id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
4.89k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2019-7279
Optergy Proton/Enterprise devices have Hard-coded Credentials.
[ "cpe:2.3:a:optergy:enterprise:*:*:*:*:*:*:*:*", "cpe:2.3:a:optergy:proton:*:*:*:*:*:*:*:*" ]
null
null
7.3
7.5
GHSA-35jv-74f7-vj2m
In impd_parse_split_drc_characteristic of impd_drc_static_payload.c there is a possible out of bounds write due to missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-116619337.
[]
null
7.8
null
null
GHSA-x96r-v34q-q4vv
GNOME GLib 2.56.1 has an out-of-bounds read vulnerability in g_markup_parse_context_parse() in gmarkup.c, related to utf8_str().
[]
null
null
7.5
null
CVE-2007-5461
Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.
[ "cpe:2.3:a:apache:tomcat:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.19:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.20:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.21:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.22:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.23:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.25:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.26:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.27:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.29:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.30:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.32:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.33:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.34:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.35:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:*" ]
null
null
null
3.5
CVE-2023-42013
IBM UrbanCode Deploy information disclosure
IBM UrbanCode Deploy (UCD) 7.1 through 7.1.2.14, 7.2 through 7.2.3.7, and 7.3 through 7.3.2.2 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 265510.
[ "cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
RHSA-2019:0303
Red Hat Security Advisory: runc security update
runc: Execution of malicious containers allows for container escape and access to host filesystem
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
null
7.7
null
GHSA-224x-44xc-3gcf
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
[]
null
null
null
null
CVE-2019-1943
Cisco Small Business Series Switches Open Redirect Vulnerability
A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Switches software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by intercepting a user's HTTP request and modifying it into a request that causes the web interface to redirect the user to a specific malicious URL. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites.
[ "cpe:2.3:o:cisco:sg200-50_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg200-50p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg200-50fp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg200-26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg200-26p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg200-26fp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg200-18_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg200-10fp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg200-08_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg200-08p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf200-24_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf200-24p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf200-24fp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf200-48_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf200-48p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf302-08pp_firmware:1.3.7.18:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf302-08mpp_firmware:1.3.7.18:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-10pp_firmware:1.3.7.18:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-10mpp_firmware:1.3.7.18:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf300-24pp_firmware:1.3.7.18:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf300-48pp_firmware:1.3.7.18:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-28pp_firmware:1.3.7.18:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf300-08_firmware:1.3.7.18:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf300-48p_firmware:1.3.7.18:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-10mp_firmware:1.3.7.18:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-10p_firmware:1.3.7.18:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-10_firmware:1.3.7.18:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-28p_firmware:1.3.7.18:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf300-24p_firmware:1.3.7.18:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf302-08mp_firmware:1.3.7.18:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-28_firmware:1.3.7.18:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf300-48_firmware:1.3.7.18:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-20_firmware:1.3.7.18:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf302-08p_firmware:1.3.7.18:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-52_firmware:1.3.7.18:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf300-24_firmware:1.3.7.18:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf302-08_firmware:1.3.7.18:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf300-24mp_firmware:1.3.7.18:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-10sfp_firmware:1.3.7.18:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-28mp_firmware:1.3.7.18:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-52p_firmware:1.3.7.18:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg300-52mp_firmware:1.3.7.18:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500-28mpp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500-52mp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf500-24_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf500-24p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf500-48_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf500-48p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500-28_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500-28p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500-52_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500-52p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500x-24_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500x-24p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500x-48_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg500x-48p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*" ]
null
null
4.7
null
CVE-2021-44567
An unauthenticated SQL Injection vulnerability exists in RosarioSIS before 7.6.1 via the votes parameter in ProgramFunctions/PortalPollsNotes.fnc.php.
[ "cpe:2.3:a:rosariosis:rosariosis:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2017-2140
Tablacus Explorer 17.3.30 and earlier allows arbitrary scripts to be executed in the context of the application due to specially crafted directory.
[ "cpe:2.3:a:gaku:tablacus_explorer:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
CVE-2021-40288
A denial-of-service attack in WPA2, and WPA3-SAE authentication methods in TP-Link AX10v1 before V1_211014, allows a remote unauthenticated attacker to disconnect an already connected wireless client via sending with a wireless adapter specific spoofed authentication frames
[ "cpe:2.3:o:tp-link:archer_ax10_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:archer_ax10:v1:*:*:*:*:*:*:*" ]
null
7.5
null
7.8
RHSA-2023:4340
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update
Controller: Html injection in custom login info
[ "cpe:/a:redhat:ansible_automation_platform:2.4::el8", "cpe:/a:redhat:ansible_automation_platform:2.4::el9" ]
null
7.3
null
null
GHSA-4363-m599-g24f
An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests, aka 'Windows SMB Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-0704, CVE-2019-0821.
[]
null
null
6.5
null
CVE-2019-2671
Vulnerability in the Oracle CRM Technical Foundation component of Oracle E-Business Suite (subcomponent: Preferences). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle CRM Technical Foundation. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle CRM Technical Foundation, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle CRM Technical Foundation accessible data as well as unauthorized update, insert or delete access to some of Oracle CRM Technical Foundation accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
[ "cpe:2.3:a:oracle:crm_technical_foundation:12.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:crm_technical_foundation:12.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:crm_technical_foundation:12.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:crm_technical_foundation:12.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:crm_technical_foundation:12.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:crm_technical_foundation:12.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:crm_technical_foundation:12.2.8:*:*:*:*:*:*:*" ]
null
null
8.2
5.8
GHSA-cj96-qrcp-8ffp
Buffer Overflow vulnerability in Control de Ciber version 1.650, in the printing function. Sending a modified request by the attacker could cause a Buffer Overflow when the adminitrator tries to accept or delete the print query created by the request.
[]
null
8.8
null
null
CVE-2006-5890
SQL injection vulnerability in detail.asp in Superfreaker Studios USupport 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.
[ "cpe:2.3:a:superfreaker_studios:usupport:1.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2023-21198
In remove_sdp_record of btif_sdp_server.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-245517503
[ "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2006-7021
PHP remote file inclusion vulnerability in manager/tools/link/dbinstall.php in Plume CMS 1.1.3 allows remote attackers to execute arbitrary PHP code via a URL in the _PX_config[manager_path] parameter.
[ "cpe:2.3:a:plume-cms:plume_cms:1.1.3:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2023-47652
WordPress Auto Affiliate Links Plugin <= 6.4.2.4 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in Lucian Apostol Auto Affiliate Links allows Stored XSS.This issue affects Auto Affiliate Links: from n/a through 6.4.2.4.
[ "cpe:2.3:a:autoaffiliatelinks:auto_affiliate_links:*:*:*:*:*:wordpress:*:*" ]
null
7.1
null
null
CVE-2021-21326
Horizontal Privilege Escalation
GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 it is possible to create tickets for another user with self-service interface without delegatee systems enabled. This is fixed in version 9.5.4.
[ "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" ]
null
7.7
null
null
GHSA-ch9m-4jxr-g98q
UCMS v1.6.0 contains an authentication bypass vulnerability which is exploited via cookie poisoning.
[]
null
9.8
null
null
CVE-2010-2035
Directory traversal vulnerability in the Percha Gallery (com_perchagallery) component 1.6 Beta for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.
[ "cpe:2.3:a:percha:com_perchagallery:1.6:beta:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
RHSA-2023:4074
Red Hat Security Advisory: thunderbird security update
Mozilla: Use-after-free in WebRTC certificate generation Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Fullscreen notification obscured Mozilla: Lack of warning when opening Diagcab files Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
8.8
null
null
GHSA-wvx9-6xxp-wmvx
SQL injection vulnerability in NotifyLink before 3.0 allows remote attackers to execute arbitrary SQL commands via the URL.
[]
null
null
null
null
GHSA-cf67-p57q-gjjc
Unknown vulnerability in GNU Ghostscript before 7.07 allows attackers to execute arbitrary commands, even when -dSAFER is enabled, via a PostScript file that causes the commands to be executed from a malicious print job.
[]
null
null
null
null
CVE-2021-25774
In JetBrains TeamCity before 2020.2.1, a user could get access to the GitHub access token of another user.
[ "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*" ]
null
4.3
null
4
CVE-2023-37258
DataEase has a SQL injection vulnerability that can bypass blacklists
DataEase is an open source data visualization analysis tool. Prior to version 1.18.9, DataEase has a SQL injection vulnerability that can bypass blacklists. The vulnerability has been fixed in v1.18.9. There are no known workarounds.
[ "cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
RHSA-2003:228
Red Hat Security Advisory: : : : Updated xinetd packages fix denial-of-service attacks and other bugs
security flaw security flaw
[ "cpe:/o:redhat:linux:7.1" ]
null
null
null
null
CVE-2007-6007
Integer overflow in the ID_PSP.apl plug-in for ACD ACDSee Photo Manager 9.0 build 108, Pro Photo Manager 8.1 build 99, and Photo Editor 4.0 build 195 allows user-assisted remote attackers to execute arbitrary code via a crafted PSP image that triggers a heap-based buffer overflow.
[ "cpe:2.3:a:acdsee:photo_editor:4.0:build_195:*:*:*:*:*:*", "cpe:2.3:a:acdsee:photo_manager:9.0:build_108:*:*:*:*:*:*", "cpe:2.3:a:acdsee:pro_photo_manager:8.1:build_99:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-7w8h-97qm-v5g3
Oracle Database 10g uses a NULL pDacl parameter when calling the SetSecurityDescriptorDacl function to create discretionary access control lists (DACLs), which allows local users to gain privileges.
[]
null
null
null
null
GHSA-9737-ffv6-mv28
NeDi 1.9C allows an authenticated user to inject PHP code in the System Files function on the endpoint /System-Files.php via the txt HTTP POST parameter. This allows an attacker to obtain access to the operating system where NeDi is installed and to all application data.
[]
null
9.9
null
null
GHSA-pw24-grch-f45v
SAP Hostcontrol does not require authentication for the SOAP SAPControl endpoint. This is SAP Security Note 2442993.
[]
null
null
7.5
null
GHSA-pfv2-37f7-9m6w
Improper Verification of Cryptographic Signature in Nimbus JOSE+JWT
Nimbus JOSE+JWT before 4.36 proceeds with ECKey construction without ensuring that the public x and y coordinates are on the specified curve, which allows attackers to conduct an Invalid Curve Attack in environments where the JCE provider lacks the applicable curve validation.
[]
null
null
7.5
null
CVE-2008-2984
Cross-site scripting (XSS) vulnerability in backend/umleitung.php in CMReams CMS 1.3.1.1 Beta 2 allows remote attackers to inject arbitrary web script or HTML via the lang[be_red_text] parameter.
[ "cpe:2.3:a:cmreams:cmreams_cms:1.3.1.1:beta_2:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-wqf9-7q5f-3m2f
Buffer overflow in IBM Rational ClearCase through 7.1.2.12, 8.0.0.x before 8.0.0.9, and 8.0.1.x before 8.0.1.2 allows local users to gain privileges via unspecified vectors.
[]
null
null
null
null
CVE-2023-21643
Untrusted Pointer Dereference in Automotive
Memory corruption due to untrusted pointer dereference in automotive during system call.
[ "cpe:2.3:o:qualcomm:apq8064au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8064au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8540p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*" ]
null
9.1
null
null
GHSA-7gm5-m2xc-vh2j
A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications.
[]
null
4.7
null
null
GHSA-jfmw-22wh-9p3p
This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. Crafted data in a PDF file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17809.
[]
null
7.8
null
null
CVE-2023-0811
Omron CJ1M unit v4.0 and prior has improper access controls on the memory region where the UM password is stored. If an adversary issues a PROGRAM AREA WRITE command to a specific memory region, they could overwrite the password. This may lead to disabling UM protections or setting a non-ASCII password (non-keyboard characters) and preventing an engineer from viewing or modifying the user program.
[ "cpe:2.3:o:omron:sysmac_cj2h-cpu64_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2h-cpu64:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2h-cpu64-eip_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2h-cpu64-eip:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2h-cpu65_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2h-cpu65:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2h-cpu65-eip_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2h-cpu65-eip:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2h-cpu66_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2h-cpu66:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2h-cpu66-eip_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2h-cpu66-eip:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2h-cpu67_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2h-cpu67:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2h-cpu67-eip_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2h-cpu67-eip:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2h-cpu68_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2h-cpu68:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2h-cpu68-eip_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2h-cpu68-eip:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2m-cpu11_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2m-cpu11:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2m-cpu12_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2m-cpu12:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2m-cpu13_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2m-cpu13:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2m-cpu14_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2m-cpu14:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2m-cpu15_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2m-cpu15:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2m-cpu31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2m-cpu31:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2m-cpu32_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2m-cpu32:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2m-cpu33_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2m-cpu33:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2m-cpu34_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2m-cpu34:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cj2m-cpu35_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cj2m-cpu35:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-e10dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-e10dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-e10dr-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-e10dr-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-e10dt-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-e10dt-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-e10dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-e10dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-e10dt1-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-e10dt1-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-e10dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-e10dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-e14dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-e14dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-e14sdr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-e14sdr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-e20dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-e20dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-e20sdr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-e20sdr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-e30dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-e30dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-e30sdr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-e30sdr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-e40dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-e40dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-e40sdr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-e40sdr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-e60sdr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-e60sdr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-na20dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-na20dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-na20dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-na20dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1e-na20dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1e-na20dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1h-x40dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1h-x40dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1h-x40dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1h-x40dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1h-x40dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1h-x40dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1h-xa40dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1h-xa40dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1h-xa40dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1h-xa40dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1h-xa40dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1h-xa40dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1h-y20dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1h-y20dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-el20dr-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-el20dr-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-em30dr-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-em30dr-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-em30dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-em30dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-em30dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-em30dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-em40dr-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-em40dr-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-em40dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-em40dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-em40dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-em40dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-l10dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-l10dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-l10dr-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-l10dr-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-l10dt-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-l10dt-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-l10dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-l10dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-l10dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-l10dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-l14dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-l14dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-l14dr-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-l14dr-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-l14dt-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-l14dt-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-l14dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-l14dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-l14dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-l14dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-l20dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-l20dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-l20dr-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-l20dr-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-l20dt-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-l20dt-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-l20dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-l20dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-l20dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-l20dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-m30dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-m30dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-m30dr-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-m30dr-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-m30dt-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-m30dt-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-m30dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-m30dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-m30dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-m30dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-m40dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-m40dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-m40dr-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-m40dr-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-m40dt-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-m40dt-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-m40dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-m40dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-m40dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-m40dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-m60dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-m60dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-m60dr-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-m60dr-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-m60dt-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-m60dt-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-m60dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-m60dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp1l-m60dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp1l-m60dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-e14dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-e14dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-e20dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-e20dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-e30dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-e30dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-e40dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-e40dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-e60dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-e60dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n14dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n14dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n14dr-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n14dr-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n14dt-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n14dt-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n14dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n14dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n14dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n14dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n20dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n20dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n20dr-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n20dr-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n20dt-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n20dt-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n20dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n20dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n20dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n20dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n30dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n30dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n30dr-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n30dr-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n30dt-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n30dt-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n30dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n30dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n30dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n30dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n40dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n40dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n40dr-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n40dr-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n40dt-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n40dt-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n40dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n40dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n40dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n40dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n60dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n60dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n60dr-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n60dr-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n60dt-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n60dt-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n60dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n60dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-n60dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-n60dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-s30dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-s30dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-s30dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-s30dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-s30dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-s30dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-s40dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-s40dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-s40dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-s40dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-s40dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-s40dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-s60dr-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-s60dr-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-s60dt-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-s60dt-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cp2e-s60dt1-d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cp2e-s60dt1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cs1w-drm21-v1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cs1w-drm21-v1:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cs1w-eip21_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cs1w-eip21:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cs1w-etn21_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cs1w-etn21:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cs1w-fln22_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cs1w-fln22:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cs1w-nc\\[\\]71_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cs1w-nc\\[\\]71:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cs1w-spu01-v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cs1w-spu01-v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:sysmac_cs1w-spu02-v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:omron:sysmac_cs1w-spu02-v2:-:*:*:*:*:*:*:*" ]
null
9.1
null
null
CVE-2020-9199
B2368-22 V100R001C00;B2368-57 V100R001C00;B2368-66 V100R001C00 have a command injection vulnerability. An attacker with high privileges may exploit this vulnerability through some operations on the LAN. Due to insufficient input validation of some parameters, the attacker can exploit this vulnerability to inject commands to the target device.
[ "cpe:2.3:o:huawei:b2368-22_firmware:v100r001c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:b2368-22:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:b2368-57_firmware:v100r001c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:b2368-57:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:b2368-66_firmware:v100r001c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:b2368-66:-:*:*:*:*:*:*:*" ]
null
6.8
null
7.7
GHSA-w2vg-jw6r-gqf6
QuickTime for Java on Mac OS X 10.4 through 10.4.8, when used with Quartz Composer, allows remote attackers to obtain sensitive information (screen images) via a Java applet that accesses images that are being rendered by other embedded QuickTime objects.
[]
null
null
null
null
CVE-2007-5052
Multiple cross-site scripting (XSS) vulnerabilities in index.php in Vigile CMS 1.8 allow remote attackers to inject arbitrary web script or HTML via a request to the wiki module with (1) the title parameter or (2) a "title=" sequence in the PATH_INFO, or a request to the download module with (3) the cat parameter or (4) a "cat=" sequence in the PATH_INFO.
[ "cpe:2.3:a:itcms:vigile_cms:1.8:*:*:*:*:*:*:*" ]
null
null
null
4.3
RHSA-2007:0244
Red Hat Security Advisory: busybox security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
GHSA-xj34-5mxh-m7xc
Unspecified vulnerability in ImageIO in Apple Mac OS X 10.4.7 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted GIF image that triggers a memory allocation failure that is not properly handled.
[]
null
null
null
null
CVE-2023-33538
TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 was discovered to contain a command injection vulnerability via the component /userRpm/WlanNetworkRpm .
[ "cpe:2.3:o:tp-link:tl-wr940n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-wr940n:2.0:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-wr940n:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:tl-wr841n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-wr841n:8.0:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-wr841n:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:tl-wr740n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-wr740n:1.0:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-wr740n:2.0:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2024-0839
The FeedWordPress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2022.0222 due to missing validation on the user controlled 'guid' key. This makes it possible for unauthenticated attackers to view draft posts that may contain sensitive information.
[ "cpe:2.3:a:feedwordpress_project:feedwordpress:*:*:*:*:*:wordpress:*:*" ]
null
5.3
null
null
CVE-2021-27796
A vulnerability in Brocade Fabric OS versions before Brocade Fabric OS v8.0.1b, v7.4.1d could allow an authenticated attacker within the restricted shell environment (rbash) as either the “user” or “factory” account, to read the contents of any file on the filesystem utilizing one of a few available binaries.
[ "cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*" ]
null
6.5
null
6.8
GHSA-mfvw-r6f7-mjcf
A cross-site scripting vulnerability (XSS) in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow a remote attacker to tamper with the web interface of affected installations. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
[]
null
null
null
null
GHSA-9p2r-3443-pgvw
Cross-site scripting (XSS) vulnerability in index.php in Turnkey Ebook Store 1.1 allows remote attackers to inject arbitrary web script or HTML via the keywords parameter in a search action.
[]
null
null
null
null
CVE-2019-2252
Classic buffer overflow vulnerability while playing the specific video whose Decode picture buffer size is more than 16 in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9650, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016, SXR1130
[ "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qualcomm_215_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qualcomm_215:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_427:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_435:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_439_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_439:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_429_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_429:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_632_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_632:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_636:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_665_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_665:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_712_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_712:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_710_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_710:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_670_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_670:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_855_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_855:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_8cx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_8cx:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_high_med_2016_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_high_med_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*" ]
null
9.8
null
10
CVE-2017-7819
A use-after-free vulnerability can occur in design mode when image objects are resized if objects referenced during the resizing have been freed from memory. This results in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
[ "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
CVE-2020-11149
Out of bound access due to usage of an out-of-range pointer offset in the camera driver. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
[ "cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm215:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm3003a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm6125:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm6150:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm6150a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm6150l:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm6350:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm640a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm640l:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm640p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm660:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm660l:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm670:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm670a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm670l:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm7150a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm7150l:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm7250:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm7250b:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm7350c:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm8004:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm8005:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm8008:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm8009:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm8150:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm8150a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm8150b:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm8150c:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm8150l:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm8250:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm8350:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm8350b:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm8350bh:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm8350bhs:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm8350c:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm855:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm855a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm855b:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm855l:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm855p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm8909:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm8916:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm8953:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pm8998:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pmc1000h:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pmd9655:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pme605:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pmi632:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pmi8952:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pmi8998:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pmk7350:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pmk8002:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pmk8003:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pmk8350:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pmm6155au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pmm8155au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pmm855au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pmm8996au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pmr525:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pmr735a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pmr735b:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pmw3100:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pmx20:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pmx24:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:pmx55:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qat3514:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qat3516:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qat3518:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qat3519:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qat3522:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qat3550:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qat3555:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qat5515:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qat5516:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qat5522:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qat5533:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qat5568:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qbt1500:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qbt2000:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca4020:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6564:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs603:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qdm2301:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qdm2302:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qdm2305:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qdm2307:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qdm2308:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qdm2310:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qdm3301:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qdm3302:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qdm4643:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qdm4650:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qdm5579:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qdm5620:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qdm5621:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qdm5650:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qdm5652:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qdm5670:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qdm5671:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qdm5677:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qdm5679:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qet4100:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qet4101:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qet5100:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qet5100m:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qet6100:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qet6110:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qfs2530:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qfs2580:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qfs2608:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qfs2630:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qln1030:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qln4642:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qln4650:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qln5020:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qln5030:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qln5040:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpa2625:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpa4360:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpa4361:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpa5460:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpa5461:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpa5580:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpa5581:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpa6560:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpa8673:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpa8686:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpa8801:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpa8802:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpa8803:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpa8821:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpa8842:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpm4621:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpm4630:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpm4640:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpm4641:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpm4650:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpm5541:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpm5577:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpm5579:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpm5621:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpm5641:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpm5658:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpm5670:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpm5677:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpm5679:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpm5870:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpm5875:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpm6325:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpm6375:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpm6582:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpm6585:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpm6621:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpm6670:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpm8820:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpm8830:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpm8870:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qpm8895:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qsm7250:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qsw6310:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qsw8573:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qsw8574:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qtc410s:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qtc800h:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qtc800s:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qtc801s:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qtm525:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qtm527:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qualcomm215:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd205:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd429:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd665:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd6905g:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd750g:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd8655g:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd8885g:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd8c:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd8cx:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sda429w:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm830:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdr425:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdr660:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdr660g:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdr735:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdr735g:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdr8150:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdr8250:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdr865:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx20m:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdxr1:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdxr25g:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7350:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:smb1350:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:smb1351:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:smb1354:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:smb1355:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:smb1357:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:smb1381:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:smb1390:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:smb1394:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:smb1395:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:smb1396:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:smb1398:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:smb2351:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:smr525:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:smr526:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:smr545:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:smr546:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3680:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3999:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wgr7640:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wtr2965:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wtr3925:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wtr4905:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wtr5975:-:*:*:*:*:*:*:*" ]
null
6.7
null
7.2
CVE-2007-2222
Multiple buffer overflows in the (1) ActiveListen (Xlisten.dll) and (2) ActiveVoice (Xvoice.dll) speech controls, as used by Microsoft Internet Explorer 5.01, 6, and 7, allow remote attackers to execute arbitrary code via a crafted ActiveX object that triggers memory corruption, as demonstrated via the ModeName parameter to the FindEngine function in ACTIVEVOICEPROJECTLib.DirectSS.
[ "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.01:sp4:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:sp1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:sp2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:*:professional_x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:professional_x64:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:sp1:*:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:sp2:*:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:gold:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:gold:x64:*:*:*:*:*" ]
null
null
null
9.3
CVE-2009-3661
Multiple SQL injection vulnerabilities in the DJ-Catalog (com_djcatalog) component for Joomla! allow remote attackers to execute arbitrary SQL commands via the (1) id parameter in a showItem action and (2) cid parameter in a show action to index.php.
[ "cpe:2.3:a:blueconstantmedia:com_djcatalog:*:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2020-3187
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Path Traversal Vulnerability
A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and obtain read and delete access to sensitive files on a targeted system. The vulnerability is due to a lack of proper input validation of the HTTP URL. An attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences. An exploit could allow the attacker to view or delete arbitrary files on the targeted system. When the device is reloaded after exploitation of this vulnerability, any files that were deleted are restored. The attacker can only view and delete files within the web services file system. This file system is enabled when the affected device is configured with either WebVPN or AnyConnect features. This vulnerability can not be used to obtain access to ASA or FTD system files or underlying operating system (OS) files. Reloading the affected device will restore all files within the web services file system.
[ "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5505_firmware:9.6\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5510_firmware:9.6\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5510:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5512-x_firmware:9.6\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5515-x_firmware:9.6\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5520_firmware:9.6\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5520:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5525-x_firmware:9.6\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5540_firmware:9.6\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5540:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5545-x_firmware:9.6\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5550_firmware:9.6\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5550:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5555-x_firmware:9.6\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5580_firmware:9.6\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5585-x_firmware:9.6\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*" ]
null
null
9.1
null
CVE-2008-6807
PHP remote file inclusion vulnerability in ListRecords.php in osprey 1.0a4.1 allows remote attackers to execute arbitrary PHP code via a URL in the xml_dir parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. NOTE: the lib_dir vector is already covered by CVE-2006-6630.
[ "cpe:2.3:a:ibiblio:osprey:1.0a4.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2019-2781
Vulnerability in the Oracle Hospitality Suite8 component of Oracle Hospitality Applications (subcomponent: XML Interface). Supported versions that are affected are 8.9.6, 8.10.2 and 8.11-8.14. Easily exploitable vulnerability allows low privileged attacker with network access via TCP/IP to compromise Oracle Hospitality Suite8. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality Suite8 accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
[ "cpe:2.3:a:oracle:hospitality_suite8:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:hospitality_suite8:8.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:hospitality_suite8:8.10.2:*:*:*:*:*:*:*" ]
null
null
6.5
4
GHSA-qg7x-6q28-q3g3
Cross Site Scripting vulnerability found in Simplcommerce v.40734964b0811f3cbaf64b6dac261683d256f961 thru 3103357200c70b4767986544e01b19dbf11505a7 allows a remote attacker to execute arbitrary code via a crafted script to the search bar feature.
[]
null
7.1
null
null
RHSA-2017:3490
Red Hat Security Advisory: Red Hat Enterprise Linux 6.7 Extended Update Support One-Year Notice
This is the One-Year notification for the retirement of Red Hat Enterprise Linux 6.7 Extended Update Support (EUS). This notification applies only to those customers subscribed to the Extended Update Support (EUS) channel for Red Hat Enterprise Linux 6.7.
[ "cpe:/o:redhat:rhel_eus:6.7::computenode", "cpe:/o:redhat:rhel_eus:6.7::server" ]
null
null
null
null
GHSA-jh82-8337-2954
Multiple "range checking flaws" in the ISO9660 filesystem handler in Linux 2.6.11 and earlier may allow attackers to cause a denial of service or corrupt memory via a crafted filesystem.
[]
null
null
null
null
CVE-2006-1577
Multiple cross-site scripting (XSS) vulnerabilities in view_all_set.php in Mantis 1.0.1, 1.0.0rc5, and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) start_day, (2) start_year, and (3) start_month parameters.
[ "cpe:2.3:a:mantis:mantis:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:1.0.0_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:1.0.0_rc2:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:1.0.0_rc3:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:1.0.0_rc4:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:1.0.0a1:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:1.0.0a2:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:1.0.0a3:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:1.0.1:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2018-1312
In Apache httpd 2.2.0 to 2.4.29, when generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly generated using a pseudo-random seed. In a cluster of servers using a common Digest authentication configuration, HTTP requests could be replayed across servers by an attacker without detection.
[ "cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.4.16:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.4.17:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.4.18:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.4.20:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.4.23:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.4.25:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.4.26:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.4.27:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.4.28:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.4.29:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" ]
null
9.8
null
6.8
CVE-2019-12823
Craft CMS before 3.1.31 does not properly filter XML feeds and thus allowing XSS.
[ "cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
CVE-2023-43581
A buffer overflow was reported in the Update_WMI module in some Lenovo Desktop products that may allow a local attacker with elevated privileges to execute arbitrary code.
[ "cpe:2.3:a:lenovo:desktop_bios:*:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_c5-14imb05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_c5-14imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_3-07ada05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_3-07ada05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_3-07imb05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_3-07imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_5_14iab7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_5_14iab7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_5_14irb8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_5_14irb8:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_5-14acn6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_5-14acn6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_t540-15ama_g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_t540-15ama_g:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_70t_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_70t_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_50t_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_50t_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_50a_24_gen_4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_50a_24_gen_4:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_50a_24_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_50a_24_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_30a_27_gen_4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_30a_27_gen_4_firmware:o5nkt33a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_30a_27_gen_4:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_30a_27_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_30a_27_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_30a_24_gen_4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_30a_24_gen_4:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_30a_24_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_30a_24_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_30a_22_gen_4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_30a_22_gen_4:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_30a_22_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_30a_22_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m920z_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m920z_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90t_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90t_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90s_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90s_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90q_tiny_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90q_tiny:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90q_gen_3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90q_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90q_gen_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90q_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90a_pro_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90a_pro_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90a_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90a_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90a_gen_2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90a_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90a:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m80t_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m80t_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m80t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m80t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m80s_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m80s_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m80s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m80s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m80q_gen_3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m80q_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m80q_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m80q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m75t_gen_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m75t_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m75s_gen_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m75s_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m75q_gen_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m75q_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m75n_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m75n:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70t_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70t_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70s_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70s_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70q_gen_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70q_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70q_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70c:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70a_gen_3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70a_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m630e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m630e:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m625q_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m625q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:loq_17irb8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:loq_17irb8:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_t5_26iab7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_t5_26iab7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_t7-34imz5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_t7-34imz5:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_t7-34iaz7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_t7-34iaz7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_t7_34irz8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_t7_34irz8:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_t5_26irb8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_t5_26irb8:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_mini_5-01imh05_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_mini_5-01imh05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_mini_5_01iaq7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_mini_5_01iaq7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_gaming_5-14iob6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_gaming_5-14iob6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_gaming_5-14acn6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_gaming_5-14acn6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_gaming_5_17iab7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_gaming_5_17iab7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_gaming_5_17acn7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_gaming_5_17acn7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_g5-14imb05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_g5-14imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_g5-14amr05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_g5-14amr05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_creator_5-14iob6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_creator_5-14iob6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_5_27iah7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_5_27iah7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_5_24iah7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_5_24iah7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-27itl6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-27itl6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-27imb05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-27imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-24itl6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-24itl6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-24imb05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-24imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-24iil5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-24iil5:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-24alc6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-24alc6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-22itl6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-22itl6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-22imb05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-22imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-22iil5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-22iil5:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3_27iap7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3_27iap7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3_24iap7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3_24iap7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3_22iap7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3_22iap7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3_21itl7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3_21itl7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_5-14iob6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_5-14iob6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_5-14imb05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_5-14imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v30a-22iml_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v30a-22iml:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v30a-22itl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v30a-22itl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v30a-24iml_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v30a-24iml:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v30a-24itl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v30a-24itl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v50a-22imb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v50a-22imb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v50a-24imb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v50a-24imb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v50s-07imb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v50s-07imb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v50t-13imb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v50t-13imb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v50t-13imh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v50t-13imh:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v50t-13iob_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v50t-13iob:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v55t_gen_2_13acn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v55t_gen_2_13acn:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_aio_7_27arh7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_aio_7_27arh7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_aio_7-27arh6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_aio_7-27arh6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkedge_se30_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkedge_se30:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p920_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p920_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p720_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p720_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p520c_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p520c_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p520_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p520_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p360_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p360_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p360_workstation_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p360_ultra_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p360_ultra_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p360_tiny_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p360_tiny_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p358_workstation_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p358_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p350_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p350_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p350_tiny_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p350_tiny_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p348_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p348_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p340_workstation_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p340_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p340_tiny_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p340_tiny_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p330_workstation_2nd_gen_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p330_workstation_2nd_gen:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p330_workstation_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p330_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p320_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p320_workstation:-:*:*:*:*:*:*:*" ]
null
6.7
null
null
GHSA-gmr8-4xqw-xcqv
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tauhidul Alam Advanced Angular Contact Form allows Reflected XSS. This issue affects Advanced Angular Contact Form: from n/a through 1.1.0.
[]
null
7.1
null
null
RHSA-2015:0235
Red Hat Security Advisory: Red Hat JBoss BRMS 6.0.3 security update
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix OpenJDK: XML parsing Denial of Service (JAXP, 8017298) JSF: XSS due to insufficient escaping of user-supplied content in outputText tags and EL expressions PicketBox/JBossSX: Unauthorized access to and modification of application server configuration and state by application Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs Tomcat/JBossWeb: Request smuggling via malicious content length header Tomcat/JBossWeb: XML parser hijack by malicious web application netty: DoS via memory exhaustion during data aggregation Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter Security: Invalid EJB caller role check implementation RESTEasy: XXE via parameter entities PicketLink: XXE via insecure DocumentBuilderFactory usage Validator: JSM bypass via ReflectionHelper CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix Framework: Directory traversal Framework: directory traversal flaw jbpm-designer: XXE in BPMN2 import UberFire: Information disclosure and RCE via insecure file upload/download servlets Workbench: Insufficient authorization constraints
[ "cpe:/a:redhat:jboss_brms:6.0" ]
null
null
4.8
null
CVE-2021-20764
Improper input validation vulnerability in Attaching Files of Cybozu Garoon 4.0.0 to 5.0.2 allows a remote attacker to alter the data of Attaching Files.
[ "cpe:2.3:a:cybozu:garoon:*:*:*:*:*:*:*:*" ]
null
5.3
null
5
GHSA-23gm-hjpg-qfp3
ThinVNC 1.0b1 is vulnerable to arbitrary file read, which leads to a compromise of the VNC server. The vulnerability exists even when authentication is turned on during the deployment of the VNC server. The password for authentication is stored in cleartext in a file that can be read via a ../../ThinVnc.ini directory traversal attack vector.
[]
null
9.8
null
null
ICSA-15-293-02
IniNet Solutions SCADA Web Server Vulnerabilities
Multiple stack-based buffer overflows in IniNet embeddedWebServer (aka eWebServer) before 2.02 allow remote attackers to execute arbitrary code via a long field in an HTTP request. IniNet embeddedWebServer (aka eWebServer) before 2.02 mishandles URL encoding, which allows remote attackers to write to or delete files via a crafted string. Directory traversal vulnerability in IniNet embeddedWebServer (aka eWebServer) before 2.02 allows remote attackers to read arbitrary files via a crafted pathname.
[]
null
null
7.5
null
GHSA-vc99-rg67-mm68
An out-of-memory error in the parseABC_STRING_INFO function of libming v0.4.8 allows attackers to cause a Denial of Service (DoS) due to allocator exhaustion.
[]
null
7.5
null
null
CVE-2005-1870
PHP remote file inclusion vulnerability in childwindow.inc.php in Popper 1.41-r2 and earlier allows remote attackers to execute arbitrary PHP code via the form parameter.
[ "cpe:2.3:a:popper:popper:1.41_r2:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2024-7896
Tosei Online Store Management System ネット店舗管理システム p1_ftpserver.php command injection
A vulnerability was found in Tosei Online Store Management System ネット店舗管理システム 4.02/4.03/4.04. It has been rated as critical. Affected by this issue is some unknown functionality of the file /cgi-bin/p1_ftpserver.php. The manipulation of the argument adr_txt leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:tosei:online_store_management_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:tosei-corporation:online_store_management_system:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:tosei-corporation:online_store_management_system:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:tosei-corporation:online_store_management_system:4.0.4:*:*:*:*:*:*:*" ]
5.3
6.3
6.3
6.5
CVE-2024-30006
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
[]
null
8.8
null
null
CVE-2019-13455
In Xymon through 4.3.28, a stack-based buffer overflow vulnerability exists in the alert acknowledgment CGI tool because of &nbsp; expansion in acknowledge.c.
[ "cpe:2.3:a:xymon:xymon:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
CVE-2022-43363
Telegram Web 15.3.1 allows XSS via a certain payload derived from a Target Corporation website. NOTE: some third parties have been unable to discern any relationship between the Pastebin information and a possible XSS finding.
[ "cpe:2.3:a:telegram:telegram:15.3.1:*:*:*:*:-:*:*" ]
null
6.1
null
null
CVE-2024-49553
Media Encoder | Out-of-bounds Write (CWE-787)
Media Encoder versions 25.0, 24.6.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:media_encoder:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:media_encoder:25.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-9w5m-5829-xj6c
Microsoft Excel 2000 SP3 through 2003 SP2, Viewer 2003, Compatibility Pack, and Office 2004 and 2008 for Mac allows user-assisted remote attackers to execute arbitrary code via malformed tags in rich text, aka "Excel Rich Text Validation Vulnerability."
[]
null
null
null
null
GHSA-793v-2p67-gw99
In the Linux kernel, the following vulnerability has been resolved:ksmbd: fix use-after-free in ksmbd_session_rpc_openA UAF issue can occur due to a race condition between ksmbd_session_rpc_open() and __session_rpc_close(). Add rpc_lock to the session to protect it.
[]
null
null
null
null
GHSA-mxrj-wg4w-q89c
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in NotFound Docpro allows PHP Local File Inclusion. This issue affects Docpro: from n/a through 2.0.1.
[]
null
9.8
null
null
CVE-2022-27895
A component in Foundry logging was found to be capturing sensitive information in logs.
Information Exposure Through Log Files vulnerability discovered in Foundry when logs were captured using an underlying library known as Build2. This issue was present in versions earlier than 1.785.0. Upgrade to Build2 version 1.785.0 or greater.
[ "cpe:2.3:a:palantir:foundry_build2:*:*:*:*:*:*:*:*" ]
null
4.2
null
null
GHSA-xw9h-mxp6-gf7c
A vulnerability was found in itsourcecode Vehicle Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file mybill.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
null
null
GHSA-7w26-cm7p-4c6w
SQL injection vulnerability in search.php in Servous sBLOG 0.7.2 allows remote attackers to execute arbitrary SQL commands via the keyword parameter. NOTE: this issue can be used to trigger path disclosure. In addition, it might be primary to vector 1 in CVE-2006-1135.
[]
null
null
null
null
GHSA-j87h-xx89-rh88
SQL injection vulnerability in phpMyFAQ 1.6.7 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors, possibly the userfile or filename parameter.
[]
null
null
null
null
CVE-2006-0258
Unspecified vulnerability in the Connection Manager component of Oracle Database server 8.1.7.4 and 9.0.1.5 has unspecified impact and attack vectors, as identified by Oracle Vuln# DB03.
[ "cpe:2.3:a:oracle:database_server:8.1.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:9.0.1.5:*:fips:*:*:*:*:*" ]
null
null
null
10
GHSA-57q5-57f2-p23x
Opera before 11.62 allows remote attackers to spoof the address field by triggering the launch of a dialog window associated with a different domain.
[]
null
null
null
null
CVE-2005-1729
Novell eDirectory 8.7.3 allows remote attackers to cause a denial of service (application crash) via a URL containing an MS-DOS device name such as AUX, CON, PRN, COM1, or LPT1.
[ "cpe:2.3:a:novell:edirectory:8.7.3:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2022-0999
mySCADA myPRO Command Injection
An authenticated user may be able to misuse parameters to inject arbitrary operating system commands into mySCADA myPRO versions 8.25.0 and prior.
[ "cpe:2.3:a:myscada:mypro:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-8fxr-4vx8-rh8m
In the Linux kernel, the following vulnerability has been resolved:cpufreq: scmi: Fix null-ptr-deref in scmi_cpufreq_get_rate()cpufreq_cpu_get_raw() can return NULL when the target CPU is not present in the policy->cpus mask. scmi_cpufreq_get_rate() does not check for this case, which results in a NULL pointer dereference.Add NULL check after cpufreq_cpu_get_raw() to prevent this issue.
[]
null
null
null
null
ICSA-15-239-02
Siemens SIMATIC S7-1200 CSRF Vulnerability
Cross-site request forgery (CSRF) vulnerability in the web server on Siemens SIMATIC S7-1200 CPU devices with firmware before 4.1.3 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
[]
null
null
null
null
GHSA-jr8p-xq33-3425
A vulnerability has been identified in SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10). Affected devices do not properly validate the parameter of a specific GET request. This could allow an authenticated attacker to set the device to a denial of service state or to control the program counter and, thus, execute arbitrary code on the device.
[]
null
8.8
null
null
GHSA-c58v-2pgr-h7q6
A vulnerability has been identified in SIMATIC ET 200SP Open Controller CPU 1515SP PC (All versions), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (All versions), SIMATIC S7-1200 CPU family (All versions >= V4.0), SIMATIC S7-1500 CPU family (All versions), SIMATIC S7-1500 Software Controller (All versions), SIMATIC S7-PLCSIM Advanced (All versions). An attacker with network access to port 102/tcp could potentially modify the user program on the PLC in a way that the running code is different from the source code which is stored on the device. An attacker must have network access to affected devices and must be able to perform changes to the user program. The vulnerability could impact the perceived integrity of the user program stored on the CPU. An engineer that tries to obtain the code of the user program running on the device, can receive different source code that is not actually running on the device. No public exploitation of the vulnerability was known at the time of advisory publication.
[]
null
7.5
null
null
GHSA-gg8p-p2xw-4wqr
Vulnerability in (1) diskperf and (2) diskalign in IRIX 6.4 allows local attacker to create arbitrary root owned files, leading to root privileges.
[]
null
null
null
null
CVE-2016-3138
The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_live_patching:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_module_for_public_cloud:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:11.0:sp4:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12.0:sp1:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:extra:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:sp1:*:*:*:*:*:*" ]
null
null
4.6
4.9
CVE-2017-1087
In FreeBSD 10.x before 10.4-STABLE, 10.4-RELEASE-p3, and 10.3-RELEASE-p24 named paths are globally scoped, meaning a process located in one jail can read and modify the content of POSIX shared memory objects created by a process in another jail or the host system. As a result, a malicious user that has access to a jailed system is able to abuse shared memory by injecting malicious content in the shared memory region. This memory region might be executed by applications trusting the shared memory, like Squid. This issue could lead to a Denial of Service or local privilege escalation.
[ "cpe:2.3:o:freebsd:freebsd:-:*:*:*:*:*:*:*" ]
null
null
7.8
4.6
GHSA-w65x-2cwr-hcvq
The rtrlet web application in the Web Console in Novell ZENworks Asset Management (ZAM) 7.5 uses a hard-coded username of Ivanhoe and a hard-coded password of Scott for the (1) GetFile_Password and (2) GetConfigInfo_Password operations, which allows remote attackers to obtain sensitive information via a crafted rtrlet/rtr request for the HandleMaintenanceCalls function.
[]
null
null
null
null
CVE-2021-32541
SysJust CTS Web - Broken Access Control
The CTS Web transaction system related to authentication and session management is implemented incorrectly, which allows remote unauthenticated attackers can send a large number of valid usernames, and force those logged-in account to log out, causing the user to be unable to access the services
[ "cpe:2.3:a:sysjust:cts_web:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
GHSA-53c4-fhgx-hg96
Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have an use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution .
[]
null
null
null
null
GHSA-2cpr-2355-gh3w
NVIDIA Virtual GPU Manager, all versions, contains a vulnerability in the vGPU plugin, in which an input index value is incorrectly validated, which may lead to denial of service.
[]
null
null
null
null
CVE-2025-2495
Stored Cross-Site Scripting (XSS) vulnerability in Softdial Contact Center
Stored Cross-Site Scripting (XSS) in Softdial Contact Center of Sytel Ltd. This vulnerability allows an attacker to upload XML files to the server with JavaScript code injected via the ‘/softdial/scheduler/save.php’ resource. The injected code will execute when the uploaded file is loaded via the ‘/softdial/scheduler/load.php’ resource and can redirect the victim to malicious sites or steal their login information to spoof their identity.
[]
5.3
null
null
null
CVE-2006-7077
SQL injection vulnerability in guestbook.php in Advanced Guestbook 2.4 for phpBB allows remote attackers to execute arbitrary SQl commands via the entry parameter.
[ "cpe:2.3:a:phpbb_group:phpbb_advanced_guestbook:2.4.0:*:*:*:*:*:*:*" ]
null
null
null
6.8