id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2013-3150 | Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3145. | [
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
GHSA-66j9-wx8r-qgqq | IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5.0 through 11.5.9 and 12.1.0 through 12.1.1could allow an authenticated user to cause a denial of service when connecting to a z/OS database due to improper handling of automatic client rerouting. | []
| null | 5.3 | null | null |
|
CVE-2017-18014 | An NC-25986 issue was discovered in the Logging subsystem of Sophos XG Firewall with SFOS before 17.0.3 MR3. An unauthenticated user can trigger a persistent XSS vulnerability found in the WAF log page (Control Center -> Log Viewer -> in the filter option "Web Server Protection") in the webadmin interface, and execute any action available to the webadmin of the firewall (e.g., creating a new user, enabling SSH, or adding an SSH authorized key). The WAF log page will execute the "User-Agent" parameter in the HTTP POST request. | [
"cpe:2.3:o:sophos:sfos:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sophos:xg_firewall:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sophos:sfos:17.0:mr1:*:*:*:*:*:*",
"cpe:2.3:o:sophos:sfos:17.0:mr2:*:*:*:*:*:*",
"cpe:2.3:o:sophos:sfos:17.0:mr3:*:*:*:*:*:*"
]
| null | null | 6.1 | 4.3 |
|
CVE-2023-31410 | A remote unprivileged attacker can intercept the communication via e.g. Man-In-The-Middle, due to the absence of Transport Layer Security (TLS) in the SICK EventCam App. This lack of encryption in the communication channel can lead to the unauthorized disclosure of sensitive information. The attacker can exploit this weakness to eavesdrop on the communication between the EventCam App and the Client, and potentially manipulate the data being transmitted. | [
"cpe:2.3:a:sick:sick_eventcam_app:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
CVE-2025-31560 | WordPress Salon booking system plugin <= 10.11 - Privilege Escalation vulnerability | Incorrect Privilege Assignment vulnerability in Dimitri Grassi Salon booking system allows Privilege Escalation. This issue affects Salon booking system: from n/a through 10.11. | []
| null | 7.2 | null | null |
GHSA-f924-xqm3-3544 | Fuji Electric Monitouch V-SFT V8C File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of V8C files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24450. | []
| null | null | 7.8 | null |
|
GHSA-727j-58h7-43f5 | Open Management Infrastructure Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38648, CVE-2021-38649. | []
| null | 7.8 | null | null |
|
GHSA-4h25-6mgv-2q43 | Absolute path disclosure vulnerability in DM Corporative CMS. This vulnerability allows an attacker to view the contents of webroot/file, if navigating to a non-existent file. | []
| 6.9 | null | null | null |
|
CVE-2002-1045 | Ultrafunk Popcorn 1.20 allows remote attackers to cause a denial of service (crash) via a malformed Date field that is converted into a year greater than 2037. | [
"cpe:2.3:a:ultrafunk:popcorn:1.20:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2021-47528 | usb: cdnsp: Fix a NULL pointer dereference in cdnsp_endpoint_init() | In the Linux kernel, the following vulnerability has been resolved:
usb: cdnsp: Fix a NULL pointer dereference in cdnsp_endpoint_init()
In cdnsp_endpoint_init(), cdnsp_ring_alloc() is assigned to pep->ring
and there is a dereference of it in cdnsp_endpoint_init(), which could
lead to a NULL pointer dereference on failure of cdnsp_ring_alloc().
Fix this bug by adding a check of pep->ring.
This bug was found by a static analyzer. The analysis employs
differential checking to identify inconsistent security operations
(e.g., checks or kfrees) between two code paths and confirms that the
inconsistent operations are not recovered in the current function or
the callers, so they constitute bugs.
Note that, as a bug found by static analysis, it can be a false
positive or hard to trigger. Multiple researchers have cross-reviewed
the bug.
Builds with CONFIG_USB_CDNSP_GADGET=y show no new warnings,
and our static analyzer no longer warns about this code. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
GHSA-g2fm-f89j-pxh3 | The get_gallery_categories() and get_galleries() functions in the Photo Gallery by Ays – Responsive Image Gallery WordPress plugin before 4.4.4 did not use whitelist or validate the orderby parameter before using it in SQL statements passed to the get_results() DB calls, leading to SQL injection issues in the admin dashboard | []
| null | 8.8 | null | null |
|
GHSA-rgpp-69xw-mj7q | Multiple cross-site request forgery (CSRF) vulnerabilities in API features in Cisco Unified MeetingPlace 8.6(1.9) allow remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCus95884. | []
| null | null | null | null |
|
CVE-2022-42797 | An injection issue was addressed with improved input validation. This issue is fixed in Xcode 14.1. An app may be able to gain root privileges. | [
"cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
|
CVE-2024-22216 | In default installations of Microchip maxView Storage Manager (for Adaptec Smart Storage Controllers) where Redfish server is configured for remote system management, unauthorized access can occur, with data modification and information disclosure. This affects 3.00.23484 through 4.14.00.26064 (except for the patched versions 3.07.23980 and 4.07.00.25339). | [
"cpe:2.3:a:microchip:maxview_storage_manager:*:*:*:*:*:-:*:*"
]
| null | 9.8 | null | null |
|
GHSA-f44g-qcvc-qmmq | Foxit PDF Editor transitionToState Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the implementation of the transitionToState method. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14370. | []
| null | null | 7.8 | null |
|
CVE-2024-22030 | Rancher agents can be hijacked by taking over the Rancher Server URL | A vulnerability has been identified within Rancher that can be exploited
in narrow circumstances through a man-in-the-middle (MITM) attack. An
attacker would need to have control of an expired domain or execute a
DNS spoofing/hijacking attack against the domain to exploit this
vulnerability. The targeted domain is the one used as the Rancher URL. | [
"cpe:2.3:a:suse:rancher:-:*:*:*:*:*:*:*"
]
| null | 8 | null | null |
CVE-2023-3535 | SimplePHPscripts FAQ Script PHP URL Parameter preview.php cross site scripting | A vulnerability was found in SimplePHPscripts FAQ Script PHP 2.3. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /preview.php of the component URL Parameter Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-233287. | [
"cpe:2.3:a:simplephpscripts:faq_script_php:2.3:*:*:*:*:*:*:*"
]
| null | 3.5 | 3.5 | 4 |
GHSA-wcrq-j35j-339c | Tor before 0.1.1.20 does not sufficiently obey certain firewall options, which allows remote attackers to bypass intended access restrictions for dirservers, direct connections, or proxy servers. | []
| null | null | null | null |
|
GHSA-c72w-5qjp-5v3g | The WP Editor.MD plugin 1.6 for WordPress has a stored XSS vulnerability in the content of a post. | []
| null | null | 6.1 | null |
|
GHSA-3m5q-q39v-xf8f | nocodb SQL Injection vulnerability | SummaryNocodb contains SQL injection vulnerability, that allows an authenticated attacker with creator access to query the underlying database.Productnocodb/nocodbTested Version[0.109.2](https://github.com/nocodb/nocodb/releases/tag/0.109.2)DetailsSQL injection in `SqliteClient.ts` (`GHSL-2023-141`)By supplying a specially crafted payload to the given below parameter and endpoint, an attacker can inject arbitrary SQL queries to be executed. Since this is a blind SQL injections, an attacker may need to use time-based payloads which would include a function to delay execution for a given number of seconds. The response time indicates, whether the result of the query execution was true or false. Depending on the result, the HTTP response will be returned after a given number of seconds, indicating TRUE, or immediately, indicating FALSE. In that way, an attacker can reveal the data present in the database.The [`triggerList`](https://github.com/nocodb/nocodb/blob/3ec82824eeb2295f6b67fd67e7d6049784b41221/packages/nocodb/src/db/sql-client/lib/sqlite/SqliteClient.ts#L628-L654) method creates a SQL query using the user-controlled [`table_name`](https://github.com/nocodb/nocodb/blob/3ec82824eeb2295f6b67fd67e7d6049784b41221/packages/nocodb/src/db/sql-client/lib/sqlite/SqliteClient.ts#L637) parameter value from the [`tableCreate`](https://github.com/nocodb/nocodb/blob/3ec82824eeb2295f6b67fd67e7d6049784b41221/packages/nocodb/src/controllers/tables.controller.ts#L63) endpoint.ImpactThis issue may lead to `Information Disclosure`.CreditThis issue was discovered and reported by GHSL team member [@sylwia-budzynska (Sylwia Budzynska)](https://github.com/sylwia-budzynska).Disclosure PolicyThis report is subject to our [coordinated disclosure policy](https://securitylab.github.com/advisories#policy). | []
| null | 6.5 | null | null |
GHSA-pg36-pgm7-px54 | Directory Traversal vulnerability in flusity CMS v.2.4 allows a remote attacker to execute arbitrary code and obtain sensitive information via the download_backup.php component. | []
| null | 9.8 | null | null |
|
GHSA-7fx5-x28x-jw5r | Multiple Authenticated (contributor or higher user role) Stored Cross-Site Scripting (XSS) vulnerabilities in Nicdark d.o.o. Travel Management plugin <= 2.0 at WordPress. | []
| null | 5.4 | null | null |
|
CVE-2003-0326 | Integer overflow in parse_decode_path() of slocate may allow attackers to execute arbitrary code via a LOCATE_PATH with a large number of ":" (colon) characters, whose count is used in a call to malloc. | [
"cpe:2.3:a:slocate:slocate:*:*:*:*:*:*:*:*"
]
| null | null | null | 4.6 |
|
GHSA-77jg-cpw9-73vg | Apache Cocoon Improper Restriction of XML External Entity Reference vulnerability | Improper Restriction of XML External Entity Reference vulnerability in Apache Cocoon. This issue affects Apache Cocoon: from 2.2.0 before 2.3.0.Users are recommended to upgrade to version 2.3.0, which fixes the issue. | []
| null | 9.8 | null | null |
GHSA-wr74-2v66-57pp | phpMyFAQ vulnerable to stored Cross-site Scripting | phpMyFAQ prior to version 3.1.8 is vulnerable to stored Cross-site Scripting. | []
| null | 5.4 | null | null |
CVE-2018-8164 | An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8120, CVE-2018-8124, CVE-2018-8166. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 7.2 |
|
CVE-2021-40662 | A Cross-Site Request Forgery (CSRF) in Chamilo LMS 1.11.14 allows attackers to execute arbitrary commands on victim hosts via user interaction with a crafted URL. | [
"cpe:2.3:a:chamilo:chamilo:1.11.14:-:*:*:*:*:*:*"
]
| null | 8.8 | null | 6.8 |
|
CVE-2025-24610 | WordPress Restrict Anonymous Access Plugin <= 1.2 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Christian Leuenberg, L.net Web Solutions Restrict Anonymous Access allows Stored XSS. This issue affects Restrict Anonymous Access: from n/a through 1.2. | []
| null | 6.5 | null | null |
GHSA-2634-r3qf-xp6v | Google Chrome before 11.0.696.57 does not properly handle drop-down lists, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer." | []
| null | null | null | null |
|
GHSA-f76m-gm5c-xx2m | In the Linux kernel, the following vulnerability has been resolved:net: ipv6: fix dst refleaks in rpl, seg6 and ioam6 lwtunnelsdst_cache_get() gives us a reference, we need to release it.Discovered by the ioam6.sh test, kmemleak was recently fixed
to catch per-cpu memory leaks. | []
| null | null | null | null |
|
CVE-2024-4197 | Avaya IP Office One-X Portal File Upload Vulnerability | An unrestricted file upload vulnerability in Avaya IP Office was discovered that could allow remote command or code execution via the One-X component. Affected versions include all versions prior to 11.1.3.1. | [
"cpe:2.3:a:avaya:ip_office:11.1.3.1:*:*:*:*:*:*:*"
]
| null | 9.9 | null | null |
CVE-2024-21913 | Rockwell Automation Arena Simulation Vulnerable To Memory Corruption |
A heap-based memory buffer overflow vulnerability in Rockwell Automation Arena Simulation software could potentially allow a malicious user to insert unauthorized code into the software by overstepping the memory boundaries, which triggers an access violation. Once inside, the threat actor can run harmful code on the system. This affects the confidentiality, integrity, and availability of the product. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor.
| [
"cpe:2.3:a:rockwellautomation:arena_simulation_software:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
GHSA-xvvv-2v53-5hxv | Transient DOS while key unwrapping process, when the given encrypted key is empty or NULL. | []
| null | 7.5 | null | null |
|
GHSA-42w2-v853-2q4q | The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the attach_rule function. This makes it possible for unauthenticated attackers to modify the plugin's cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | []
| null | 4.3 | null | null |
|
CVE-2022-33925 | Dell Wyse Management Suite 3.6.1 and below contains an Improper Access control vulnerability in UI. An remote authenticated attacker could potentially exploit this vulnerability by bypassing access controls in order to download reports containing sensitive information. | [
"cpe:2.3:a:dell:wyse_management_suite:*:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
|
CVE-2019-8084 | Adobe Experience Manager versions 6.5, 6.4, 6.3 and 6.2 have a reflected cross site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure. | [
"cpe:2.3:a:adobe:experience_manager:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.5:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
CVE-2017-11848 | Internet Explorer in Microsoft Microsoft Windows 7 SP1, Windows Server 2008 SP2, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to detect the navigation of the user leaving a maliciously crafted page, due to how page content is handled by Internet Explorer, aka "Internet Explorer Information Disclosure Vulnerability". | [
"cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
]
| null | null | 4.3 | 4.3 |
|
CVE-2015-2757 | The ePO extension in McAfee Data Loss Prevention Endpoint (DLPe) before 9.3 Patch 4 Hotfix 16 (9.3.416.4) allows remote authenticated users to cause a denial of service (database lock or license corruption) via unspecified vectors. | [
"cpe:2.3:a:mcafee:data_loss_prevention_endpoint:*:*:*:*:*:*:*:*"
]
| null | null | null | 4 |
|
GHSA-6vjj-45px-pwmv | Vulnerability in the Oracle Hospitality Cruise Fleet Management component of Oracle Hospitality Applications (subcomponent: Emergency Response System). The supported version that is affected is 9.0.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Cruise Fleet Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Hospitality Cruise Fleet Management accessible data as well as unauthorized access to critical data or complete access to all Oracle Hospitality Cruise Fleet Management accessible data. CVSS 3.0 Base Score 9.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). | []
| null | null | 9.1 | null |
|
GHSA-wchj-88hf-ghm5 | A vulnerability in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to overwrite arbitrary files on the underlying operating system of an affected device. The vulnerability is due to improper input validation of the save command in the CLI of the affected software. An attacker could exploit this vulnerability by modifying the save command in the CLI of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the underlying operating system of an affected device and escalate their privileges to the root user. | []
| null | 8.8 | null | null |
|
GHSA-cp47-gcrh-fx43 | Vulnerability in the Oracle Integrated Lights Out Manager (ILOM) component of Oracle Sun Systems Products Suite (subcomponent: System Management). The supported version that is affected is Prior to 3.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Integrated Lights Out Manager (ILOM). Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Integrated Lights Out Manager (ILOM). CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). | []
| null | null | 7.5 | null |
|
CVE-2020-25925 | Cross Site Scripting (XSS) in Webmail Calender in IceWarp WebClient 10.3.5 allows remote attackers to inject arbitrary web script or HTML via the "p4" field. | [
"cpe:2.3:a:icewarp:webclient:10.3.5:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
ICSA-23-047-06 | Siemens Simcenter Femap before V2023.1 | The affected application contains an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-17745) The affected application contains an out of bounds write past the end of an allocated buffer while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-17854) | []
| null | 7.8 | null | null |
CVE-2016-7547 | A command execution flaw on the Trend Micro Threat Discovery Appliance 2.6.1062r1 exists with the timezone parameter in the admin_sys_time.cgi interface. | [
"cpe:2.3:a:trendmicro:threat_discovery_appliance:2.6.1062:r1:*:*:*:*:*:*"
]
| null | null | 9.8 | 7.5 |
|
GHSA-9wf6-6h7r-6q4w | net/tipc/socket.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure and a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call. | []
| null | null | null | null |
|
CVE-2020-5393 | In Appspace On-Prem through 7.1.3, an adversary can steal a session token via XSS. | [
"cpe:2.3:a:appspace:on-prem:*:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
CVE-2014-7229 | Unspecified vulnerability in Joomla! before 2.5.4 before 2.5.26, 3.x before 3.2.6, and 3.3.x before 3.3.5 allows attackers to cause a denial of service via unspecified vectors. | [
"cpe:2.3:a:joomla:joomla\\!:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.16:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.17:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.19:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.20:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.21:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.22:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.23:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.24:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.25:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.3.4:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2022-20872 | Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard. | [
"cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*"
]
| null | 4.8 | null | null |
|
GHSA-4ppr-x3rg-ccj6 | Information disclosure in Network Services due to buffer over-read while the device receives DNS response. | []
| null | 8.2 | null | null |
|
GHSA-qwvh-983v-7jrj | A vulnerability was found in IObit Advanced SystemCare Utimate up to 17.0.0. It has been rated as problematic. Affected by this issue is the function 0x8001E024 in the library AscRegistryFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | []
| 6.8 | 5.5 | null | null |
|
CVE-2025-5869 | RT-Thread lwp_syscall.c sys_recvfrom memory corruption | A vulnerability, which was classified as critical, was found in RT-Thread 5.1.0. Affected is the function sys_recvfrom of the file rt-thread/components/lwp/lwp_syscall.c. The manipulation of the argument from leads to memory corruption. | []
| 8.6 | 8 | 8 | 7.7 |
CVE-2011-4642 | mappy.py in Splunk Web in Splunk 4.2.x before 4.2.5 does not properly restrict use of the mappy command to access Python classes, which allows remote authenticated administrators to execute arbitrary code by leveraging the sys module in a request to the search application, as demonstrated by a cross-site request forgery (CSRF) attack, aka SPL-45172. | [
"cpe:2.3:a:splunk:splunk:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:splunk:splunk:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:splunk:splunk:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:splunk:splunk:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:splunk:splunk:4.2.4:*:*:*:*:*:*:*"
]
| null | null | null | 4.6 |
|
GHSA-fc7h-9m39-45qq | The NotificationX plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.8.2. This is due to missing or incorrect nonce validation on the generate_conversions() function. This makes it possible for unauthenticated attackers to generate conversions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | []
| null | 4.3 | null | null |
|
CVE-2024-8449 | PLANET Technology switch devices - Local users' passwords recovery through hard-coded credentials | Certain switch models from PLANET Technology have a Hard-coded Credential in the password recovering functionality, allowing an unauthenticated attacker to connect to the device via the serial console and use this credential to reset any user's password. | [
"cpe:2.3:a:planet_technology_corp:gs-4210-24pl4c_hardware_2.0:*:*:*:*:*:*:*:*",
"cpe:2.3:a:planet_technology_corp:gs-4210-24pl4c_hardware_3.0:*:*:*:*:*:*:*:*",
"cpe:2.3:o:planet:gs-4210-24p2s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:planet:gs-4210-24p2s:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:planet:gs-4210-24pl4c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:planet:gs-4210-24pl4c:2.0:*:*:*:*:*:*:*"
]
| null | 6.8 | null | null |
CVE-2024-33019 | Buffer Over-read in WLAN Host | Transient DOS while parsing the received TID-to-link mapping action frame. | [
"cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:immersive_home_214_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:immersive_home_216_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:immersive_home_316_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:immersive_home_318_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:immersive_home_3210_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:immersive_home_326_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5028_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5302_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5312_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5332_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq6000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq6010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq6028_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8070a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8071a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8072a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8074a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8076_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8076a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8078_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8078a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8173_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8174_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq9008_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq9554_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq9574_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca4024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6554a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8075_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8082_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8084_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8085_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8386_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9888_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9889_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcc2073_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcc2076_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcf8000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcf8001_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5022_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5052_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5122_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5124_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5152_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5154_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5164_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6023_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6112_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6122_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6132_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6402_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6412_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6422_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6432_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9022_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9072_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9160_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9274_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qxm8083_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx65m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x72_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:srv1l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csr8811:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:immersive_home_214_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:immersive_home_216_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:immersive_home_316_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:immersive_home_318_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:immersive_home_3210_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:immersive_home_326_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq5010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq5028:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq5300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq5302:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq5312:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq5332:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq6000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq6010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq6028:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8070a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8071a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8072a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8074a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8076:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8076a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8078:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8078a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8173:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8174:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq9008:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq9554:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq9574:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qam8620p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qamsrv1h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qamsrv1m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca4024:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6554a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6678aq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6688aq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6797aq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8075:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8082:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8084:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8085:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8386:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9888:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9889:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcc2073:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcc2076:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcf8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcf8001:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm5430:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5022:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5024:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5052:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5122:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5124:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5152:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5154:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5164:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6023:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6112:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6122:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6132:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6402:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6412:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6422:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6432:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9022:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9070:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9072:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9160:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9274:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs5430:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:video_collaboration_vc3_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qxm8083:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa7255p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa7775p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8620p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8650p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8770p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8775p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx65m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_8_gen_3_mobile_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_x72_5g_modem-rf_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:srv1h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:srv1l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:srv1m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ssg2115p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ssg2125p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr1230p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2250p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
GHSA-494h-rf5r-q9v4 | The SecuPress Free — WordPress Security plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.2.5.1. This is due to missing or incorrect nonce validation on the secupress_blackhole_ban_ip() function. This makes it possible for unauthenticated attackers to block a user's IP via a forged request granted they can trick the user into performing an action such as clicking on a link. | []
| null | 4.3 | null | null |
|
CVE-2025-1618 | vTiger CRM index.php cross site scripting | A vulnerability has been found in vTiger CRM 6.4.0/6.5.0 and classified as problematic. This vulnerability affects unknown code of the file /modules/Mobile/index.php. The manipulation of the argument _operation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.0 is able to address this issue. It is recommended to upgrade the affected component. | []
| 5.3 | 4.3 | 4.3 | 5 |
GHSA-rfw8-3q2w-42qv | IBM Curam Social Program Management 7.0.9 and 7.0.11 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 191942. | []
| null | null | null | null |
|
CVE-2025-2219 | LoveCards LoveCardsV2 image unrestricted upload | A vulnerability was found in LoveCards LoveCardsV2 up to 2.3.2 and classified as critical. This issue affects some unknown processing of the file /api/upload/image. The manipulation of the argument file leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | []
| 6.9 | 7.3 | 7.3 | 7.5 |
CVE-2007-4863 | SQL injection vulnerability in example.php in SAXON 5.4 allows remote attackers to execute arbitrary SQL commands via the template parameter. | [
"cpe:2.3:a:quirm:saxon:5.4:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
CVE-2020-27917 | A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 14.2 and iPadOS 14.2, iCloud for Windows 11.5, tvOS 14.2, iTunes 12.11 for Windows. Processing maliciously crafted web content may lead to code execution. | [
"cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 9.3 |
|
CVE-2023-5038 | Unauthenticated DoS | badmonkey, a Security Researcher has found a flaw that allows for a unauthenticated DoS attack on the camera. An attacker runs a crafted URL, nobody can access the web management page of the camera. and must manually restart the device or re-power it. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds. | [
"cpe:2.3:h:hanwhavision:ano-l6012r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:ano-l6022r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:anv-l6012r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:ano-l6082r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:ane-l6012r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:anv-l6082r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:ano-l7082r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:ane-l7012r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:anv-l7082r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:ano-l7012r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:ano-l7022r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:anv-l7012r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:pnm-c9022rv:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:pnm-9000qb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:pnm-7002vd:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:pnm-8082vt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:pnm-9002vq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:pnm-9022v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:pnm-9031rv:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:pnm-9084qz:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:pnm-9084rqz:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:pnm-9085rqz:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:pnm-9084qz1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:pnm-9084rqz1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:pnm-9085rqz1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:pnm-9322vqp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:pnm-7082rvd:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:pnm-12082rvd:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:lno-6072r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:lnd-6012r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:lno-6032r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:lnv-6032r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:lnd-6022r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:lnd-6072r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:lno-6022r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:lnv-6012r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:lnv-6072r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:lnd-6032r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:lnv-6022r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:lno-6012r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnd-6011:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnd-6012r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnd-6021:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnd-6022r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnd-6032r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:ano-l6012r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:ano-l6022r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:anv-l6012r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:ano-l6082r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:ane-l6012r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:anv-l6082r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:ano-l7082r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:ane-l7012r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:anv-l7082r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:ano-l7012r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:ano-l7022r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:anv-l7012r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:pnm-c9022rv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:pnm-9000qb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:pnm-7002vd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:pnm-8082vt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:pnm-9002vq_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:pnm-9022v_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:pnm-9031rv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:pnm-9084qz_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:pnm-9084rqz_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:pnm-9085rqz_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:pnm-9084qz1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:pnm-9084rqz1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:pnm-9085rqz1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:pnm-9322vqp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:pnm-7082rvd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:pnm-12082rvd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:lno-6072r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:lnd-6012r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:lno-6032r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:lnv-6032r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:lnd-6022r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:lnd-6072r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:lno-6022r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:lnv-6012r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:lnv-6072r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:lnd-6032r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:lnv-6022r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:lno-6012r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnd-6011_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnd-6012r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnd-6021_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnd-6022r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnd-6032r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnd-6072r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnd-6072r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnd-6073r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnd-6073r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnd-6082r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnd-6082r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnd-6083r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnd-6083r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qno-6012r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qno-6012r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qno-6022r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qno-6022r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qno-6032r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qno-6032r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qno-6072r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qno-6072r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qno-6073r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qno-6073r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qno-6082r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qno-6082r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qno-6083r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qno-6083r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnv-6012r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnv-6012r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnv-6022r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnv-6022r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnv-6032r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnv-6032r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnv-6072r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnv-6072r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnv-6073r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnv-6073r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnv-6082r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnv-6082r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnv-6083r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnv-6083r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnd-6012r1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnd-6012r1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnd-6022r1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnd-6022r1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnd-6032r1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnd-6032r1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnd-6072r1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnd-6072r1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnd-6082r1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnd-6082r1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnv-6012r1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnv-6012r1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnv-6022r1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnv-6022r1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnv-6032r1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnv-6032r1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnv-6072r1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnv-6072r1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnv-6082r1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnv-6082r1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qno-6012r1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qno-6012r1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qno-6022r1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qno-6022r1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qno-6032r1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qno-6032r1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qno-6072r1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qno-6072r1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qno-6082r1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qno-6082r1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnd-7082r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnd-7082r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnv-7082r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnv-7082r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qno-7082r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qno-7082r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnd-7012r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnd-7012r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnd-7022r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnd-7022r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnd-7032r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnd-7032r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qno-7012r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qno-7012r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qno-7022r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qno-7022r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qno-7032r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qno-7032r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnv-7012r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnv-7012r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnv-7022r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnv-7022r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnv-7032r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnv-7032r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnv-6014r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnv-6014r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnv-6084r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnv-6084r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qno-6014r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qno-6014r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qno-6084r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qno-6084r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnv-6024rm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnv-6024rm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnv-6023r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnv-6023r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:anv-l6023r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:anv-l6023r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnb-8002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnb-8002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnd-8010r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnd-8010r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnd-8011_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnd-8011:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnd-8020r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnd-8020r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnd-8021_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnd-8021:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnd-8030r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnd-8030r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnd-8080r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnd-8080r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qne-8011r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qne-8011r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qne-8021r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qne-8021r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qno-8010r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qno-8010r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qno-8020r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qno-8020r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qno-8030r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qno-8030r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qno-8080r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qno-8080r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnv-8010r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnv-8010r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnv-8020r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnv-8020r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnv-8030r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnv-8030r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:qnv-8080r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:qnv-8080r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnv-9083rz_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnv-9083rz:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnv-8083rz_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnv-8083rz:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnv-8083z_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnv-8083z:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnv-6083rz_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnv-6083rz:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnv-6083z_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnv-6083z:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnb-6002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnb-6002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnd-6083rv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnd-6083rv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnv-6083r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnv-6083r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xno-6083r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xno-6083r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnb-6003_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnb-6003:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnv-9083r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnv-9083r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnv-8093r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnv-8093r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnv-8083r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnv-8083r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnd-9083rv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnd-9083rv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnd-8093rv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnd-8093rv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnd-8083rv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnd-8083rv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xno-9083r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xno-9083r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xno-8083r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xno-8083r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnb-9003_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnb-9003:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnb-8003_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnb-8003:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnd-c6083rv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnd-c6083rv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnd-c7083rv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnd-c7083rv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnv-c6083r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnv-c6083r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnv-c7083r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnv-c7083r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xno-c6083r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xno-c6083r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xno-c7083r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xno-c7083r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnv-c6083_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnv-c6083:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnd-c8083rv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnd-c8083rv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnd-c9083rv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnd-c9083rv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnv-c8083r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnv-c8083r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnv-c9083r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnv-c9083r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xno-c8083r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xno-c8083r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xno-c9083r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xno-c9083r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnp-9250r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnp-9250r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnp-8250r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnp-8250r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnp-9250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnp-9250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnp-8250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnp-8250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnp-6400r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnp-6400r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnp-6400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnp-6400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnp-9300rw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnp-9300rw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnp-8300rw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnp-8300rw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnp-6400rw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnp-6400rw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:tnv-c7013rc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:tnv-c7013rc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnp-c6403_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnp-c6403:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnp-c6403r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnp-c6403r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnp-c6403rw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnp-c6403rw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnp-c8253_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnp-c8253:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnp-c8253r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnp-c8253r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnp-c8303rw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnp-c8303rw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnp-c9253_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnp-c9253:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnp-c9253r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnp-c9253r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnp-c9303rw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnp-c9303rw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xno-6123r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xno-6123r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnv-6123r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnv-6123r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnb-8002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnb-8002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnb-9002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnb-9002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnd-8082rf_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnd-8082rf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnd-8082rv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnd-8082rv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnd-9082rf_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnd-9082rf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnd-9082rv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnd-9082rv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xno-8082r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xno-8082r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xno-9082r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xno-9082r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnv-8082r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnv-8082r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnv-9082r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnv-9082r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnp-c9310r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnp-c9310r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnf-9010rv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnf-9010rv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnf-9010rvm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnf-9010rvm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnf-9010rs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnf-9010rs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:xnf-9013rv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:xnf-9013rv:-:*:*:*:*:*:*:*"
]
| 8.7 | null | null | null |
ICSA-15-006-01 | Eaton Cooper Power Series Form 6 Control and Idea/IdeaPlus Relays with Ethernet Vulnerability | Eaton Cooper Power Systems ProView 4.0 and 5.0 before 5.0 11 on Form 6 controls and Idea and IdeaPLUS relays generates TCP initial sequence number (ISN) values linearly, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value. | []
| null | null | null | null |
CVE-2013-0836 | Google V8 before 3.14.5.3, as used in Google Chrome before 24.0.1312.52, does not properly implement garbage collection, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1272.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1272.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1273.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1274.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1275.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1276.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1276.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1277.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1278.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1279.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1280.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1281.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1281.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1281.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1281.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1282.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1283.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1284.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1284.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1284.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1285.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1285.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1285.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1286.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1286.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1287.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1287.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1288.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1288.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1289.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1289.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1290.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1290.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1290.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1291.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1291.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1292.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1292.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1293.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1294.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1295.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1296.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1296.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1297.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1298.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1298.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1299.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1300.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1301.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1301.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1301.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1302.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1303.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1304.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1304.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1306.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1306.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1307.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1307.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1308.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1309.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1310.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1311.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1311.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.50:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:2.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:2.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:2.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:2.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:2.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:2.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:2.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:2.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:2.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.11.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.11.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.11.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.11.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.11.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.11.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.12.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.12.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.12.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.12.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.12.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.12.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.12.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.12.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.12.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.12.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.12.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.12.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.12.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.12.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.12.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.12.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.13.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.13.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.13.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.13.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.13.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.13.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.14.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.14.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.14.4:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
CVE-2014-4815 | Session fixation vulnerability in IBM Rational Lifecycle Integration Adapter for Windchill 1.x before 1.0.1 allows remote attackers to hijack web sessions via unspecified vectors. | [
"cpe:2.3:a:ibm:_ibm_rational_lifecycle_integration_adapter_for_windchill:1.0.0:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2018-5838 | Improper Validation of Array Index In the adreno OpenGL driver in Snapdragon Automobile, Snapdragon Mobile and Snapdragon Wear, an out-of-bounds access can occur in SurfaceFlinger. | [
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_617_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_617:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 4.6 |
|
GHSA-vw47-58pm-68j7 | The Elementor Header & Footer Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via REST API SVG File uploads in all versions up to, and including, 1.6.45 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. | []
| null | 6.4 | null | null |
|
GHSA-w8ch-5phg-59pf | WAPM-1166D firmware Ver.1.2.7 and earlier, WAPM-APG600H firmware Ver.1.16.1 and earlier allows remote attackers to bypass authentication and access the configuration interface via unspecified vectors. | []
| null | null | 9.8 | null |
|
GHSA-h67g-v778-vp3r | Multiple cross-site scripting (XSS) vulnerabilities in AirMagnet Enterprise before 7.5 build 6307 allow remote attackers to inject arbitrary web script or HTML via (1) the 404 error page of the Smart Sensor Edge Sensor; (2) the user name for a failed logon, when displayed in the audit journals reviewing interface (/AirMagnetSensor/AMSensor.dll/XH) by the Smart Sensor Edge Sensor log viewer; and (3) an SSID of an AP, when displayed on an ACL page (/Amom/Amom.dll/BD) of the Enterprise Server Status Overview in the Enterprise Server Web interface. | []
| null | null | null | null |
|
GHSA-9ch6-prj4-mf5v | IBM Edge 4.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 189441. | []
| null | null | null | null |
|
CVE-2016-1019 | Adobe Flash Player 21.0.0.197 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors, as exploited in the wild in April 2016. | [
"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 10 |
|
CVE-2004-0575 | Integer overflow in DUNZIP32.DLL for Microsoft Windows XP, Windows XP 64-bit Edition, Windows Server 2003, and Windows Server 2003 64-bit Edition allows remote attackers to execute arbitrary code via compressed (zipped) folders that involve an "unchecked buffer" and improper length validation. | [
"cpe:2.3:o:microsoft:windows_2003_server:64-bit:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
GHSA-hc2r-g3jp-hcc7 | Cross-Site Request Forgery (CSRF) vulnerability in Antsanchez Easy Cookie Law plugin <= 3.1 versions. | []
| null | 5.4 | null | null |
|
ICSA-20-287-02 | LCDS LAquis SCADA | An attacker who convinces a valid user to open a specially crafted project file to exploit could execute code under the privileges of the application due to an out-of-bounds read vulnerability.CVE-2020-25188 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). | []
| null | null | 7.8 | null |
RHSA-2021:0299 | Red Hat Security Advisory: thunderbird security update | Mozilla: IMAP Response Injection when using STARTTLS Mozilla: HTTPS pages could have been intercepted by a registered service worker when they should not have been Mozilla: Cross-origin information leakage via redirected PDF requests Mozilla: Type confusion when using logical assignment operators in JavaScript switch statements Mozilla: Use-after-poison for incorrectly redeclared JavaScript variables during GC Mozilla: Memory safety bugs fixed in Firefox 85 and Firefox ESR 78.7 | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
]
| null | 8.8 | 6.1 | null |
GHSA-49rq-hwc3-x77w | TensorFlow has Null Pointer Error in QuantizedMatMulWithBiasAndDequantize | ImpactNPE in QuantizedMatMulWithBiasAndDequantize with MKL enablePatchesWe have patched the issue in GitHub commit [8a47a39d9697969206d23a523c977238717e8727](https://github.com/tensorflow/tensorflow/commit/8a47a39d9697969206d23a523c977238717e8727).The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by r3pwnx | []
| null | 7.5 | null | null |
CVE-2020-23715 | Directory Traversal vulnerability in Webport CMS 1.19.10.17121 via the file parameter to file/download. | [
"cpe:2.3:a:webport_cms_project:webport_cms:1.19.10.17121:*:*:*:*:*:*:*"
]
| null | 8.6 | null | 5 |
|
CVE-2022-38256 | TastyIgniter v3.5.0 was discovered to contain a cross-site scripting (XSS) vulnerability which allows attackers to execute arbitrary web scripts or HTML via a crafted payload. | [
"cpe:2.3:a:tastyigniter:tastyigniter:*:*:*:*:*:*:*:*"
]
| null | 5.4 | null | null |
|
CVE-2024-4961 | D-Link DAR-7000-40 onlineuser.php unrestricted upload | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical was found in D-Link DAR-7000-40 V31R02B1413C. Affected by this vulnerability is an unknown functionality of the file /user/onlineuser.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264529 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. | []
| 5.3 | 6.3 | 6.3 | 6.5 |
GHSA-m3xv-x3ph-mq22 | Server-side Template Injection in nystudio107/craft-seomatic | A Server-side Template Injection (SSTI) vulnerability exists in Nystudio107 Seomatic prior to 3.4.12 in src/helpers/UrlHelper.php via the host header. | []
| null | 9.8 | null | null |
CVE-2023-47838 | WordPress Conditional Fields for Contact Form 7 plugin <= 2.4.1 - Broken Access Control vulnerability | Missing Authorization vulnerability in Jules Colle Conditional Fields for Contact Form 7 allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Conditional Fields for Contact Form 7: from n/a through 2.4.1. | []
| null | 4.3 | null | null |
CVE-2024-43754 | Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79) | Adobe Experience Manager versions 6.5.21 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could allow an attacker to execute arbitrary code in the context of the victim's browser. This issue occurs when data from a malicious source is processed by a web application's client-side scripts to update the DOM. Exploitation of this issue requires user interaction, such as convincing a victim to click on a malicious link. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
]
| null | 5.4 | null | null |
CVE-2001-1323 | Buffer overflow in MIT Kerberos 5 (krb5) 1.2.2 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via base-64 encoded data, which is not properly handled when the radix_encode function processes file glob output from the ftpglob function. | [
"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-95rw-gm23-wxwq | Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK & Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0960, CVE-2016-0961, CVE-2016-0962, CVE-2016-0986, CVE-2016-0992, CVE-2016-1002, and CVE-2016-1005. | []
| null | null | 9.8 | null |
|
CVE-2016-6132 | The gdImageCreateFromTgaCtx function in the GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file. | [
"cpe:2.3:a:libgd:libgd:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"
]
| null | null | 6.5 | 4.3 |
|
GHSA-3ggg-wrvv-9653 | na-img-4.0.34.bin for the IP3 Networks NetAccess NA75 allows local users to gain Unix shell access via "`" (backtick) characters in the appliance's command line interface (CLI). | []
| null | null | null | null |
|
CVE-2020-26199 | Dell EMC Unity, Unity XT, and UnityVSA versions prior to 5.0.4.0.5.012 contain a plain-text password storage vulnerability. A user credentials (including the Unisphere admin privilege user) password is stored in a plain text in multiple log files. A local authenticated attacker with access to the log files may use the exposed password to gain access with the privileges of the compromised user. | [
"cpe:2.3:a:dell:emc_unity_operating_environment:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:emc_unity_vsa_operating_environment:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:emc_unity_xt_operating_environment:*:*:*:*:*:*:*:*"
]
| null | 6.4 | null | null |
|
ICSA-21-159-12 | Siemens Simcenter Femap | The femap.exe application lacks proper validation of user-supplied data when parsing FEMAP files. This could result in an out of bounds write past the end of an allocated structure, a different vulnerability than CVE-2021-27399.
An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12819) The femap.exe application lacks proper validation of user-supplied data when parsing FEMAP files. This could result in an out of bounds write past the end of an allocated structure, a different vulnerability than CVE-2021-27387.
An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12820) | []
| null | 7.8 | null | null |
GHSA-52q6-3x8h-v328 | Use after free in WebGL in Google Chrome prior to 91.0.4472.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | []
| null | 8.8 | null | null |
|
CVE-2018-2908 | Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). The supported version that is affected is 11.3. Easily exploitable vulnerability allows low privileged attacker with network access via RPC to compromise Solaris. While the vulnerability is in Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Solaris. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H). | [
"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"
]
| null | null | 7.7 | 6.8 |
|
CVE-2013-3927 | Unspecified vulnerability in the client library in Siemens COMOS 9.2 before 9.2.0.6.10 and 10.0 before 10.0.3.0.4 allows local users to obtain unintended write access to the database by leveraging read access. | [
"cpe:2.3:a:siemens:comos:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:comos:10.0:*:*:*:*:*:*:*"
]
| null | null | null | 4.6 |
|
GHSA-9g57-m5vf-qp73 | Liferay Portal and Liferay DXP Vulnerable to Cross-Site Scripting (XSS) via Asset Module Parameter | Cross-site scripting (XSS) vulnerability in the Asset module's category selector input field in Liferay Portal 7.3.5 and Liferay DXP 7.3 before fix pack 1, allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_asset_categories_admin_web_portlet_AssetCategoriesAdminPortlet_title parameter. | []
| null | 6.1 | null | null |
CVE-2023-47160 | IBM Cognos Controller XML external entity injection | IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0
is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. | []
| null | 8.2 | null | null |
GHSA-cwh7-7597-4728 | Cross-site scripting (XSS) vulnerability in the Exif module 5.x-1.x before 5.x-1.2 and 6.x-1.x-dev before April 13, 2009, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via EXIF tags in an image. | []
| null | null | null | null |
|
CVE-2022-31353 | Online Car Wash Booking System v1.0 is vulnerable to SQL Injection via /ocwbs/admin/services/view_service.php?id=. | [
"cpe:2.3:a:online_car_wash_booking_system_project:online_car_wash_booking_system:1.0:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
CVE-2007-0899 | There is a possible heap overflow in libclamav/fsg.c before 0.100.0. | [
"cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
CVE-2004-1854 | Buffer overflow in the logging function in Picophone 1.63 and earlier allows remote attackers to execute arbitrary code via a large packet. | [
"cpe:2.3:a:picophone:internet_telephone:1.63:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2007-5856 | Quick Look Apple Mac OS X 10.5.1, when previewing an HTML file, does not prevent plug-ins from making network requests, which might allow remote attackers to obtain sensitive information. | [
"cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*"
]
| null | null | null | 9.4 |
|
CVE-2024-2660 | Vault TLS Cert Auth Method Did Not Correctly Validate OCSP Responses | Vault and Vault Enterprise TLS certificates auth method did not correctly validate OCSP responses when one or more OCSP sources were configured. This vulnerability, CVE-2024-2660, affects Vault and Vault Enterprise 1.14.0 and above, and is fixed in Vault 1.16.0 and Vault Enterprise 1.16.1, 1.15.7, and 1.14.11. | []
| null | 6.4 | null | null |
CVE-2014-9448 | Buffer overflow in Mini-stream RM-MP3 Converter 3.1.2.1.2010.03.30 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a long string in a WAX file. | [
"cpe:2.3:a:mini-stream:rm-mp3_converter:3.1.2.1.2010.03.30:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.