id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-j238-4ph7-9jqw
CM Soluces Informatica Ltda Auto Atendimento 1.x.x was discovered to contain a SQL injection via the DATANASC parameter.
[]
null
6.8
null
null
GHSA-9q4c-934r-v45r
Directory traversal vulnerability in the Browse function (/browse URI) in Winamp Web Interface (Wawi) 7.5.13 and earlier allows remote authenticated users to list arbitrary directories via URL encoded backslashes ("%2F") in the path parameter.
[]
null
null
null
null
GHSA-6rcm-qx5r-cr23
gnome-exe-thumbnailer before 0.9.5 is prone to a VBScript Injection when generating thumbnails for MSI files, aka the "Bad Taste" issue. There is a local attack if the victim uses the GNOME Files file manager, and navigates to a directory containing a .msi file with VBScript code in its filename.
[]
null
null
7.8
null
CVE-2017-15686
Crafter CMS Crafter Studio 3.0.1 is affected by: Cross Site Scripting (XSS), which allows remote attackers to steal users’ cookies.
[ "cpe:2.3:a:craftercms:crafter_cms:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
GHSA-fqv7-fhq2-929v
libmodbus v3.1.10 has a heap-based buffer overflow vulnerability in read_io_status function in src/modbus.c.
[]
null
9.8
null
null
CVE-2018-5274
In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9C40E024. NOTE: the vendor reported that they "have not been able to reproduce the issue on any Windows operating system version (32-bit or 64-bit).
[ "cpe:2.3:a:malwarebytes:malwarebytes:3.3.1.2183:*:*:*:premium:*:*:*" ]
null
null
7.8
6.1
CVE-2023-27537
A double free vulnerability exists in libcurl <8.0.0 when sharing HSTS data between separate "handles". This sharing was introduced without considerations for do this sharing across separate threads but there was no indication of this fact in the documentation. Due to missing mutexes or thread locks, two threads sharing the same HSTS data could end up doing a double-free or use-after-free.
[ "cpe:2.3:a:haxx:libcurl:7.88.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.88.1:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:clustered_data_ontap:9.0:-:*:*:*:*:*:*", "cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*", "cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*" ]
null
5.9
null
null
GHSA-x8hq-gmcw-28cp
Directory traversal vulnerability in oc-includes/osclass/controller/ajax.php in OSClass before 3.4.3 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the ajaxfile parameter in a custom action.
[]
null
null
null
null
CVE-2024-22250
Session Hijack Vulnerability in Deprecated EAP Browser Plugin
Session Hijack vulnerability in Deprecated VMware Enhanced Authentication Plug-in could allow a malicious actor with unprivileged local access to a windows operating system can hijack a privileged EAP session when initiated by a privileged domain user on the same system.
[ "cpe:2.3:a:vmware:enhanced_authentication_plugin:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2006-6901
Unspecified vulnerability in the Bluetooth stack in Microsoft Windows allows remote attackers to gain administrative access (aka Remote Root) via unspecified vectors.
[ "cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-m45q-r6x2-5q77
D-Link DIR-2640-US 1.01B04 is affected by Insufficiently Protected Credentials. D-Link AC2600(DIR-2640) stores the device system account password in plain text. It does not use linux user management. In addition, the passwords of all devices are the same, and they cannot be modified by normal users. An attacker can easily log in to the target router through the serial port and obtain root privileges.
[]
null
null
null
null
GHSA-px6r-pjwr-j383
An issue was discovered in Xpdf 4.01.01. There is a NULL pointer dereference in the function Gfx::opSetExtGState in Gfx.cc.
[]
null
null
5.5
null
GHSA-4248-p65p-hcrm
Insecure random string generator used for sensitive data
CubeFS used an insecure random string generator to generate user-specific, sensitive keys used to authenticate users in a CubeFS deployment. This could allow an attacker to predict and/or guess the generated string and impersonate a user thereby obtaining higher privileges.When CubeFS creates new users, it creates a piece of sensitive information for the user called the “accessKey”. To create the "accesKey", CubeFS uses an insecure string generator which makes it easy to guess and thereby impersonate the created user.An attacker could leverage the predictable random string generator and guess a users access key and impersonate the user to obtain higher privileges.There is no evidence of this vulnerability being exploited in the wild. It was found during a security audit carried out by [Ada Logics](https://adalogics.com/) in collaboration with [OSTIF](https://ostif.org/) and the [CNCF](https://www.cncf.io/).The issue has been fixed in v3.3.1. There is no other mitigation than to upgrade.
[]
8.2
6.5
null
null
CVE-2018-17621
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Format events. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6355.
[ "cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
GHSA-wfpj-872h-h97h
Buffer overflow in SUSE blinux (aka sbl) in SUSE openSUSE 10.3 through 11.0 has unknown impact and attack vectors related to "incoming data and authentication-strings."
[]
null
null
null
null
CVE-2020-10098
An XSS issue was discovered in Zammad 3.0 through 3.2. Malicious code can be provided by a low-privileged user through the Email functionality. The malicious JavaScript will execute within the browser of any user who opens the Ticket with the Article created from that Email.
[ "cpe:2.3:a:zammad:zammad:*:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
CVE-2012-2631
Cross-site scripting (XSS) vulnerability in WEBLOGIC @WEB ShoppingCart before 1.5.2.0, and @WEB ShoppingCart T 1.5.0.1 and earlier, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:atmarkweb:\\@web_shoppingcart_t:*:*:*:*:*:*:*:*", "cpe:2.3:a:atmarkweb:\\@web_shoppingcart:*:*:*:*:*:*:*:*", "cpe:2.3:a:atmarkweb:\\@web_shoppingcart:1.1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:atmarkweb:\\@web_shoppingcart:1.1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:atmarkweb:\\@web_shoppingcart:1.1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:atmarkweb:\\@web_shoppingcart:1.2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:atmarkweb:\\@web_shoppingcart:1.3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:atmarkweb:\\@web_shoppingcart:1.3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:atmarkweb:\\@web_shoppingcart:1.3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:atmarkweb:\\@web_shoppingcart:1.5.0.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2004-1890
Unknown vulnerability in ftpd in SGI IRIX 6.5.20 through 6.5.23 allows remote attackers to cause a denial of service (hang) via the PORT mode.
[ "cpe:2.3:o:sgi:irix:6.5.20:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.20f:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.20m:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.21:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.21f:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.21m:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.22:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.23:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-xcc5-p2w6-cc26
An issue was discovered in GitLab Community and Enterprise Edition 8.13 through 11.11. Non-member users who subscribed to issue notifications could access the title of confidential issues through the unsubscription page. It allows Information Disclosure.
[]
null
null
null
null
GHSA-q5r9-mq4v-66m3
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in FormAssembly / Drew Buschhorn WP-FormAssembly allows Path Traversal.This issue affects WP-FormAssembly: from n/a through 2.0.5.
[]
null
6.5
null
null
GHSA-24cp-rv65-qm42
File Deletion vulnerability in Halo 0.4.3 via delBackup.
[]
null
9.1
null
null
GHSA-mcrr-8hgm-pfx3
Improper input validation in the firmware for some Intel(R) NUC Laptop Kits before version BC0076 may allow a privileged user to potentially enable escalation of privilege via physical access.
[]
null
6.2
null
null
CVE-2017-6103
Persistent XSS Vulnerability in Wordpress plugin AnyVar v0.1.1.
[ "cpe:2.3:a:anyvar_project:anyvar:0.1.1:*:*:*:*:wordpress:*:*" ]
null
null
6.1
4.3
CVE-2020-25705
A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*" ]
null
7.4
null
5.8
GHSA-hxfg-qj5j-8pf3
The packet_recvmsg function in net/packet/af_packet.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
[]
null
null
null
null
CVE-2014-2027
eGroupware before 1.8.006.20140217 allows remote attackers to conduct PHP object injection attacks, delete arbitrary files, and possibly execute arbitrary code via the (1) addr_fields or (2) trans parameter to addressbook/csv_import.php, (3) cal_fields or (4) trans parameter to calendar/csv_import.php, (5) info_fields or (6) trans parameter to csv_import.php in (a) projectmanager/ or (b) infolog/, or (7) processed parameter to preferences/inc/class.uiaclprefs.inc.php.
[ "cpe:2.3:a:egroupware:egroupware:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-6q26-qc2c-2cjr
Buffer Overflow in the FTP client in LabF nfsAxe 3.7 allows remote FTP servers to execute arbitrary code via a long reply.
[]
null
null
9.8
null
cisco-sa-fmcai-z5dQObVN
Cisco Firepower Management Center File Overwrite Vulnerability
A vulnerability in the web UI of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to overwrite files on the file system of an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by uploading a crafted file to the web UI on an affected device. A successful exploit could allow the attacker to overwrite files on the file system of the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
null
6.8
null
GHSA-p4q7-9rgw-23r7
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tggfref WP-Recall allows Reflected XSS. This issue affects WP-Recall: from n/a through 16.26.14.
[]
null
7.1
null
null
GHSA-g8g5-r26f-qmjp
FlyCms v1.0 contains a Cross-Site Request Forgery (CSRF) vulnerability via /system/score/del.
[]
null
8.8
null
null
CVE-2022-32786
An issue in the handling of environment variables was addressed with improved validation. This issue is fixed in Security Update 2022-005 Catalina, macOS Big Sur 11.6.8, macOS Monterey 12.5. An app may be able to modify protected parts of the file system.
[ "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:10.15.7:-:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:10.15.7:security_update_2022-004:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2016-2184
The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_live_patching:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_module_for_public_cloud:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:11.0:sp4:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12.0:sp1:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:extra:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*" ]
null
null
4.6
4.9
CVE-2010-4217
Use-after-free vulnerability in the proxy server in IBM Tivoli Directory Server (TDS) 6.0.0.x before 6.0.0.8-TIV-ITDS-IF0007 and 6.1.x before 6.1.0-TIV-ITDS-FP0005 allows remote attackers to cause a denial of service (daemon crash) via an unbind request that occurs during a certain search operation.
[ "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.33:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.41:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.45:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.52:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.53:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.54:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.55:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.56:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.57:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.58:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.59:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.60:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.61:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.62:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.63:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.64:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.5:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-c6j7-p32g-jc4p
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Paul Bearne Author Avatars List/Block allows Stored XSS.This issue affects Author Avatars List/Block: from n/a through 2.1.17.
[]
null
6.5
null
null
GHSA-rc33-rp5v-32v2
Vulnerability in Drupal Allow All File Extensions for file fields.This issue affects Allow All File Extensions for file fields: *.*.
[]
null
7.3
null
null
CVE-2025-6278
Upsonic server.py os.path.join path traversal
A vulnerability classified as critical was found in Upsonic up to 0.55.6. This vulnerability affects the function os.path.join of the file markdown/server.py. The manipulation of the argument file.filename leads to path traversal. The exploit has been disclosed to the public and may be used.
[]
5.1
5.5
5.5
5.2
GHSA-55hc-87j9-4c2v
The sell function of a smart contract implementation for GSI, an Ethereum token, has an integer overflow in which "amount * sellPrice" can be zero, consequently reducing a seller's assets.
[]
null
null
7.5
null
GHSA-vcx9-7pcc-q8c7
strongSwan 5.9.8 and 5.9.9 potentially allows remote code execution because it uses a variable named "public" for two different purposes within the same function. There is initially incorrect access control, later followed by an expired pointer dereference. One attack vector is sending an untrusted client certificate during EAP-TLS. A server is affected only if it loads plugins that implement TLS-based EAP methods (EAP-TLS, EAP-TTLS, EAP-PEAP, or EAP-TNC). This is fixed in 5.9.10.
[]
null
9.8
null
null
CVE-2023-51520
WordPress Booking Calendar Plugin < 9.7.4 is vulnerable to Cross Site Scripting (XSS)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPdevelop / Oplugins WP Booking Calendar allows Stored XSS.This issue affects WP Booking Calendar: from n/a before 9.7.4.
[ "cpe:2.3:a:wpbookingcalendar:booking_calendar:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
null
GHSA-vvw8-h7mx-m7jj
A vulnerability classified as problematic was found in TOTOLINK N150RT 3.4.0-B20190525. This vulnerability affects unknown code of the component Virtual Server Page. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
4.8
2.4
null
null
GHSA-qf6x-7g55-4wgc
Buffer Over-read in GitHub repository gpac/gpac prior to v2.3.0-DEV.
[]
null
7.8
null
null
CVE-2023-1707
Certain HP Enterprise LaserJet and HP LaserJet Managed Printers are potentially vulnerable to information disclosure when IPsec is enabled with FutureSmart version 5.6.
[ "cpe:2.3:o:hp:futuresmart_5:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_5700_49k98a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_5700_6qn28a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_6700_49l00a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_6700_4y280a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_6700_58m42a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_6700_6qn33a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_6701_49l00a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_6701_4y280a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_6701_58m42a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_6701_6qn33a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_5800_49k96av:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_5800_58r10a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_5800_6qn29a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_5800_6qn30a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_5800_6qn31a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_6800_49k84a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_6800_4y279a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_6800_6qn35a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_6800_6qn36a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_6800_6qn37a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_6800_6qn38a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_x57945_49k97av:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_x57945_6qp98a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_x57945_6qp99a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_5800_49k96av:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_5800_58r10a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_5800_6qn29a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_5800_6qn30a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_5800_6qn31a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_6800_49k84a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_6800_4y279a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_6800_6qn35a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_6800_6qn36a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_6800_6qn37a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_6800_6qn38a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_x57945_49k97av:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_x57945_6qp98a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_x57945_6qp99a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_x55745_49k99a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_x55745_6qp97a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_m455_3pz95a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_m480_3qa55a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_e45028_3qa35a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_3sj19a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_3sj20a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_3sj21a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_3sj22a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_3sj35a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_3sj36a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_3sj37a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_3sj38a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_5qk03a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_5qk08a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_5qk20a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_3sj19a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_3sj20a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_3sj21a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_3sj22a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_3sj35a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_3sj36a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_3sj37a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_3sj38a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_5qk03a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_5qk08a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_5qk20a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_3sj19a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_3sj20a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_3sj21a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_3sj22a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_3sj35a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_3sj36a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_3sj37a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_3sj38a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_5qk03a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_5qk08a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_5qk20a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_3sj19a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_3sj20a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_3sj21a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_3sj22a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_3sj35a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_3sj36a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_3sj37a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_3sj38a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_5qk03a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_5qk08a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_5qk20a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e786_3sj11a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e786_3sj12a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e786_3sj13a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e786_3sj32a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e786_3sj33a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e786_3sj34a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e786_5qj90a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e786_5qj94a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e786_5qk18a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78625_3sj11a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78625_3sj12a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78625_3sj13a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78625_3sj32a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78625_3sj33a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78625_3sj34a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78625_5qj90a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78625_5qj94a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78625_5qk18a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78630_3sj11a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78630_3sj12a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78630_3sj13a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78630_3sj32a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78630_3sj33a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78630_3sj34a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78630_5qj90a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78630_5qj94a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78630_5qk18a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78635_3sj11a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78635_3sj12a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78635_3sj13a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78635_3sj32a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78635_3sj33a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78635_3sj34a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78635_5qj90a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78635_5qj94a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78635_5qk18a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e47528_3qa75a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78523_5qj81a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78523_5qj83a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78523_5qk15a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78528_5qj81a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78528_5qj83a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78528_5qk15a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e785dn_5qj81a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e785dn_5qj83a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e785dn_5qk15a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e786_3sj11a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e786_3sj12a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e786_3sj13a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e786_3sj32a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e786_3sj33a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e786_3sj34a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e786_5qj90a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e786_5qj94a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e786_5qk18a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78625_3sj11a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78625_3sj12a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78625_3sj13a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78625_3sj32a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78625_3sj33a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78625_3sj34a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78625_5qj90a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78625_5qj94a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78625_5qk18a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78630_3sj11a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78630_3sj12a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78630_3sj13a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78630_3sj32a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78630_3sj33a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78630_3sj34a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78630_5qj90a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78630_5qj94a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78630_5qk18a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78635_3sj11a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78635_3sj12a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78635_3sj13a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78635_3sj32a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78635_3sj33a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78635_3sj34a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78635_5qj90a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78635_5qj94a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78635_5qk18a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_3sj19a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_3sj20a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_3sj21a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_3sj22a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_3sj35a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_3sj36a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_3sj37a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_3sj38a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_5qk03a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_5qk08a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_5qk20a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_3sj19a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_3sj20a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_3sj21a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_3sj22a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_3sj35a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_3sj36a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_3sj37a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_3sj38a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_5qk03a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_5qk08a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_5qk20a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_3sj19a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_3sj20a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_3sj21a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_3sj22a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_3sj35a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_3sj36a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_3sj37a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_3sj38a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_5qk03a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_5qk08a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_5qk20a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_3sj19a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_3sj20a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_3sj21a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_3sj22a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_3sj35a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_3sj36a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_3sj37a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_3sj38a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_5qk03a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_5qk08a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_5qk20a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_enterprise_m406_3pz15a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_enterprise_m407_3pz16a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_enterprise_mfp_m430_3pz55a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_enterprise_mfp_m431_3pz56a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_e40040_3pz35a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_e82650_3sj07a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_e82650_3sj08a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_e82650_3sj09a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_e82650_3sj28a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_e82650_3sj29a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_e82650_3sj30a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_e82650_5qk09a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_e82650_5qk13a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_e82660_3sj07a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_e82660_3sj08a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_e82660_3sj09a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_e82660_3sj28a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_e82660_3sj29a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_e82660_3sj30a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_e82660_5qk09a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_e82660_5qk13a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_e82670_3sj07a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_e82670_3sj08a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_e82670_3sj09a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_e82670_3sj28a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_e82670_3sj29a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_e82670_3sj30a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_e82670_5qk09a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_e82670_5qk13a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73030_3sj03a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73030_3sj04a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73030_5qj87a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73130_3sj00a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73130_3sj01a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73130_3sj02a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73130_5qj98a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73130_5qk02a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73130_6bs57a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73130_6bs58a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73130_6bs59a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73135_3sj00a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73135_3sj01a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73135_3sj02a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73135_5qj98a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73135_5qk02a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73135_6bs57a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73135_6bs58a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73135_6bs59a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73140_3sj00a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73140_3sj01a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73140_3sj02a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73140_5qj98a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73140_5qk02a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73140_6bs57a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73140_6bs58a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73140_6bs59a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e826z_3sj07a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e826z_3sj08a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e826z_3sj09a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e826z_3sj28a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e826z_3sj29a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e826z_3sj30a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e826z_5qk09a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e826z_5qk13a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e42540_3pz75a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e73025_3sj03a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e73025_3sj04a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e73025_5qj87a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e73030_3sj03a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e73030_3sj04a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e73030_5qj87a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e73130_3sj00a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e73130_3sj01a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e73130_3sj02a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e73130_5qj98a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e73130_5qk02a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e73130_6bs57a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e73130_6bs58a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e73130_6bs59a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e73135_3sj00a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e73135_3sj01a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e73135_3sj02a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e73135_5qj98a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e73135_5qk02a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e73135_6bs57a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e73135_6bs58a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e73135_6bs59a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e73140_3sj00a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e73140_3sj01a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e73140_3sj02a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e73140_5qj98a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e73140_5qk02a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e73140_6bs57a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e73140_6bs58a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e73140_6bs59a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e826dn_3sj07a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e826dn_3sj08a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e826dn_3sj09a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e826dn_3sj28a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e826dn_3sj29a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e826dn_3sj30a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e826dn_5qk09a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_managed_mfp_e826dn_5qk13a:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2009-0364
Format string vulnerability in the mini_calendar component in Citadel.org WebCit 7.22, and other versions before 7.39, allows remote attackers to execute arbitrary code via unspecified vectors.
[ "cpe:2.3:a:citadel:webcit:*:*:*:*:*:*:*:*", "cpe:2.3:a:citadel:webcit:7.02:*:*:*:*:*:*:*", "cpe:2.3:a:citadel:webcit:7.10:*:*:*:*:*:*:*", "cpe:2.3:a:citadel:webcit:7.11:*:*:*:*:*:*:*", "cpe:2.3:a:citadel:webcit:7.12:*:*:*:*:*:*:*", "cpe:2.3:a:citadel:webcit:7.22:*:*:*:*:*:*:*", "cpe:2.3:a:citadel:webcit:7.37:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2021-27196
Specially Crafted IEC 61850 Protocol Sequence Vulnerability
Improper Input Validation vulnerability in Hitachi ABB Power Grids Relion 670 Series, Relion 670/650 Series, Relion 670/650/SAM600-IO, Relion 650, REB500, RTU500 Series, FOX615 (TEGO1), MSM, GMS600, PWC600 allows an attacker with access to the IEC 61850 network with knowledge of how to reproduce the attack, as well as the IP addresses of the different IEC 61850 access points (of IEDs/products), to force the device to reboot, which renders the device inoperable for approximately 60 seconds. This vulnerability affects only products with IEC 61850 interfaces. This issue affects: Hitachi ABB Power Grids Relion 670 Series 1.1; 1.2.3 versions prior to 1.2.3.20; 2.0 versions prior to 2.0.0.13; 2.1; 2.2.2 versions prior to 2.2.2.3; 2.2.3 versions prior to 2.2.3.2. Hitachi ABB Power Grids Relion 670/650 Series 2.2.0 versions prior to 2.2.0.13. Hitachi ABB Power Grids Relion 670/650/SAM600-IO 2.2.1 versions prior to 2.2.1.6. Hitachi ABB Power Grids Relion 650 1.1; 1.2; 1.3 versions prior to 1.3.0.7. Hitachi ABB Power Grids REB500 7.3; 7.4; 7.5; 7.6; 8.2; 8.3. Hitachi ABB Power Grids RTU500 Series 7.x version 7.x and prior versions; 8.x version 8.x and prior versions; 9.x version 9.x and prior versions; 10.x version 10.x and prior versions; 11.x version 11.x and prior versions; 12.x version 12.x and prior versions. Hitachi ABB Power Grids FOX615 (TEGO1) R1D02 version R1D02 and prior versions. Hitachi ABB Power Grids MSM 2.1.0 versions prior to 2.1.0. Hitachi ABB Power Grids GMS600 1.3.0 version 1.3.0 and prior versions. Hitachi ABB Power Grids PWC600 1.0 versions prior to 1.0.1.4; 1.1 versions prior to 1.1.0.1.
[ "cpe:2.3:o:hitachienergy:relion_670_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hitachienergy:relion_670_firmware:1.1:*:*:*:*:*:*:*", "cpe:2.3:o:hitachienergy:relion_670_firmware:2.1:*:*:*:*:*:*:*", "cpe:2.3:h:hitachienergy:relion_670:-:*:*:*:*:*:*:*", "cpe:2.3:o:hitachienergy:relion_650_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hitachienergy:relion_650_firmware:1.1:*:*:*:*:*:*:*", "cpe:2.3:o:hitachienergy:relion_650_firmware:1.2:*:*:*:*:*:*:*", "cpe:2.3:o:hitachienergy:relion_650_firmware:2.1:*:*:*:*:*:*:*", "cpe:2.3:h:hitachienergy:relion_650:-:*:*:*:*:*:*:*", "cpe:2.3:o:hitachienergy:relion_sam600-io_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hitachienergy:relion_sam600-io:-:*:*:*:*:*:*:*", "cpe:2.3:o:hitachienergy:rtu500_firmware:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:hitachienergy:rtu500_firmware:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:hitachienergy:rtu500_firmware:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:hitachienergy:rtu500_firmware:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:hitachienergy:rtu500_firmware:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:hitachienergy:rtu500_firmware:12.0:*:*:*:*:*:*:*", "cpe:2.3:h:hitachienergy:rtu500:-:*:*:*:*:*:*:*", "cpe:2.3:o:hitachienergy:reb500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hitachienergy:reb500:-:*:*:*:*:*:*:*", "cpe:2.3:o:hitachienergy:fox615_tego1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hitachienergy:fox615_tego1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hitachienergy:modular_switchgear_monitoring_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hitachienergy:modular_switchgear_monitoring:-:*:*:*:*:*:*:*", "cpe:2.3:o:hitachienergy:gms600_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hitachienergy:gms600:-:*:*:*:*:*:*:*", "cpe:2.3:o:hitachienergy:pwc600_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hitachienergy:pwc600:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-c33c-6hj9-gf9j
Use After Free in GitHub repository vim/vim prior to 9.0.0359.
[]
null
7.8
null
null
CVE-1999-0124
Vulnerabilities in UMN gopher and gopher+ versions 1.12 and 2.0x allow an intruder to read any files that can be accessed by the gopher daemon.
[ "cpe:2.3:a:university_of_minnesota:gopherd:*:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-38hp-c2qq-q6vh
The installer in VMware Workstation 7.x before 7.1.2 build 301548 and VMware Player 3.x before 3.1.2 build 301548 renders an index.htm file if present in the installation directory, which might allow local users to trigger unintended interpretation of web script or HTML by creating this file.
[]
null
null
null
null
CVE-2017-3568
Vulnerability in the Oracle Hospitality OPERA 5 Property Services component of Oracle Hospitality Applications (subcomponent: OPERA Printing and Login). Supported versions that are affected are 5.4.0.x, 5.4.1.x, 5.4.2.x, 5.4.3.x, 5.5.0.x and 5.5.1.x. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Hospitality OPERA 5 Property Services executes to compromise Oracle Hospitality OPERA 5 Property Services. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Hospitality OPERA 5 Property Services accessible data as well as unauthorized access to critical data or complete access to all Oracle Hospitality OPERA 5 Property Services accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Hospitality OPERA 5 Property Services. CVSS 3.0 Base Score 6.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L).
[ "cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.5.1:*:*:*:*:*:*:*" ]
null
null
6.5
3.7
GHSA-gmvm-33rw-f6fh
The SMTP for SendGrid – YaySMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
7.2
null
null
CVE-2024-25298
An issue was discovered in REDAXO version 5.15.1, allows attackers to execute arbitrary code and obtain sensitive information via modules.modules.php.
[ "cpe:2.3:a:redaxo:redaxo:5.15.1:*:*:*:*:*:*:*" ]
null
7.2
null
null
GHSA-q93h-2387-4rjw
Cross-site scripting (XSS) vulnerability in Phpgurukul Cyber Cafe Management System 1.0 allows remote attackers to inject arbitrary web script or HTML via the admin username parameter.
[]
null
6.1
null
null
GHSA-2872-89wh-3frc
The ksmbd server through 3.4.2, as used in the Linux kernel through 5.15.8, sometimes communicates in cleartext even though encryption has been enabled. This occurs because it sets the SMB2_GLOBAL_CAP_ENCRYPTION flag when using the SMB 3.1.1 protocol, which is a violation of the SMB protocol specification. When Windows 10 detects this protocol violation, it disables encryption.
[]
null
7.5
null
null
CVE-2024-34444
WordPress Slider Revolution plugin < 6.7.0 - Unauthenticated Broken Access Control vulnerability
Missing Authorization vulnerability in ThemePunch OHG Slider Revolution.This issue affects Slider Revolution: from n/a before 6.7.0.
[ "cpe:2.3:a:themepunch:slider_revolution:*:*:*:*:*:wordpress:*:*" ]
null
7.1
null
null
GHSA-3pmf-5hr9-r9r6
Draytek devices Vigor 165/166 prior to v4.2.6 , Vigor 2620/LTE200 prior to v3.9.8.8, Vigor 2860/2925 prior to v3.9.7, Vigor 2862/2926 prior to v3.9.9.4, Vigor 2133/2762/2832 prior to v3.9.8, Vigor 2135/2765/2766 prior to v4.4.5.1, Vigor 2865/2866/2927 prior to v4.4.5.3, Vigor 2962/3910 prior to v4.3.2.7, Vigor 3912 prior to v4.3.5.2, and Vigor 2925 up to v3.9.6 were discovered to store passwords in plaintext.
[]
null
7.5
null
null
GHSA-23hh-6pg2-wjj5
An issue was discovered in OTCMS 3.61. XSS exists in admin/users.php via these parameters: dataTypeCN dataMode dataModeStr.
[]
null
null
6.1
null
GHSA-rqqp-68qw-6v7r
An issue was discovered in SolarWinds N-Central 12.3.0.670. The sudo configuration has incorrect access control because the nable web user account is effectively able to run arbitrary OS commands as root (i.e., the use of root privileges is not limited to specific programs listed in the sudoers file).
[]
null
null
null
null
CVE-2022-28132
The T-Soft E-Commerce 4 web application is susceptible to SQL injection (SQLi) attacks when authenticated as an admin or privileged user. This vulnerability allows attackers to access and manipulate the database through crafted requests. By exploiting this flaw, attackers can bypass authentication mechanisms, view sensitive information stored in the database, and potentially exfiltrate data.
[ "cpe:2.3:a:t-soft:e-commerce:*:*:*:*:*:*:*:*" ]
null
7.2
null
null
CVE-2022-47616
Hitron Technologies Inc. CODA-5310 - Remote Command Execution
Hitron CODA-5310 has insufficient filtering for specific parameters in the connection test function. A remote attacker authenticated as an administrator, can use the management page to perform command injection attacks, to execute arbitrary system command, manipulate system or disrupt service.
[ "cpe:2.3:o:hitrontech:coda-5310_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hitrontech:coda-5310:-:*:*:*:*:*:*:*" ]
null
7.2
null
null
CVE-2019-11511
Zoho ManageEngine ADSelfService Plus before build 5708 has XSS via the mobile app API.
[ "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:4500:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5032:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5040:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5041:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5100:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5101:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5102:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5103:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5104:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5105:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5106:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5107:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5108:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5109:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5110:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5111:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5112:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5113:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5114:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5115:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5116:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5200:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5201:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5202:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5203:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5204:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5205:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5206:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5207:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5300:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5301:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5302:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5303:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5304:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5305:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5306:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5307:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5308:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5309:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5310:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5311:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5312:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5313:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5314:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5315:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5316:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5317:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5318:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5319:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5320:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5321:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5322:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5323:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5324:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5325:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5326:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5327:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5328:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5329:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5330:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5400:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5500:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5501:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5502:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5503:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5504:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5505:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5506:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5507:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5508:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5509:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5510:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5511:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5512:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5513:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5514:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5515:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5516:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5517:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5518:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5519:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5520:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5521:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5600:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5601:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5602:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5603:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5604:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5605:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5606:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5607:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5700:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5701:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5702:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5703:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5704:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5705:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5706:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5707:*:*:*:*:*:*" ]
null
null
6.1
4.3
CVE-2013-2200
WordPress before 3.5.2 does not properly check the capabilities of roles, which allows remote authenticated users to bypass intended restrictions on publishing and authorship reassignment via unspecified vectors.
[ "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*" ]
null
null
null
4
CVE-2019-20003
Feldtech easescreen Crystal 9.0 Web-Services 9.0.1.16265 allows Stored XSS via the Debug-Log and Display-Log components. This could be exploited when an attacker sends an crafted string for FTP authentication.
[ "cpe:2.3:a:dicube:easescreen_crystal:9.0.1.16265:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
GHSA-wxg7-pwwm-j9r9
mini-pub.php/front-end/cat.php in mini-pub 0.3 allows remote attackers to execute arbitrary commands via shell metacharacters in the sFileName argument.
[]
null
null
null
null
GHSA-4p9c-363r-6vrv
Multiple unspecified vulnerabilities in Google Chrome before 51.0.2704.63 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
[]
null
null
8.8
null
CVE-2017-12523
A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version.
[ "cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*" ]
null
null
8.8
9
GHSA-vg9h-xv3p-f55q
The Sidebar Widgets by CodeLights WordPress plugin through 1.4 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as a contributor to perform Stored Cross-Site Scripting attacks, which could be used against high-privilege users such as admins.
[]
null
5.4
null
null
CVE-2013-3324
Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK & Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
[ "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:5.9:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*" ]
null
null
null
10
CVE-2005-2202
Cross-site scripting (XSS) vulnerability in the MicroServer Web Server for Xerox WorkCentre Pro Color 2128, 2636, and 3545, version 0.001.04.044 through 0.001.04.504, allows remote attackers to inject arbitrary web script or HTML via unknown vectors.
[ "cpe:2.3:h:xerox:workcentre_2128:0.001.04.044:*:pro_color:*:*:*:*:*", "cpe:2.3:h:xerox:workcentre_2128:0.001.04.504:*:pro_color:*:*:*:*:*", "cpe:2.3:h:xerox:workcentre_2636:0.001.04.044:*:pro_color:*:*:*:*:*", "cpe:2.3:h:xerox:workcentre_2636:0.001.04.504:*:pro_color:*:*:*:*:*", "cpe:2.3:h:xerox:workcentre_3545:0.001.04.044:*:pro_color:*:*:*:*:*", "cpe:2.3:h:xerox:workcentre_3545:0.001.04.504:*:pro_color:*:*:*:*:*" ]
null
null
null
4.3
GHSA-x5v2-jx9x-fj53
Acrobat Reader DC versions versions 2021.001.20150 (and earlier), 2020.001.30020 (and earlier) and 2017.011.30194 (and earlier) are affected by an Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
null
null
null
CVE-2023-0685
The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_unassign_folders function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin..
[ "cpe:2.3:a:wickedplugins:wicked_folders:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
GHSA-mmf8-rmmj-r6x4
An issue in PEStudio v.9.52 allows a remote attacker to execute arbitrary code via a crafted DLL file to the PESstudio exeutable.
[]
null
7.8
null
null
GHSA-2q96-rrqq-jj73
PHP remote file inclusion vulnerability in include/plugins/jrBrowser/payment.php in Jamroom 3.3.0 through 3.3.5 allows remote attackers to execute arbitrary PHP code via a URL in the jamroom[jm_dir] parameter. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
CVE-2008-2008
Buffer overflow in the Display Names message feature in Cerulean Studios Trillian Basic and Pro 3.1.9.0 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a long nickname in an MSN protocol message.
[ "cpe:2.3:a:cerulean_studios:trillian:3.1.9.0:*:basic:*:*:*:*:*", "cpe:2.3:a:cerulean_studios:trillian:3.1.9.0:*:pro:*:*:*:*:*" ]
null
null
null
9.3
GHSA-jv8c-x5m7-6hxv
Kensite CMS v1.0 was discovered to contain multiple SQL injection vulnerabilities via the name and oldname parameters at /framework/mod/db/DBMapper.xml.
[]
null
8.8
null
null
GHSA-jx9x-9jjm-chf3
A potential local arbitrary code execution and a local denial of service (DoS) vulnerability within an isolated process were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to potentially execute arbitrary code in an isolated process resulting in a complete loss of confidentiality, integrity, and availability within that process. In addition, an unprivileged user could exploit a denial of service (DoS) vulnerability in an isolated process resulting in a complete loss of availability within that process. A successful attack depends on conditions beyond the attackers control. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).
[]
null
7.4
null
null
GHSA-cv2w-7jmr-4jgp
Buffer overflow in Dispatch() routine for XFS font server (fs.auto) on Solaris 2.5.1 through 9 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a certain XFS query.
[]
null
null
null
null
GHSA-cq4h-jg73-mw34
** DISPUTED ** Multiple PHP remote file inclusion vulnerabilities in ISPConfig 2.2.3 allow remote attackers to execute arbitrary PHP code via a URL in the (1) go_info[isp][classes_root] parameter in (a) server.inc.php, and the (2) go_info[server][classes_root] parameter in (b) app.inc.php, (c) login.php, and (d) trylogin.php. NOTE: this issue has been disputed by the vendor, who states that the original researcher "reviewed the installation tarball that is not identical with the resulting system after installtion. The file, where the $go_info array is declared ... is created by the installer."
[]
null
null
null
null
GHSA-55gj-6hgw-76j5
In Init of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with System execution privileges needed. User interaction is not needed for exploitation.
[]
null
4.9
null
null
CVE-2024-8824
PDF-XChange Editor JB2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
PDF-XChange Editor JB2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JB2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-24262.
[ "cpe:2.3:a:pdf-xchange:pdf-tools:10.3.0.386:*:*:*:*:*:*:*", "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:10.3.0.386:*:*:*:*:*:*:*" ]
null
null
3.3
null
GHSA-53fm-4pq6-xwr4
libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0 onwards) contains a CWE-416: Use After Free vulnerability in RAR decoder - libarchive/archive_read_support_format_rar.c that can result in Crash/DoS - it is unknown if RCE is possible. This attack appear to be exploitable via the victim must open a specially crafted RAR archive.
[]
null
8.8
null
null
GHSA-cc55-ww9c-8rc9
Cisco WebEx Meeting Center allows remote attackers to obtain sensitive information via unspecified vectors, as demonstrated by discovering credentials, aka Bug ID CSCut17466.
[]
null
null
null
null
CVE-2022-21808
Path traversal vulnerability exists in CAMS for HIS Server contained in the following Yokogawa Electric products: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.
[ "cpe:2.3:o:yokogawa:centum_cs_3000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:yokogawa:centum_cs_3000:-:*:*:*:*:*:*:*", "cpe:2.3:o:yokogawa:centum_cs_3000_entry_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:yokogawa:centum_cs_3000_entry:-:*:*:*:*:*:*:*", "cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:yokogawa:centum_vp:-:*:*:*:*:*:*:*", "cpe:2.3:o:yokogawa:centum_vp_entry_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:yokogawa:centum_vp_entry:-:*:*:*:*:*:*:*", "cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:*" ]
null
8.8
null
6
GHSA-mgr5-cghm-p294
In the Linux kernel before 5.3.4, fib6_rule_lookup in net/ipv6/ip6_fib.c mishandles the RT6_LOOKUP_F_DST_NOREF flag in a reference-count decision, leading to (for example) a crash that was identified by syzkaller, aka CID-7b09c2d052db.
[]
null
null
null
null
RHSA-2023:6494
Red Hat Security Advisory: python3.11 security update
python: tarfile module directory traversal python: file path truncation at \0 characters
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.5
null
null
GHSA-7rr3-wmrv-rwrc
An information disclosure vulnerability exists when the scripting engine does not properly handle objects in memory in Microsoft Edge, aka 'Scripting Engine Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1023.
[]
null
null
6.5
null
GHSA-c24p-p34c-x969
The open-in-browser command in newsbeuter before 1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a feed URL.
[]
null
null
null
null
CVE-2024-11005
Command injection in Ivanti Connect Secure before version 22.7R2.1 (Not Applicable to 9.1Rx) and Ivanti Policy Secure before version 22.7R1.1 (Not Applicable to 9.1Rx) allows a remote authenticated attacker with admin privileges to achieve remote code execution.
[ "cpe:2.3:a:ivanti:connect_secure:-:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*" ]
null
9.1
null
null
GHSA-525m-g8gv-6hhc
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Myriad Solutionz Stars SMTP Mailer allows Reflected XSS.This issue affects Stars SMTP Mailer: from n/a through 1.7.
[]
null
7.1
null
null
CVE-2023-36652
A SQL Injection in the users searching REST API endpoint in ProLion CryptoSpike 3.0.15P2 allows remote authenticated attackers to read database data via SQL commands injected in the search parameter.
[ "cpe:2.3:a:prolion:cryptospike:3.0.15:p2:*:*:*:*:*:*" ]
null
4.3
null
null
GHSA-6w9g-5797-3mxw
Multiple unspecified vulnerabilities in the layout engine in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allow remote attackers to cause a denial of service (crash) via unspecified vectors.
[]
null
null
null
null
CVE-2019-15854
An issue was discovered in Maarch RM before 2.5. A privilege escalation vulnerability allows an authenticated user with lowest privileges to give herself highest administration privileges via a crafted PUT request to an unauthorized resource.
[ "cpe:2.3:a:maarch:maarch_rm:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.5
CVE-2023-35898
IBM InfoSphere Information Server information disclosure
IBM InfoSphere Information Server 11.7 could allow an authenticated user to obtain sensitive information due to an insecure security configuration in InfoSphere Data Flow Designer. IBM X-Force ID: 259352.
[ "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
4.3
null
null
RHSA-2024:4333
Red Hat Security Advisory: security update Logging for Red Hat OpenShift - 5.9.4
golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses
[ "cpe:/a:redhat:logging:5.9::el9" ]
null
6.7
null
null
CVE-1999-0368
Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a. palmetto.
[ "cpe:2.3:a:proftpd_project:proftpd:1.2_pre1:*:*:*:*:*:*:*", "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18:*:*:*:*:*:*:*", "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr9:*:*:*:*:*:*:*", "cpe:2.3:o:caldera:openlinux:1.3:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:sco:openserver:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:sco:openserver:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:sco:openserver:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:sco:openserver:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:sco:unixware:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:sco:unixware:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:slackware:slackware_linux:3.4:*:*:*:*:*:*:*", "cpe:2.3:o:slackware:slackware_linux:3.5:*:*:*:*:*:*:*", "cpe:2.3:o:slackware:slackware_linux:3.6:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2017-7487
The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel through 4.11.1 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
GHSA-f377-74h5-fxgr
An issue was discovered in AikCms v2.0. There is a SQL Injection vulnerability via $_GET['del'], as demonstrated by an admin/page/system/nav.php?del= URI.
[]
null
null
7.2
null
GHSA-jc95-8hq3-w9v4
Memory corruption in modem due to buffer overflow while processing a PPP packet
[]
null
8.8
null
null
GHSA-r55f-v7qm-xxpg
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Premio Chaty plugin <= 3.1.2 versions.
[]
null
5.9
null
null
RHSA-2020:0664
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: Use-after-free in __blk_drain_queue() function in block/blk-core.c kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor", "cpe:/o:redhat:rhel_eus:7.6::computenode", "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
8
8
null
GHSA-hwfj-8pr6-34jj
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in PriceListo Best Restaurant Menu by PriceListo allows SQL Injection.This issue affects Best Restaurant Menu by PriceListo: from n/a through 1.4.1.
[]
null
8.5
null
null
cisco-sa-20191016-wlc-ssh-dos
Cisco Wireless LAN Controller Secure Shell Denial of Service Vulnerability
A vulnerability in the Secure Shell (SSH) session management for Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability exists because the SSH process is not properly deleted when an SSH connection to the device is disconnected. An attacker could exploit this vulnerability by repeatedly opening SSH connections to an affected device. A successful exploit could allow the attacker to exhaust system resources by initiating multiple SSH connections to the device that are not effectively terminated, which could result in a DoS condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-wlc-ssh-dos ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-wlc-ssh-dos"]
[]
null
null
8.6
null