/ext4/balloc.c in the Linux kernel through 4.15.15 allows attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image because balloc.c and ialloc.c do not validate bitmap block numbers.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
null
5.5
7.1
GHSA-fxrc-j9qq-62g8
Gradle Enterprise before 2021.4.3 relies on cleartext data transmission in some situations. It uses Keycloak for identity management services. During the sign-in process, Keycloak sets browser cookies that effectively provide remember-me functionality. For backwards compatibility with older Safari versions, Keycloak sets a duplicate of the cookie without the Secure attribute, which allows the cookie to be sent when accessing the location that cookie is set for via HTTP. This creates the potential for an attacker (with the ability to impersonate the Gradle Enterprise host) to capture the login session of a user by having them click an http:// link to the server, despite the real server requiring HTTPS.
[]
null
6.5
null
null
GHSA-rj8p-c8g2-ppv6
UltraLog Express device management software stores user’s information in cleartext. Any user can obtain accounts information through a specific page.
[]
null
7.5
null
null
CVE-2022-24565
Checkmk <=2.0.0p19 Fixed in 2.0.0p20 and Checkmk <=1.6.0p27 Fixed in 1.6.0p28 are affected by a Cross Site Scripting (XSS) vulnerability. The Alias of a site was not properly escaped when shown as condition for notifications.
[ "cpe:2.3:a:checkmk:checkmk:1.6.0:-:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:b1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:b10:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:b12:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:b3:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:b4:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:b5:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:b9:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p10:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p11:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p12:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p13:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p14:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p15:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p16:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p19:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p2:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p20:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p21:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p22:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p23:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p24:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p25:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p26:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p27:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:-:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:b1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:b2:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:b3:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:b4:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:b5:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:b6:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:b7:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:b8:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:i1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p10:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p11:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p12:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p13:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p14:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p15:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p16:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p17:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p18:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p19:*:*:*:*:*:*" ]
null
5.4
null
3.5
GHSA-gq3q-6947-35qj
The Map Block Leaflet plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter in all versions up to, and including, 3.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
GHSA-gp69-gv9q-c6wx
Cross Site Scripting (XSS) vulnerability exists in YUNUCMS 1.1.9 via the upurl function in Page.php.
[]
null
null
null
null
CVE-2022-48221
An issue was discovered in Acuant AcuFill SDK before 10.22.02.03. Multiple MSI's get executed out of a standard-user writable directory. Through a race condition and OpLock manipulation, these files can be overwritten by a standard user. They then get executed by the elevated installer. This gives a standard user full SYSTEM code execution (elevation of privileges).
[ "cpe:2.3:a:gbgplc:acuant_acufill_sdk:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2016-4768
WebKit in Apple iOS before 10, tvOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-4759, CVE-2016-4765, CVE-2016-4766, and CVE-2016-4767.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
CVE-2015-5666
ANA App for Android 3.1.1 and earlier, and ANA App for iOS 3.3.6 and earlier does not verify SSL certificates.
[ "cpe:2.3:a:ana:all_nippon_airways:*:*:*:*:*:android:*:*", "cpe:2.3:a:ana:all_nippon_airways:*:*:*:*:*:iphone_os:*:*" ]
null
null
5.9
4.3
CVE-2020-27282
In Hamilton Medical AG,T1-Ventillator versions 2.2.3 and prior, an XML validation vulnerability in the ventilator allows privileged attackers with physical access to render the device persistently unusable by uploading specially crafted configuration files.
[ "cpe:2.3:o:hamilton-medical:hamilton-t1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hamilton-medical:hamilton-t1:-:*:*:*:*:*:*:*" ]
null
4.3
null
2.1
GHSA-8fj5-gq7x-cfm8
A vulnerability was found in xujiangfei admintwo 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /user/updateSet. The manipulation of the argument email leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
null
null
CVE-2002-1648
Cross-site request forgery (CSRF) vulnerability in compose.php in SquirrelMail before 1.2.3 allows remote attackers to send email as other users via an IMG URL with modified send_to and subject parameters.
[ "cpe:2.3:a:squirrelmail:squirrelmail:1.2.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-p9xh-j68c-vrmg
The System Preferences capability in Mac OS X before 10.3 allows local users to access secure Preference Panes for a short period after an administrator has authenticated to the system.
[]
null
null
null
null
CVE-2024-11236
Integer overflow in the firebird and dblib quoters causing OOB writes
In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, uncontrolled long string inputs to ldap_escape() function on 32-bit systems can cause an integer overflow, resulting in an out-of-bounds write.
[ "cpe:2.3:a:php_group:php:*:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
RHSA-2013:0229
Red Hat Security Advisory: JBoss Enterprise Application Platform 5.2.0 security update
JBoss: allows empty password to authenticate against LDAP
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5::el4", "cpe:/a:redhat:jboss_enterprise_application_platform:5::el5", "cpe:/a:redhat:jboss_enterprise_application_platform:5::el6" ]
null
null
null
null
CVE-2021-36323
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
[ "cpe:2.3:o:dell:alienware_13_r3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_13_r3:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_15_r3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_15_r3:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_15_r4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_15_r4:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_17_r4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_17_r4:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_17_r5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_17_r5:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_area_51m_r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_area_51m_r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_area_51m_r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_area_51m_r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r11_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r11:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r12_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r12:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r7:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r8:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r9:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_ryzen_edition_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_ryzen_edition:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m15_r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m15_r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m15_r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m15_r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m15_r3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m15_r3:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m17_r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m17_r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m17_r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m17_r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m17_r3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m17_r3:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x15_r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x15_r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x17_r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x17_r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3977_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3977:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3980_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3980:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3988_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3988:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3990_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3990:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3991_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3991:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g3_3579_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g3_3579:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g3_3590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g3_3590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g3_3779_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g3_3779:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g5_5000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g5_5000:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g5_5090_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g5_5090:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g5_5587_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g5_5587:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g5_5590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g5_5590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g7_7587_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g7_7587:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g7_7588_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g7_7588:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g7_7590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g7_7590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g7_7790_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g7_7790:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:embedded_box_pc_5000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:embedded_box_pc_5000:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_13_5378_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_13_5378:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_13_5379_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_13_5379:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_14_3467_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_14_3467:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_14_5468_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_14_5468:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_15_3567_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_15_3567:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_15_5566_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_15_5566:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_15_5578_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_15_5578:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_15_5579_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_15_5579:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_15_5582_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_15_5582:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_15_7570_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_15_7570:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_15_7572_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_15_7572:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_15_7573_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_15_7573:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_15_7577_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_15_7577:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_17_7773_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_17_7773:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3268_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3268:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3277_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3277:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3280_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3280:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3470:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3471_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3471:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3476_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3476:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3477_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3477:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3481_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3481:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3576_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3576:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3581_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3581:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3668_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3668:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3670_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3670:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3671_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3671:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3780_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3780:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3781_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3781:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3880_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3880:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3881_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3881:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5370_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5370:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5401_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5401:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5477_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5477:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5481_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5481:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5482_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5482:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5570_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5570:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5680_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5680:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5770_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5770:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7370_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7370:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7373_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7373:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7380_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7380:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7386_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7386:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7467_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7467:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7472_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7472:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7567_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7567:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7586_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7586:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7591_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7591:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7700:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7777_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7777:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7786_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7786:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7790_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7790:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5491_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5491:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3180_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3180:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3189_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3189:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3190_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3190:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3379_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3379:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3380_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3380:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3390_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3390:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3470:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3551_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3551:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3570_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3570:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5175_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5175:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5179_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5179:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5280_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5280:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5285_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5285:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5288_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5288:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5289_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5289:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5290_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5290:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5401_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5401:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5411_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5411:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5488_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5488:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5491_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5491:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5501:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5511_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5511:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5591_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5591:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7200:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7210_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7210:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7275_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7275:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7280_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7280:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7285_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7285:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7290_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7290:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7370_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7370:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7380_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7380:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7389_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7389:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7390_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7390:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_e5270_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_e5270:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_e5470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_e5470:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_e5570_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_e5570:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_e7270_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_e7270:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_e7470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_e7470:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_rugged_5414_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_rugged_5414:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_rugged_5420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_rugged_5420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_rugged_5424_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_rugged_5424:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_rugged_7220_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_rugged_7220:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_rugged_7220ex_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_rugged_7220ex:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_rugged_7424_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_rugged_7424:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_rugged_extreme_7214_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_rugged_extreme_7214:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_rugged_extreme_7414_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_rugged_extreme_7414:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_rugged_tablet_7212_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_rugged_tablet_7212:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3040_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3040:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3046_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3046:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3050_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3050:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3060_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3060:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3070_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3070:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3080_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3080:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3240_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3240:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3280_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3280:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5040_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5040:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5050_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5050:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5060_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5060:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5070_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5070:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5080_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5080:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5250:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5260_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5260:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5270_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5270:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7040_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7040:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7050_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7050:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7060_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7060:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7070_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7070:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7071_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7071:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7080_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7080:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7440_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7440:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7450_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7450:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7460_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7460:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7470:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7760_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7760:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7770_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7770:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7780_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7780:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_xe3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_xe3:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3240_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3240:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3431_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3431:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3440_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3440:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3540_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3540:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3541_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3541:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3550:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3620_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3620:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3630_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3630:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3640_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3640:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3930_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3930:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5540_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5540:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5720_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5720:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5820_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5820:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7540_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7540:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7550:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7710_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7710:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7720_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7720:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7730_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7730:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7740_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7740:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7750:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7820_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7820:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7920_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7920:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_14_3468_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_14_3468:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_14_3478_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_14_3478:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_14_5468_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_14_5468:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_15_3568_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_15_3568:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_15_3578_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_15_3578:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_15_5568_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_15_5568:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_15_7570_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_15_7570:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_15_7580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_15_7580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3070_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3070:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3267_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3267:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3268_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3268:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3470:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3471_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3471:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3481_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3481:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3581_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3581:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3583_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3583:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3584_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3584:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3660_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3660:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3667_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3667:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3668_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3668:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3669_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3669:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3670_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3670:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3671_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3671:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3681_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3681:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3881_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3881:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3888_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3888:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5090_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5090:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5370_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5370:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5471_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5471:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5481_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5481:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5581_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5581:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5880_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5880:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_7590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_7590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:wyse_5070_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:wyse_5070:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:wyse_5470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:wyse_5470:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:wyse_7040_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:wyse_7040:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9360_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9360:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9370_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9370:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9380_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9380:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_15_7590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_15_7590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_15_9560_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_15_9560:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_15_9575_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_15_9575:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_27_7760_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_27_7760:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_7590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_7590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_8930_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_8930:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_8940_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_8940:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-347f-hmcm-xr5h
drivers/misc/qseecom.c in the Qualcomm components in Android before 2016-08-05 on Nexus 5 devices does not validate certain buffer addresses, which allows attackers to gain privileges via a crafted application that makes an ioctl call, aka Android internal bug 28749283 and Qualcomm internal bug CR550061.
[]
null
null
7.8
null
CVE-2024-13222
User Messages <= 1.2.4 - Reflected XSS
The User Messages WordPress plugin through 1.2.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
[]
null
6.1
null
null
GHSA-44qf-4fcj-9qhq
The default installation for the Oracle listener program 7.3.4, 8.0.6, and 8.1.6 allows an attacker to cause logging information to be appended to arbitrary files and execute commands via the SET TRC_FILE or SET LOG_FILE commands.
[]
null
null
null
null
GHSA-vww9-9287-j6xm
ZyXEL P-660HW v3 devices allow remote attackers to cause a denial of service (CPU consumption) via a flood of IP packets with a TTL of 1.
[]
null
null
7.5
null
CVE-2024-49609
WordPress Author Discussion plugin <= 0.2.2 - SQL Injection vulnerability
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Brandon White Author Discussion allows Blind SQL Injection.This issue affects Author Discussion: from n/a through 0.2.2.
[ "cpe:2.3:a:brandonwhite:author_discussion:*:*:*:*:*:wordpress:*:*" ]
null
8.5
null
null
CVE-2023-32119
WordPress WPO365 | Mail Integration for Office 365 / Outlook Plugin <= 1.9.0 is vulnerable to Cross Site Scripting (XSS)
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WPO365 | Mail Integration for Office 365 / Outlook plugin <= 1.9.0 versions.
[ "cpe:2.3:a:wpo365:mail_integration_for_office_365_\\/_outlook:*:*:*:*:*:wordpress:*:*" ]
null
5.8
null
null
CVE-2015-2366
win32k.sys in the kernel-mode drivers in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."
[ "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:datacenter:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:essentials:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:standard:*:*:*" ]
null
null
null
7.2
GHSA-fv27-4wpj-3pxc
PreProjects Pre Resume Submitter stores onlineresume.mdb under the web root with insufficient access control, which allows remote attackers to obtain passwords via a direct request.
[]
null
null
null
null
CVE-2023-6416
SQL injection in Voovi Social Networking Script
A vulnerability has been reported in Voovi Social Networking Script that affects version 1.0 and consists of a SQL injection via signup2.php in the emailadd parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted SQL query to the server and retrieve all the information stored in the application.
[ "cpe:2.3:a:aatifaneeq:voovi:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-r36c-frw4-8q5v
Vulnerability in the Oracle Marketing product of Oracle E-Business Suite (component: Marketing Administration). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Marketing, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Marketing accessible data as well as unauthorized update, insert or delete access to some of Oracle Marketing accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
[]
null
8.2
null
null
CVE-2009-1064
Argument injection vulnerability in orbitmxt.dll 2.1.0.2 in the Orbit Downloader 2.8.7 and earlier ActiveX control allows remote attackers to overwrite arbitrary files via whitespace and a command-line switch, followed by a full pathname, in the third argument to the download method.
[ "cpe:2.3:a:orbit_downloader:orbit_downloader:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:orbit_downloader:orbit_downloader:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:orbitdownloader:orbit_downloader:*:*:*:*:*:*:*:*", "cpe:2.3:a:orbitdownloader:orbit_downloader:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:orbitdownloader:orbit_downloader:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:orbitdownloader:orbit_downloader:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:orbitdownloader:orbit_downloader:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:orbitdownloader:orbit_downloader:2.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:orbitdownloader:orbit_downloader:2.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:orbitdownloader:orbit_downloader:2.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:orbitdownloader:orbit_downloader:2.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:orbitdownloader:orbit_downloader:2.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:orbitdownloader:orbit_downloader:2.7.8:*:*:*:*:*:*:*", "cpe:2.3:a:orbitdownloader:orbit_downloader:2.7.9:*:*:*:*:*:*:*", "cpe:2.3:a:orbitdownloader:orbit_downloader:2.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:orbitdownloader:orbit_downloader:2.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:orbitdownloader:orbit_downloader:2.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:orbitdownloader:orbit_downloader:2.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:orbitdownloader:orbit_downloader:2.8.5:*:*:*:*:*:*:*" ]
null
null
null
5.8
GHSA-f7fv-v9rh-prvc
Tornado CRLF injection vulnerability
CRLF injection vulnerability in the `tornado.web.RequestHandler.set_header` function in Tornado before 2.2.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input.
[]
8.7
7.5
null
null
GHSA-hr59-8rhc-wm6g
Google V8, as used in Google Chrome before 12.0.742.91, allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
[]
null
null
null
null
GHSA-3gwr-wj7f-25vv
The Login With OTP Over SMS, Email, WhatsApp and Google Authenticator WordPress plugin before 1.0.8 does not escape its settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed
[]
null
4.8
null
null
GHSA-8v45-83mv-7j9c
In ccu, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05827158; Issue ID: ALPS05827158.
[]
null
6.7
null
null
CVE-2023-49289
Cross-site Scripting in Ajax.NET Professional
Ajax.NET Professional (AjaxPro) is an AJAX framework for Microsoft ASP.NET which will create proxy JavaScript classes that are used on client-side to invoke methods on the web server. Affected versions of this package are vulnerable cross site scripting attacks. Releases before version 21.12.22.1 are affected. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ "cpe:2.3:a:michaelschwarz:ajax.net_professional:*:*:*:*:*:asp.net:*:*" ]
null
6.3
null
null
CVE-2022-32960
HiCOS’ client-side citizen digital certificate - Stack Buffer Overflow
HiCOS’ client-side citizen digital certificate component has a stack-based buffer overflow vulnerability when reading IC card due to insufficient parameter length validation for card number. An unauthenticated physical attacker can exploit this vulnerability to execute arbitrary code, manipulate system data or terminate service.
[ "cpe:2.3:a:hinet:hicos_natural_person_credential_component_client:3.0.3.30306:*:*:*:*:linux:*:*", "cpe:2.3:a:hinet:hicos_natural_person_credential_component_client:3.0.3.30404:*:*:*:*:macos:*:*", "cpe:2.3:a:hinet:hicos_natural_person_credential_component_client:3.1.0.00002:*:*:*:*:windows:*:*" ]
null
6.8
null
null
GHSA-69w3-h2gr-24wp
SQL injection vulnerability in infopage.asp in Mall23 eCommerce allows remote attackers to execute arbitrary SQL commands via the idPage parameter.
[]
null
null
null
null
CVE-2019-20457
An issue was discovered on Brother MFC-J491DW C1806180757 devices. The printer's web-interface password hash can be retrieved without authentication, because the response header of any failed login attempt returns an incomplete authorization cookie. The value of the authorization cookie is the MD5 hash of the password in hexadecimal. An attacker can easily derive the true MD5 hash from this, and use offline cracking attacks to obtain administrative access to the device.
[ "cpe:2.3:h:brother:mfc-j491dw:-:*:*:*:*:*:*:*" ]
null
9.1
null
null
GHSA-985h-qhqc-c368
DiskCryptor 0.2.6 on Windows stores pre-boot authentication passwords in the BIOS Keyboard buffer and does not clear this buffer before and after use, which allows local users to obtain sensitive information by reading the physical memory locations associated with this buffer.
[]
null
null
null
null
CVE-2008-2001
Apple Safari 3.1.1 allows remote attackers to cause a denial of service (application crash) via a file:///%E2 link that triggers an out-of-bounds access, possibly due to a NULL pointer dereference.
[ "cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2014-0429
Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
[ "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe:2.3:a:oracle:jrockit:r27.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jrockit:r28.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:juniper:junos_space:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update61:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update71:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update51:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:-:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update61:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update71:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update51:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.8.0:-:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:forms_viewer:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-h7h5-4p4x-8qmq
A command injection vulnerability exists in Moxa Inc VPort 461 Series Firmware Version 3.4 or lower that could allow a remote attacker to execute arbitrary commands in Moxa's VPort 461 Series Industrial Video Servers.
[]
null
null
null
null
CVE-2008-6711
Unspecified vulnerability in the Web administration interface in Avaya Communication Manager 3.1.x before CM 3.1.4 SP2 and 4.0.x before 4.0.3 SP1 allows remote authenticated users to execute arbitrary commands via unknown vectors related to "viewing system logs."
[ "cpe:2.3:a:avaya:communication_manager:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:communication_manager:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:communication_manager:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:communication_manager:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:communication_manager:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:communication_manager:3.1.4:sp1:*:*:*:*:*:*", "cpe:2.3:a:avaya:communication_manager:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:communication_manager:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:communication_manager:4.0.1:sp15215:*:*:*:*:*:*", "cpe:2.3:a:avaya:communication_manager:4.0.1:sp15500:*:*:*:*:*:*", "cpe:2.3:a:avaya:communication_manager:4.0.3:*:*:*:*:*:*:*" ]
null
null
null
9
CVE-2024-57898
wifi: cfg80211: clear link ID from bitmap during link delete after clean up
In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: clear link ID from bitmap during link delete after clean up Currently, during link deletion, the link ID is first removed from the valid_links bitmap before performing any clean-up operations. However, some functions require the link ID to remain in the valid_links bitmap. One such example is cfg80211_cac_event(). The flow is - nl80211_remove_link() cfg80211_remove_link() ieee80211_del_intf_link() ieee80211_vif_set_links() ieee80211_vif_update_links() ieee80211_link_stop() cfg80211_cac_event() cfg80211_cac_event() requires link ID to be present but it is cleared already in cfg80211_remove_link(). Ultimately, WARN_ON() is hit. Therefore, clear the link ID from the bitmap only after completing the link clean-up.
[]
null
null
null
null
GHSA-wcj8-ch6c-ccvv
The Lenovo Service Framework Android application accepts some responses from the server without proper validation. This exposes the application to man-in-the-middle attacks leading to possible remote code execution.
[]
null
null
8.1
null
CVE-2009-1246
Multiple directory traversal vulnerabilities in Blogplus 1.0 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the (1) row_mysql_blocks_center_down[file] parameter to includes/block_center_down.php; (2) row_mysql_blocks_center_top[file] includes/parameter to block_center_top.php; (3) row_mysql_blocks_left[file] parameter to includes/block_left.php; (4) row_mysql_blocks_right[file] parameter to includes/block_right.php; and row_mysql_bloginfo[theme] parameter to (5) includes/window_down.php and (6) includes/window_top.php.
[ "cpe:2.3:a:blogplus:blogplus:1.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2023-37723
Tenda F1202 V1.0BR_V1.2.0.20(408), FH1202_V1.2.0.19_EN were discovered to contain a stack overflow in the page parameter in the function fromqossetting.
[ "cpe:2.3:h:tenda:f1202:-:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:fh1202:-:*:*:*:*:*:*:*", "cpe:2.3:o:tenda:f1202_firmware:1.2.0.20\\(408\\):*:*:*:*:*:*:*", "cpe:2.3:o:tenda:fh1202_firmware:1.2.0.19_en:*:*:*:*:*:*:*", "cpe:2.3:o:tenda:f1202_firmware:1.0br:*:*:*:*:*:*:*", "cpe:2.3:o:tenda:4g300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:4g300:-:*:*:*:*:*:*:*", "cpe:2.3:o:tenda:pw201a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:pw201a:-:*:*:*:*:*:*:*", "cpe:2.3:o:tenda:pa202_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:pa202:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-pwm8-7wmq-v7qm
An elevation of privilege vulnerability exists in Windows Setup in the way it handles permissions.A locally authenticated attacker could run arbitrary code with elevated system privileges, aka 'Windows Setup Elevation of Privilege Vulnerability'.
[]
null
7.3
null
null
CVE-2016-3386
The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3389, CVE-2016-7190, and CVE-2016-7194.
[ "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*" ]
null
null
7.5
9.3
CVE-2024-20944
Vulnerability in the Oracle iSupport product of Oracle E-Business Suite (component: Internal Operations). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle iSupport. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iSupport, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle iSupport accessible data as well as unauthorized read access to a subset of Oracle iSupport accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:isupport:*:*:*:*:*:*:*:*" ]
null
5.4
null
null