id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-94q8-x74c-h24h | It was found that the log file viewer in Red Hat JBoss Enterprise Application 6 and 7 allows arbitrary file read to authenticated user via path traversal. | []
| null | null | 6.5 | null |
|
CVE-2022-20861 | Cisco Nexus Dashboard Unauthorized Access Vulnerabilities | Multiple vulnerabilities in Cisco Nexus Dashboard could allow an unauthenticated, remote attacker to execute arbitrary commands, read or upload container image files, or perform a cross-site request forgery attack. For more information about these vulnerabilities, see the Details section of this advisory. | [
"cpe:2.3:a:cisco:nexus_dashboard:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
GHSA-52f4-cjg2-mpf2 | Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects DGN2200v1 before 1.0.0.58, D8500 before 1.0.3.42, D7000v2 before 1.0.0.51, D6400 before 1.0.0.78, D6220 before 1.0.0.44, JNDR3000 before 1.0.0.24, R8000 before 1.0.4.18, R8500 before 1.0.2.122, R8300 before 1.0.2.122, R7900 before 1.0.2.16, R7000P before 1.3.2.34, R7300DST before 1.0.0.68, R7100LG before 1.0.0.46, R6900P before 1.3.2.34, R7000 before 1.0.9.28, R6900 before 1.0.1.46, R6700 before 1.0.1.46, R6400v2 before 1.0.2.56, R6400 before 1.0.1.42, R6300v2 before 1.0.4.28, R6250 before 1.0.4.26, WNDR3400v3 before 1.0.1.22, WNDR4500v2 before 1.0.0.72, and WNR3500Lv2 before 1.2.0.50. | []
| null | null | null | null |
|
GHSA-8wv4-58g4-2v58 | An OS Command Injection vulnerability exists in the '/open_code_folder' endpoint of the parisneo/lollms-webui application, due to improper validation of user-supplied input in the 'discussion_id' parameter. Attackers can exploit this vulnerability by injecting malicious OS commands, leading to unauthorized command execution on the underlying operating system. This could result in unauthorized access, data leakage, or complete system compromise. | []
| null | null | 9.8 | null |
|
CVE-2022-0636 | A denial of service vulnerability was reported in Lenovo Thin Installer prior to version 1.3.0039 that could trigger a system crash. | [
"cpe:2.3:a:lenovo:thin_installer:*:*:*:*:*:*:*:*"
]
| null | 5 | null | null |
|
GHSA-fh8q-78h2-p9mm | Incorrect Authorization vulnerability in Supsystic Data Tables Generator.This issue affects Data Tables Generator: from n/a through 1.10.25. | []
| null | 5 | null | null |
|
GHSA-hcjv-p364-2wjf | In the Linux kernel, the following vulnerability has been resolved:rpmsg: qcom_smd: Fix refcount leak in qcom_smd_parse_edgeof_parse_phandle() returns a node pointer with refcount
incremented, we should use of_node_put() on it when done. | []
| null | null | null | null |
|
CVE-2010-1743 | SQL injection vulnerability in projects.php in Scratcher allows remote attackers to execute arbitrary SQL commands via the id parameter. | [
"cpe:2.3:a:satyadeep:scratcher:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2012-5274 | Buffer overflow in Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on Windows and Mac OS X, before 10.3.183.43 and 11.x before 11.2.202.251 on Linux, before 11.1.111.24 on Android 2.x and 3.x, and before 11.1.115.27 on Android 4.x; Adobe AIR before 3.5.0.600; and Adobe AIR SDK before 3.5.0.600 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-5275, CVE-2012-5276, CVE-2012-5277, and CVE-2012-5280. | [
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
GHSA-g4gr-f4c2-2wx2 | The cryptographically insecure random number generator being used in TravianZ 8.3.4 and 8.3.3 in the password reset function allows an attacker to guess the password reset.parameters and to take over accounts. | []
| null | 9.8 | null | null |
|
GHSA-5j52-m6jh-ch5g | The Music Player for Elementor – Audio Player & Podcast Player plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the import_mpfe_template() function in all versions up to, and including, 2.4.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to import templates. | []
| null | 4.3 | null | null |
|
CVE-2005-3488 | Scorched 3D 39.1 (bf) and earlier allows remote attackers to cause a denial of service (long loop and server hang) via a negative numplayers value that bypasses a signed check in ServerConnectHandler.cpp. | [
"cpe:2.3:a:scorched_3d:scorched_3d:39.1:*:*:*:*:*:*:*"
]
| null | null | null | 7.8 |
|
GHSA-69r9-55p9-j6ww | In l2cble_process_sig_cmd of l2c_ble.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure over bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. | []
| null | 6.5 | null | null |
|
GHSA-rm26-gpm4-m74x | Experion server may experience a DoS due to a heap overflow which could occur when handling a specially crafted message | []
| null | 7.5 | null | null |
|
CVE-2024-7713 | AI Chatbot with ChatGPT by AYS <= 2.0.9 - Unauthenticated OpenAI Key Disclosure | The AI ChatBot with ChatGPT and Content Generator by AYS WordPress plugin before 2.1.0 discloses the Open AI API Key, allowing unauthenticated users to obtain it | [
"cpe:2.3:a:ays-pro:ai_chatbot_with_chatgpt:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ays-pro:chatgpt_assistant:*:*:*:*:free:wordpress:*:*"
]
| null | 7.5 | null | null |
CVE-2022-36922 | Jenkins Lucene-Search Plugin 370.v62a5f618cd3a and earlier does not escape the search query parameter displayed on the 'search' result page, resulting in a reflected cross-site scripting (XSS) vulnerability. | [
"cpe:2.3:a:jenkins:lucene-search:*:*:*:*:*:jenkins:*:*"
]
| null | 6.1 | null | null |
|
RHSA-2021:1079 | Red Hat Security Advisory: Red Hat Ansible Automation Platform Operator 1.2 security update | ansible: multiple modules expose secured values ansible: user data leak in snmp_facts module module: bitbucket_pipeline_variable exposes secured values ansible: multiple modules expose secured values ansible: basic.py no_log with fallback option | [
"cpe:/a:redhat:ansible_automation_platform:1.2::el7"
]
| null | 5 | null | null |
GHSA-c8f7-r83w-637g | Netis WF2780 v2.1.40144 was discovered to contain a command injection vulnerability via the config_sequence parameter in other_para of cgitest.cgi. | []
| null | 8 | null | null |
|
CVE-1999-0480 | Local attackers can conduct a denial of service in Midnight Commander 4.x with a symlink attack. | [
"cpe:2.3:a:midnight_commander:midnight_commander:4:*:*:*:*:*:*:*"
]
| null | null | null | 2.1 |
|
CVE-2018-4347 | A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, macOS Mojave 10.14, tvOS 12, watchOS 5, iTunes 12.9 for Windows, iCloud for Windows 7.7. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 6.8 |
|
GHSA-v8p8-4vxj-fh58 | An authenticated Stored XSS (Cross-site Scripting) exists in the "captive.cgi" Captive Portal via the "Title of Login Page" text box or "TITLE" parameter in IPFire 2.21 (x86_64) - Core Update 130. It allows an authenticated WebGUI user with privileges for the affected page to execute Stored Cross-site Scripting in the Captive Portal page. | []
| null | null | null | null |
|
CVE-2012-6081 | Multiple unrestricted file upload vulnerabilities in the (1) twikidraw (action/twikidraw.py) and (2) anywikidraw (action/anywikidraw.py) actions in MoinMoin before 1.9.6 allow remote authenticated users with write permissions to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory, as exploited in the wild in July 2012. | [
"cpe:2.3:a:moinmo:moinmoin:*:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.3.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.5:a:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.5a:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.9.4:*:*:*:*:*:*:*"
]
| null | null | null | 6 |
|
GHSA-jxwx-85vp-gvwm | Regular Expression Denial of Service in jquery-validation | The GitHub Security Lab team has identified potential security vulnerabilities in jquery.validation.The project contains one or more regular expressions that are vulnerable to ReDoS (Regular Expression Denial of Service)This issue was discovered and reported by GitHub team member @erik-krogh (Erik Krogh Kristensen). | []
| null | 7.5 | null | null |
RHSA-2022:5730 | Red Hat Security Advisory: OpenShift Container Platform 4.10.25 bug fix and security update | golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString golang: encoding/pem: fix stack overflow in Decode golang: regexp: stack exhaustion via a deeply nested expression | [
"cpe:/a:redhat:openshift:4.10::el8"
]
| null | 7.5 | null | null |
CVE-2024-3298 | Out-Of-Bounds Write and Type Confusion vulnerabilities exist in the DWG and DXF file reading procedure in eDrawings from Release SOLIDWORKS 2023 through Release SOLIDWORKS 2024 | Out-Of-Bounds Write and Type Confusion vulnerabilities exist in the file reading procedure in eDrawings from Release SOLIDWORKS 2023 through Release SOLIDWORKS 2024. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted DWG or DXF. NOTE: this vulnerability was SPLIT from CVE-2024-1847. | [
"cpe:2.3:a:3ds:edrawings:2023:sp0:*:*:*:*:*:*",
"cpe:2.3:a:3ds:edrawings:2024:sp0:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
RHSA-2010:0578 | Red Hat Security Advisory: freetype security update | freetype: invalid free vulnerability with possible heap corruption freetype: buffer overflow vulnerability freetype: integer overflow vulnerability in smooth/ftgrays.c freetype: heap buffer overflow vulnerability when processing certain font files Freetype demos multiple buffer overflows Freetype ftmulti buffer overflow | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
CVE-2023-1088 | WP Plugin Manager < 1.1.8 - Arbitrary Plugin Activation via CSRF | The WP Plugin Manager WordPress plugin before 1.1.8 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack | [
"cpe:2.3:a:hasthemes:wp_plugin_manager:*:*:*:*:*:wordpress:*:*"
]
| null | 4.3 | null | null |
GHSA-9hmm-98mx-mp8j | A remote unauthenticated user can overflow a stack buffer in the Belkin N750 using firmware version 1.10.22 by sending a crafted HTTP request to proxy.cgi. | []
| null | null | 9.8 | null |
|
GHSA-g7wc-qp54-cppx | A vulnerability, which was classified as problematic, has been found in code-projects Car Rental Management System 1.0. This issue affects some unknown processing of the file /admin/manage-pages.php. The manipulation of the argument pgdetails leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | []
| 5.1 | 2.4 | null | null |
|
GHSA-5pcf-vxm3-frph | CSRF vulnerability in Jenkins Checkmarx Plugin allow capturing credentials | Checkmarx Plugin 2022.1.2 and earlier does not perform permission checks in several HTTP endpoints.This allows attackers with Overall/Read permission to connect to an attacker-specified webserver using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability. | []
| null | 4.2 | null | null |
GHSA-5m8c-qqq3-wm8x | An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution. | []
| null | 8.8 | null | null |
|
CVE-2024-11070 | Sanluan PublicCMS Tag Type save cross site scripting | A vulnerability, which was classified as problematic, has been found in Sanluan PublicCMS 5.202406.d. This issue affects some unknown processing of the file /admin/cmsTagType/save of the component Tag Type Handler. The manipulation of the argument name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:sanluan:publiccms:5.202406.d:*:*:*:*:*:*:*",
"cpe:2.3:a:publiccms:publiccms:5.202406.d:*:*:*:*:*:*:*"
]
| 5.3 | 3.5 | 3.5 | 4 |
GHSA-82j7-7f93-vq2v | A vulnerability in Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an authenticated, local attacker to elevate privileges on an affected device. This vulnerability is due to insufficient restrictions during the execution of a specific CLI command. An attacker with administrative privileges could exploit this vulnerability by performing a command injection attack on the vulnerable command. A successful exploit could allow the attacker to access the underlying operating system as root. | []
| null | null | null | null |
|
CVE-2020-14524 | Softing Industrial Automation OPC | Softing Industrial Automation all versions prior to the latest build of version 4.47.0, The affected product is vulnerable to a heap-based buffer overflow, which may allow an attacker to remotely execute arbitrary code. | [
"cpe:2.3:a:softing:opc:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
CVE-2014-2380 | Schneider Electric Wonderware Information Server (WIS) Portal 4.0 SP1 through 5.5 uses weak encryption, which allows remote attackers to obtain sensitive information by reading a credential file. | [
"cpe:2.3:a:invensys:wonderware_information_server:4.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:invensys:wonderware_information_server:4.0:sp1:*:*:portal:*:*:*",
"cpe:2.3:a:invensys:wonderware_information_server:4.5:-:portal:*:*:*:*:*",
"cpe:2.3:a:invensys:wonderware_information_server:5.0:-:portal:*:*:*:*:*",
"cpe:2.3:a:invensys:wonderware_information_server:5.5:*:*:*:portal:*:*:*"
]
| null | null | null | 7.8 |
|
GHSA-78vh-6phv-92x4 | Missing Authorization vulnerability in JoomSky JS Help Desk allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects JS Help Desk: from n/a through 2.9.2. | []
| null | 7.5 | null | null |
|
GHSA-59vp-vp33-qhx3 | The Royal Elementor Addons plugin for WordPress is vulnerable to insufficient access control in the 'wpr_save_mega_menu_settings' AJAX action in versions up to, and including, 1.3.59. This allows any authenticated user, including those with subscriber-level permissions, to enable and modify Mega Menu settings for any menu item. | []
| null | 4.3 | null | null |
|
CVE-2016-5185 | Blink in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android incorrectly allowed reentrance of FrameView::updateLifecyclePhasesInternal(), which allowed a remote attacker to perform an out of bounds memory read via crafted HTML pages. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 6.8 |
|
RHSA-2020:0796 | Red Hat Security Advisory: OpenShift Container Platform 3.11 openshift-enterprise-apb-base-container security update | openshift/apb-base: /etc/passwd is given incorrect privileges | [
"cpe:/a:redhat:openshift:3.11::el7"
]
| null | 7 | null | null |
GHSA-wvj7-73j3-j4p2 | Multiple cross-site scripting (XSS) vulnerabilities in ZeusCart 4 allow remote attackers to inject arbitrary web script or HTML via the (1) schltr parameter in a brands action or (2) brand parameter in a viewbrands action to index.php. NOTE: The search parameter vector is already covered by CVE-2010-5322. | []
| null | null | null | null |
|
CVE-2018-12386 | A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3. | [
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*"
]
| null | null | 8.1 | 5.8 |
|
GHSA-c5rc-w46c-83hh | IBM Robotic Process Automation for Cloud Pak 21.0.0 through 21.0.7.4 and 23.0.0 through 23.0.5 is vulnerable to disclosing server version information which may be used to determine software vulnerabilities at the operating system level. IBM X-Force ID: 259368. | []
| null | 4.3 | null | null |
|
GHSA-cwc2-4hmh-9q9r | Mercury SiteScope 8.2 (8.1.2.0) allows remote authenticated users to cause a denial of service (loss of connectivity to the classic interface) via attempted HTML injection into the "new monitor description" field. | []
| null | null | null | null |
|
ICSA-24-046-06 | Siemens Unicam FX | The windows installer agent used in affected product contains incorrect use of privileged APIs that trigger the Windows Console Host (conhost.exe) as a child process with SYSTEM privileges. This could be exploited by an attacker to perform a local privilege escalation attack. | []
| null | 7.8 | null | null |
GHSA-xgg8-892p-f458 | Multiple vulnerabilities in the CLI of Cisco IOS XR Software could allow an authenticated, local attacker with a low-privileged account to elevate privileges on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. | []
| null | null | null | null |
|
GHSA-4xpm-jj66-x7r5 | Unspecified vulnerability in the BI Publisher (formerly XML Publisher) component in Oracle Fusion Middleware 11.1.1.7.0, 11.1.1.9.0, and 12.2.1.0.0 allows remote authenticated users to affect confidentiality via unknown vectors. | []
| null | null | 7.7 | null |
|
GHSA-c8jx-wgmp-xj28 | A vulnerability classified as problematic has been found in eXo Chat Application. Affected is an unknown function of the file application/src/main/webapp/vue-app/components/ExoChatMessageComposer.vue of the component Mention Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 3.3.0-20220417 is able to address this issue. The name of the patch is 26bf307d3658d1403cfd5c3ad423ce4c4d1cb2dc. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-220212. | []
| null | 6.1 | null | null |
|
GHSA-j2wq-fwmf-pw74 | Mahara 15.04 before 15.04.7 and 15.10 before 15.10.3 are vulnerable to prevent session IDs from being regenerated on login or logout. This makes users of the site more vulnerable to session fixation attacks. | []
| null | null | 8.8 | null |
|
CVE-2025-22800 | WordPress Post SMTP plugin <= 2.9.11 - Broken Access Control vulnerability | Missing Authorization vulnerability in Post SMTP Post SMTP allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Post SMTP: from n/a through 2.9.11. | []
| null | 4.3 | null | null |
RHSA-2021:1007 | Red Hat Security Advisory: OpenShift Container Platform 4.7.5 security and bug fix update | gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation containernetworking-cni: Arbitrary path injection via type field in CNI configuration | [
"cpe:/a:redhat:openshift:4.7::el8"
]
| null | 7.2 | null | null |
CVE-2019-25158 | pedroetb tts-api app.js onSpeechDone os command injection | A vulnerability has been found in pedroetb tts-api up to 2.1.4 and classified as critical. This vulnerability affects the function onSpeechDone of the file app.js. The manipulation leads to os command injection. Upgrading to version 2.2.0 is able to address this issue. The patch is identified as 29d9c25415911ea2f8b6de247cb5c4607d13d434. It is recommended to upgrade the affected component. VDB-248278 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:pedroetb:tts-api:*:*:*:*:*:*:*:*"
]
| null | 5.5 | 5.5 | 5.2 |
RHSA-2025:3856 | Red Hat Security Advisory: OpenJDK 21.0.7 Security Update for Portable Linux Builds | openjdk: Better TLS connection support (Oracle CPU 2025-04) openjdk: Improve compiler transformations (Oracle CPU 2025-04) openjdk: Enhance Buffered Image handling (Oracle CPU 2025-04) | [
"cpe:/a:redhat:openjdk:21"
]
| null | 5.6 | null | null |
CVE-2022-49354 | ata: pata_octeon_cf: Fix refcount leak in octeon_cf_probe | In the Linux kernel, the following vulnerability has been resolved:
ata: pata_octeon_cf: Fix refcount leak in octeon_cf_probe
of_find_device_by_node() takes reference, we should use put_device()
to release it when not need anymore.
Add missing put_device() to avoid refcount leak. | []
| null | 5.5 | null | null |
CVE-2018-1093 | The ext4_valid_block_bitmap function in fs/ext4/balloc.c in the Linux kernel through 4.15.15 allows attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image because balloc.c and ialloc.c do not validate bitmap block numbers. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
]
| null | null | 5.5 | 7.1 |
|
GHSA-fxrc-j9qq-62g8 | Gradle Enterprise before 2021.4.3 relies on cleartext data transmission in some situations. It uses Keycloak for identity management services. During the sign-in process, Keycloak sets browser cookies that effectively provide remember-me functionality. For backwards compatibility with older Safari versions, Keycloak sets a duplicate of the cookie without the Secure attribute, which allows the cookie to be sent when accessing the location that cookie is set for via HTTP. This creates the potential for an attacker (with the ability to impersonate the Gradle Enterprise host) to capture the login session of a user by having them click an http:// link to the server, despite the real server requiring HTTPS. | []
| null | 6.5 | null | null |
|
GHSA-rj8p-c8g2-ppv6 | UltraLog Express device management software stores user’s information in cleartext. Any user can obtain accounts information through a specific page. | []
| null | 7.5 | null | null |
|
CVE-2022-24565 | Checkmk <=2.0.0p19 Fixed in 2.0.0p20 and Checkmk <=1.6.0p27 Fixed in 1.6.0p28 are affected by a Cross Site Scripting (XSS) vulnerability. The Alias of a site was not properly escaped when shown as condition for notifications. | [
"cpe:2.3:a:checkmk:checkmk:1.6.0:-:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:b10:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:b12:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:b4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:b5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:b9:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p10:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p11:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p12:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p13:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p14:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p15:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p16:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p19:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p20:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p21:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p22:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p23:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p24:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p25:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p26:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p27:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:b4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:b5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:b6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:b7:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:b8:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:i1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p10:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p11:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p12:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p13:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p14:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p15:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p16:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p17:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p18:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p19:*:*:*:*:*:*"
]
| null | 5.4 | null | 3.5 |
|
GHSA-gq3q-6947-35qj | The Map Block Leaflet plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter in all versions up to, and including, 3.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
| null | 6.4 | null | null |
|
GHSA-gp69-gv9q-c6wx | Cross Site Scripting (XSS) vulnerability exists in YUNUCMS 1.1.9 via the upurl function in Page.php. | []
| null | null | null | null |
|
CVE-2022-48221 | An issue was discovered in Acuant AcuFill SDK before 10.22.02.03. Multiple MSI's get executed out of a standard-user writable directory. Through a race condition and OpLock manipulation, these files can be overwritten by a standard user. They then get executed by the elevated installer. This gives a standard user full SYSTEM code execution (elevation of privileges). | [
"cpe:2.3:a:gbgplc:acuant_acufill_sdk:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
CVE-2016-4768 | WebKit in Apple iOS before 10, tvOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-4759, CVE-2016-4765, CVE-2016-4766, and CVE-2016-4767. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 6.8 |
|
CVE-2015-5666 | ANA App for Android 3.1.1 and earlier, and ANA App for iOS 3.3.6 and earlier does not verify SSL certificates. | [
"cpe:2.3:a:ana:all_nippon_airways:*:*:*:*:*:android:*:*",
"cpe:2.3:a:ana:all_nippon_airways:*:*:*:*:*:iphone_os:*:*"
]
| null | null | 5.9 | 4.3 |
|
CVE-2020-27282 | In Hamilton Medical AG,T1-Ventillator versions 2.2.3 and prior, an XML validation vulnerability in the ventilator allows privileged attackers with physical access to render the device persistently unusable by uploading specially crafted configuration files. | [
"cpe:2.3:o:hamilton-medical:hamilton-t1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hamilton-medical:hamilton-t1:-:*:*:*:*:*:*:*"
]
| null | 4.3 | null | 2.1 |
|
GHSA-8fj5-gq7x-cfm8 | A vulnerability was found in xujiangfei admintwo 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /user/updateSet. The manipulation of the argument email leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | []
| 5.3 | 6.3 | null | null |
|
CVE-2002-1648 | Cross-site request forgery (CSRF) vulnerability in compose.php in SquirrelMail before 1.2.3 allows remote attackers to send email as other users via an IMG URL with modified send_to and subject parameters. | [
"cpe:2.3:a:squirrelmail:squirrelmail:1.2.2:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-p9xh-j68c-vrmg | The System Preferences capability in Mac OS X before 10.3 allows local users to access secure Preference Panes for a short period after an administrator has authenticated to the system. | []
| null | null | null | null |
|
CVE-2024-11236 | Integer overflow in the firebird and dblib quoters causing OOB writes | In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, uncontrolled long string inputs to ldap_escape() function on 32-bit systems can cause an integer overflow, resulting in an out-of-bounds write. | [
"cpe:2.3:a:php_group:php:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
RHSA-2013:0229 | Red Hat Security Advisory: JBoss Enterprise Application Platform 5.2.0 security update | JBoss: allows empty password to authenticate against LDAP | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
]
| null | null | null | null |
CVE-2021-36323 | Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM. | [
"cpe:2.3:o:dell:alienware_13_r3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_13_r3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_15_r3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_15_r3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_15_r4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_15_r4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_17_r4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_17_r4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_17_r5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_17_r5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_area_51m_r1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_area_51m_r1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_area_51m_r2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_area_51m_r2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_aurora_r11_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_aurora_r11:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_aurora_r12_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_aurora_r12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_aurora_r7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_aurora_r7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_aurora_r8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_aurora_r8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_aurora_r9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_aurora_r9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_aurora_ryzen_edition_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_aurora_ryzen_edition:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_m15_r1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_m15_r1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_m15_r2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_m15_r2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_m15_r3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_m15_r3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_m17_r1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_m17_r1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_m17_r2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_m17_r2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_m17_r3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_m17_r3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_x15_r1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_x15_r1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_x17_r1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_x17_r1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3977_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:chengming_3977:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3980_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:chengming_3980:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3988_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:chengming_3988:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3990_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:chengming_3990:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3991_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:chengming_3991:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g3_3579_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:g3_3579:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g3_3590_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:g3_3590:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g3_3779_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:g3_3779:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g5_5000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:g5_5000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g5_5090_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:g5_5090:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g5_5587_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:g5_5587:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g5_5590_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:g5_5590:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g7_7587_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:g7_7587:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g7_7588_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:g7_7588:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g7_7590_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:g7_7590:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g7_7790_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:g7_7790:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:embedded_box_pc_5000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:embedded_box_pc_5000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_13_5378_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_13_5378:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_13_5379_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_13_5379:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_3467_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_14_3467:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_5468_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_14_5468:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_3567_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_15_3567:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_5566_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_15_5566:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_5578_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_15_5578:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_5579_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_15_5579:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_5582_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_15_5582:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_7570_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_15_7570:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_7572_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_15_7572:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_7573_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_15_7573:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_7577_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_15_7577:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_17_7773_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_17_7773:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3268_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3268:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3277_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3277:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3280_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3280:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3470_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3470:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3471_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3471:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3476_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3476:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3477_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3477:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3481_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3481:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3576_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3576:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3580_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3581_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3581:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3668_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3668:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3670_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3671_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3671:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3780_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3780:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3781_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3781:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3880_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3880:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3881_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3881:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5370_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5401_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5401:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5477_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5477:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5481_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5481:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5482_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5482:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5490_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5570_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5570:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5580_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5680_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5680:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5770_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5770:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7370_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7373_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7373:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7380_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7386_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7386:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7467_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7467:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7472_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7472:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7567_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7567:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7580_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7586_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7586:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7590_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7590:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7591_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7591:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7777_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7777:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7786_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7786:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7790_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_7790:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5491_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_5491:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3180_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3180:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3189_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3189:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3190_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3190:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3310_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3379_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3379:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3380_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3390_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3470_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3470:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3490_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3551_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3551:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3570_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3570:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3580_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3590_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_3590:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5175_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5175:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5179_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5179:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5280_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5280:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5285_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5285:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5288_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5288:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5289_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5289:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5290_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5310_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5401_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5401:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5410_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5411_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5411:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5488_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5488:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5490_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5491_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5491:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5501_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5501:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5510_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5511_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5511:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5580_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5590_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5590:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5591_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_5591:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7210_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7275_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7275:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7280_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7280:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7285_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7285:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7290_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7310_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7370_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7380_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7389_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7389:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7390_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7410_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7490_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_7490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9410_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_9410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9510_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_9510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_e5270_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_e5270:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_e5470_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_e5470:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_e5570_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_e5570:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_e7270_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_e7270:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_e7470_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_e7470:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_rugged_5414_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_rugged_5414:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_rugged_5420_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_rugged_5420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_rugged_5424_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_rugged_5424:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_rugged_7220_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_rugged_7220:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_rugged_7220ex_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_rugged_7220ex:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_rugged_7424_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_rugged_7424:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_rugged_extreme_7214_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_rugged_extreme_7214:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_rugged_extreme_7414_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_rugged_extreme_7414:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_rugged_tablet_7212_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:latitude_rugged_tablet_7212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3040_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_3040:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3046_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_3046:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3050_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_3050:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3060_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_3060:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3070_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_3070:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3080_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_3080:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_3240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3280_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_3280:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5040_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_5040:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5050_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_5050:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5060_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_5060:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5070_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_5070:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5080_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_5080:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_5250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_5260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5270_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_5270:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_5480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7040_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_7040:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7050_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_7050:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7060_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_7060:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7070_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_7070:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7071_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_7071:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7080_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_7080:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7440_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_7440:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7450_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_7450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7460_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_7460:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7470_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_7470:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_7480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7760_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_7760:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7770_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_7770:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7780_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_7780:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_xe3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:optiplex_xe3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_3240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3420_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_3420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3430_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_3430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3431_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_3431:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3440_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_3440:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3510_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_3510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3520_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_3520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3530_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_3530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3540_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_3540:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3541_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_3541:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3550_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_3550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3620_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_3620:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3630_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_3630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3640_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_3640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3930_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_3930:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5510_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_5510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5520_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_5520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5530_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_5530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5540_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_5540:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5720_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_5720:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5820_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_5820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7510_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_7510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7520_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_7520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7530_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_7530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7540_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_7540:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7550_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_7550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7710_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_7710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7720_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_7720:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7730_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_7730:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7740_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_7740:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_7750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7820_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_7820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7920_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_7920:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_14_3468_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_14_3468:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_14_3478_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_14_3478:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_14_5468_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_14_5468:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_15_3568_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_15_3568:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_15_3578_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_15_3578:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_15_5568_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_15_5568:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_15_7570_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_15_7570:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_15_7580_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_15_7580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3070_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3070:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3267_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3267:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3268_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3268:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3470_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3470:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3471_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3471:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3481_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3481:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3580_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3581_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3581:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3583_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3583:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3584_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3584:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3660_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3667_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3667:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3668_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3668:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3669_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3669:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3670_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3671_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3671:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3681_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3681:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3881_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3881:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3888_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_3888:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5090_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_5090:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5370_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_5370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5471_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_5471:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5481_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_5481:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5581_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_5581:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5880_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_5880:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_7590_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vostro_7590:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:wyse_5070_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:wyse_5070:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:wyse_5470_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:wyse_5470:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:wyse_7040_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:wyse_7040:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_13_9360_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xps_13_9360:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_13_9370_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xps_13_9370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_13_9380_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xps_13_9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_15_7590_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xps_15_7590:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_15_9560_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xps_15_9560:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_15_9575_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xps_15_9575:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_27_7760_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xps_27_7760:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_7590_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xps_7590:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_8930_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xps_8930:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_8940_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xps_8940:-:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
GHSA-347f-hmcm-xr5h | drivers/misc/qseecom.c in the Qualcomm components in Android before 2016-08-05 on Nexus 5 devices does not validate certain buffer addresses, which allows attackers to gain privileges via a crafted application that makes an ioctl call, aka Android internal bug 28749283 and Qualcomm internal bug CR550061. | []
| null | null | 7.8 | null |
|
CVE-2024-13222 | User Messages <= 1.2.4 - Reflected XSS | The User Messages WordPress plugin through 1.2.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin. | []
| null | 6.1 | null | null |
GHSA-44qf-4fcj-9qhq | The default installation for the Oracle listener program 7.3.4, 8.0.6, and 8.1.6 allows an attacker to cause logging information to be appended to arbitrary files and execute commands via the SET TRC_FILE or SET LOG_FILE commands. | []
| null | null | null | null |
|
GHSA-vww9-9287-j6xm | ZyXEL P-660HW v3 devices allow remote attackers to cause a denial of service (CPU consumption) via a flood of IP packets with a TTL of 1. | []
| null | null | 7.5 | null |
|
CVE-2024-49609 | WordPress Author Discussion plugin <= 0.2.2 - SQL Injection vulnerability | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Brandon White Author Discussion allows Blind SQL Injection.This issue affects Author Discussion: from n/a through 0.2.2. | [
"cpe:2.3:a:brandonwhite:author_discussion:*:*:*:*:*:wordpress:*:*"
]
| null | 8.5 | null | null |
CVE-2023-32119 | WordPress WPO365 | Mail Integration for Office 365 / Outlook Plugin <= 1.9.0 is vulnerable to Cross Site Scripting (XSS) | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WPO365 | Mail Integration for Office 365 / Outlook plugin <= 1.9.0 versions. | [
"cpe:2.3:a:wpo365:mail_integration_for_office_365_\\/_outlook:*:*:*:*:*:wordpress:*:*"
]
| null | 5.8 | null | null |
CVE-2015-2366 | win32k.sys in the kernel-mode drivers in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." | [
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:datacenter:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:essentials:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:standard:*:*:*"
]
| null | null | null | 7.2 |
|
GHSA-fv27-4wpj-3pxc | PreProjects Pre Resume Submitter stores onlineresume.mdb under the web root with insufficient access control, which allows remote attackers to obtain passwords via a direct request. | []
| null | null | null | null |
|
CVE-2023-6416 | SQL injection in Voovi Social Networking Script | A vulnerability has been reported in Voovi Social Networking Script that affects version 1.0 and consists of a SQL injection via signup2.php in the emailadd parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted SQL query to the server and retrieve all the information stored in the application. | [
"cpe:2.3:a:aatifaneeq:voovi:1.0:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
GHSA-r36c-frw4-8q5v | Vulnerability in the Oracle Marketing product of Oracle E-Business Suite (component: Marketing Administration). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Marketing, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Marketing accessible data as well as unauthorized update, insert or delete access to some of Oracle Marketing accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). | []
| null | 8.2 | null | null |
|
CVE-2009-1064 | Argument injection vulnerability in orbitmxt.dll 2.1.0.2 in the Orbit Downloader 2.8.7 and earlier ActiveX control allows remote attackers to overwrite arbitrary files via whitespace and a command-line switch, followed by a full pathname, in the third argument to the download method. | [
"cpe:2.3:a:orbit_downloader:orbit_downloader:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:orbit_downloader:orbit_downloader:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:orbitdownloader:orbit_downloader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:orbitdownloader:orbit_downloader:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:orbitdownloader:orbit_downloader:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:orbitdownloader:orbit_downloader:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:orbitdownloader:orbit_downloader:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:orbitdownloader:orbit_downloader:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:orbitdownloader:orbit_downloader:2.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:orbitdownloader:orbit_downloader:2.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:orbitdownloader:orbit_downloader:2.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:orbitdownloader:orbit_downloader:2.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:orbitdownloader:orbit_downloader:2.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:orbitdownloader:orbit_downloader:2.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:orbitdownloader:orbit_downloader:2.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:orbitdownloader:orbit_downloader:2.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:orbitdownloader:orbit_downloader:2.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:orbitdownloader:orbit_downloader:2.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:orbitdownloader:orbit_downloader:2.8.5:*:*:*:*:*:*:*"
]
| null | null | null | 5.8 |
|
GHSA-f7fv-v9rh-prvc | Tornado CRLF injection vulnerability | CRLF injection vulnerability in the `tornado.web.RequestHandler.set_header` function in Tornado before 2.2.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input. | []
| 8.7 | 7.5 | null | null |
GHSA-hr59-8rhc-wm6g | Google V8, as used in Google Chrome before 12.0.742.91, allows remote attackers to bypass the Same Origin Policy via unspecified vectors. | []
| null | null | null | null |
|
GHSA-3gwr-wj7f-25vv | The Login With OTP Over SMS, Email, WhatsApp and Google Authenticator WordPress plugin before 1.0.8 does not escape its settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed | []
| null | 4.8 | null | null |
|
GHSA-8v45-83mv-7j9c | In ccu, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05827158; Issue ID: ALPS05827158. | []
| null | 6.7 | null | null |
|
CVE-2023-49289 | Cross-site Scripting in Ajax.NET Professional | Ajax.NET Professional (AjaxPro) is an AJAX framework for Microsoft ASP.NET which will create proxy JavaScript classes that are used on client-side to invoke methods on the web server. Affected versions of this package are vulnerable cross site scripting attacks. Releases before version 21.12.22.1 are affected. Users are advised to upgrade. There are no known workarounds for this vulnerability. | [
"cpe:2.3:a:michaelschwarz:ajax.net_professional:*:*:*:*:*:asp.net:*:*"
]
| null | 6.3 | null | null |
CVE-2022-32960 | HiCOS’ client-side citizen digital certificate - Stack Buffer Overflow | HiCOS’ client-side citizen digital certificate component has a stack-based buffer overflow vulnerability when reading IC card due to insufficient parameter length validation for card number. An unauthenticated physical attacker can exploit this vulnerability to execute arbitrary code, manipulate system data or terminate service. | [
"cpe:2.3:a:hinet:hicos_natural_person_credential_component_client:3.0.3.30306:*:*:*:*:linux:*:*",
"cpe:2.3:a:hinet:hicos_natural_person_credential_component_client:3.0.3.30404:*:*:*:*:macos:*:*",
"cpe:2.3:a:hinet:hicos_natural_person_credential_component_client:3.1.0.00002:*:*:*:*:windows:*:*"
]
| null | 6.8 | null | null |
GHSA-69w3-h2gr-24wp | SQL injection vulnerability in infopage.asp in Mall23 eCommerce allows remote attackers to execute arbitrary SQL commands via the idPage parameter. | []
| null | null | null | null |
|
CVE-2019-20457 | An issue was discovered on Brother MFC-J491DW C1806180757 devices. The printer's web-interface password hash can be retrieved without authentication, because the response header of any failed login attempt returns an incomplete authorization cookie. The value of the authorization cookie is the MD5 hash of the password in hexadecimal. An attacker can easily derive the true MD5 hash from this, and use offline cracking attacks to obtain administrative access to the device. | [
"cpe:2.3:h:brother:mfc-j491dw:-:*:*:*:*:*:*:*"
]
| null | 9.1 | null | null |
|
GHSA-985h-qhqc-c368 | DiskCryptor 0.2.6 on Windows stores pre-boot authentication passwords in the BIOS Keyboard buffer and does not clear this buffer before and after use, which allows local users to obtain sensitive information by reading the physical memory locations associated with this buffer. | []
| null | null | null | null |
|
CVE-2008-2001 | Apple Safari 3.1.1 allows remote attackers to cause a denial of service (application crash) via a file:///%E2 link that triggers an out-of-bounds access, possibly due to a NULL pointer dereference. | [
"cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2014-0429 | Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. | [
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:a:oracle:jrockit:r27.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jrockit:r28.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:juniper:junos_space:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update61:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update71:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update51:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update61:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update71:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update51:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:-:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:forms_viewer:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
GHSA-h7h5-4p4x-8qmq | A command injection vulnerability exists in Moxa Inc VPort 461 Series Firmware Version 3.4 or lower that could allow a remote attacker to execute arbitrary commands in Moxa's VPort 461 Series Industrial Video Servers. | []
| null | null | null | null |
|
CVE-2008-6711 | Unspecified vulnerability in the Web administration interface in Avaya Communication Manager 3.1.x before CM 3.1.4 SP2 and 4.0.x before 4.0.3 SP1 allows remote authenticated users to execute arbitrary commands via unknown vectors related to "viewing system logs." | [
"cpe:2.3:a:avaya:communication_manager:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:3.1.4:sp1:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:4.0.1:sp15215:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:4.0.1:sp15500:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:4.0.3:*:*:*:*:*:*:*"
]
| null | null | null | 9 |
|
CVE-2024-57898 | wifi: cfg80211: clear link ID from bitmap during link delete after clean up | In the Linux kernel, the following vulnerability has been resolved:
wifi: cfg80211: clear link ID from bitmap during link delete after clean up
Currently, during link deletion, the link ID is first removed from the
valid_links bitmap before performing any clean-up operations. However, some
functions require the link ID to remain in the valid_links bitmap. One
such example is cfg80211_cac_event(). The flow is -
nl80211_remove_link()
cfg80211_remove_link()
ieee80211_del_intf_link()
ieee80211_vif_set_links()
ieee80211_vif_update_links()
ieee80211_link_stop()
cfg80211_cac_event()
cfg80211_cac_event() requires link ID to be present but it is cleared
already in cfg80211_remove_link(). Ultimately, WARN_ON() is hit.
Therefore, clear the link ID from the bitmap only after completing the link
clean-up. | []
| null | null | null | null |
GHSA-wcj8-ch6c-ccvv | The Lenovo Service Framework Android application accepts some responses from the server without proper validation. This exposes the application to man-in-the-middle attacks leading to possible remote code execution. | []
| null | null | 8.1 | null |
|
CVE-2009-1246 | Multiple directory traversal vulnerabilities in Blogplus 1.0 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the (1) row_mysql_blocks_center_down[file] parameter to includes/block_center_down.php; (2) row_mysql_blocks_center_top[file] includes/parameter to block_center_top.php; (3) row_mysql_blocks_left[file] parameter to includes/block_left.php; (4) row_mysql_blocks_right[file] parameter to includes/block_right.php; and row_mysql_bloginfo[theme] parameter to (5) includes/window_down.php and (6) includes/window_top.php. | [
"cpe:2.3:a:blogplus:blogplus:1.0:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2023-37723 | Tenda F1202 V1.0BR_V1.2.0.20(408), FH1202_V1.2.0.19_EN were discovered to contain a stack overflow in the page parameter in the function fromqossetting. | [
"cpe:2.3:h:tenda:f1202:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:fh1202:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:f1202_firmware:1.2.0.20\\(408\\):*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:fh1202_firmware:1.2.0.19_en:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:f1202_firmware:1.0br:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:4g300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:4g300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:pw201a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:pw201a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:pa202_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:pa202:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
GHSA-pwm8-7wmq-v7qm | An elevation of privilege vulnerability exists in Windows Setup in the way it handles permissions.A locally authenticated attacker could run arbitrary code with elevated system privileges, aka 'Windows Setup Elevation of Privilege Vulnerability'. | []
| null | 7.3 | null | null |
|
CVE-2016-3386 | The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3389, CVE-2016-7190, and CVE-2016-7194. | [
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 9.3 |
|
CVE-2024-20944 | Vulnerability in the Oracle iSupport product of Oracle E-Business Suite (component: Internal Operations). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle iSupport. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iSupport, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle iSupport accessible data as well as unauthorized read access to a subset of Oracle iSupport accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:isupport:*:*:*:*:*:*:*:*"
]
| null | 5.4 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.