id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-53rm-g937-ghg8
MyBB Group MyBB contains a Incorrect Access Control vulnerability in Private forums that can result in Users can view posts from private forums without having the password. This attack appear to be exploitable via Subscribe to a forum through IDOR. This vulnerability appears to have been fixed in 1.8.15.
[]
null
null
4.3
null
CVE-2022-32119
Arox School ERP Pro v1.0 was discovered to contain multiple arbitrary file upload vulnerabilities via the Add Photo function at photogalleries.inc.php and the import staff excel function at 1finance_master.inc.php.
[ "cpe:2.3:a:arox:school_erp_pro:1.0:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-grc8-x66h-v68p
Cross-site scripting (XSS) vulnerability in the IP Manager Assistant (IPMA) interface in Cisco Unified Communications Manager (UCM) allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCum05343.
[]
null
null
null
null
CVE-2013-0001
The Windows Forms (aka WinForms) component in Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.0 SP2, 4, and 4.5 does not properly initialize memory arrays, which allows remote attackers to obtain sensitive information via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application that leverages a pointer to an unmanaged memory location, aka "System Drawing Information Disclosure Vulnerability."
[ "cpe:2.3:a:microsoft:.net_framework:1.0:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:sp3:media_center:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:sp3:tablet_pc:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:1.1:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8:-:-:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8:-:-:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.5:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2021-1236
Multiple Cisco Products Snort Application Detection Engine Policy Bypass Vulnerability
Multiple Cisco products are affected by a vulnerability in the Snort application detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. The vulnerability is due to a flaw in the detection algorithm. An attacker could exploit this vulnerability by sending crafted packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network.
[ "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:csr_1000v:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:isa_3000:-:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.14.14:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.15:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.16:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:2.9.17:*:*:*:*:*:*:*", "cpe:2.3:a:snort:snort:*:*:*:*:*:*:*:*" ]
null
null
4
null
CVE-2025-34065
AVTECH IP camera, DVR, and NVR Devices Authentication Bypass via /nobody URL Path
An authentication bypass vulnerability exists in AVTECH IP camera, DVR, and NVR devices’ streamd web server. The strstr() function allows unauthenticated access to any request containing "/nobody" in the URL, bypassing login controls.
[]
6.9
null
null
null
GHSA-r548-99qm-54qx
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Brainstorm Force Starter Templates allows Stored XSS.This issue affects Starter Templates: from n/a through 4.4.0.
[]
null
5.9
null
null
CVE-2025-20959
Use of implicit intent for sensitive communication in Wi-Fi P2P service prior to SMR May-2025 Release 1 allows local attackers to access sensitive information.
[]
null
5.1
null
null
GHSA-2h68-mcf3-8qvh
Cross-site scripting vulnerability in EC-CUBE Business form output plugin (for EC-CUBE 3.0 series) versions prior to version 1.0.1 allows a remote attacker to inject an arbitrary script via unspecified vector.
[]
null
null
null
null
CVE-2025-53032
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 9.0.0-9.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[]
null
4.9
null
null
GHSA-86hp-cj9j-33vv
Insertion of Sensitive Information into Log File, Invocation of Process Using Visible Sensitive Information, and Exposure of Sensitive Information to an Unauthorized Actor in Ansible
A security flaw was found in Ansible Engine, all Ansible 2.7.x versions prior to 2.7.17, all Ansible 2.8.x versions prior to 2.8.11 and all Ansible 2.9.x versions prior to 2.9.7, when managing kubernetes using the k8s module. Sensitive parameters such as passwords and tokens are passed to kubectl from the command line, not using an environment variable or an input configuration file. This will disclose passwords and tokens from process list and no_log directive from debug module would not have any effect making these secrets being disclosed on stdout and log files.
[]
6.8
5.5
null
null
GHSA-6rr7-wj8c-j9rh
The Recetas de Tragos (aka com.wRecetasdeTragos) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
CVE-2025-36056
IBM System Storage Virtualization Engine TS7700 cross-site scripting
IBM System Storage Virtualization Engine TS7700 3957 VED R5.4 8.54.2.17, R6.0 8.60.0.115, 3948 VED R5.4 8.54.2.17, R6.0 8.60.0.115, and 3948 VEF R6.0 8.60.0.115 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
[ "cpe:2.3:h:ibm:system_storage_virtualization_engine_ts7700:3948-vef:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_storage_virtualization_engine_ts7700:3948-ved:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_storage_virtualization_engine_ts7700:3957-ved:*:*:*:*:*:*:*" ]
null
5.4
null
null
GHSA-3fpr-96rf-fw9f
Cross-site scripting (XSS) vulnerability on Chiyu BF-630, BF-630W, and BF-660C fingerprint access-control devices allows remote attackers to inject arbitrary web script or HTML via a SCRIPT element.
[]
null
null
null
null
GHSA-347x-pmh7-x2qr
Multiple cross-site scripting (XSS) vulnerabilities in admin/login in X3 CMS 0.4.3.1 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) PATH_INFO, (2) username, or (3) password parameter.
[]
null
null
null
null
CVE-2018-20227
RDF4J 2.4.2 allows Directory Traversal via ../ in an entry in a ZIP archive.
[ "cpe:2.3:a:eclipse:rdf4j:*:*:*:*:*:*:*:*" ]
null
7.5
null
6.4
GHSA-f3cv-m522-fjxc
The path of Whale update service was unquoted in NAVER Whale before 1.0.40.7. This vulnerability can be used for persistent privilege escalation if it's available to create an executable file with System privilege by other vulnerable applications.
[]
null
null
8.1
null
GHSA-h6h4-hwj4-6rv9
A privilege escalation vulnerability exists in the router configuration import functionality of InHand Networks InRouter302 V3.5.4. A specially-crafted HTTP request can lead to increased privileges. An attacker can send an HTTP request to trigger this vulnerability.
[]
null
8.8
null
null
RHSA-2024:2979
Red Hat Security Advisory: poppler security update
poppler: NULL pointer dereference in `FoFiType1C::convertToType1`
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5.5
null
null
CVE-2020-13600
Malformed SPI in response for eswifi can corrupt kernel memory
Malformed SPI in response for eswifi can corrupt kernel memory. Zephyr versions >= 1.14.2, >= 2.3.0 contain Heap-based Buffer Overflow (CWE-122). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hx4p-j86p-2mhr
[ "cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*" ]
null
7
null
null
CVE-2023-42331
A file upload vulnerability in EliteCMS v1.01 allows a remote attacker to execute arbitrary code via the manage_uploads.php component.
[ "cpe:2.3:a:elitecms:elite_cms:1.01:*:*:*:-:*:*:*" ]
null
8.8
null
null
CVE-2014-6131
IBM Rational Jazz Team Server (JTS), as used in Rational Collaborative Lifecycle Management 3.x and 4.x before 4.0.7 iFix4 and 5.x before 5.0.2 iFix2; Rational Quality Manager 2.x and 3.x before 3.0.1.6 iFix5, 4.x before 4.0.7 iFix4, and 5.x before 5.0.2 iFix2; Rational Team Concert 2.x and 3.x before 3.0.1.6 iFix5, 4.x before 4.0.7 iFix4, and 5.x before 5.0.2 iFix2; Rational DOORS Next Generation 4.x before 4.0.7 iFix4 and 5.x before 5.0.2 iFix2; Rational Requirements Composer 2.x and 3.x before 3.0.1.6 iFix5; and other products, allows remote authenticated users to read the dashboards of arbitrary users via unspecified vectors.
[ "cpe:2.3:a:ibm:rational_doors_next_generation:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_requirements_composer:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_requirements_composer:2.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_requirements_composer:2.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_requirements_composer:2.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_requirements_composer:2.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_requirements_composer:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_requirements_composer:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_requirements_composer:3.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_requirements_composer:3.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_requirements_composer:3.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_requirements_composer:3.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_requirements_composer:3.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_requirements_composer:3.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:3.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:3.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:3.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:3.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:3.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:3.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:2.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:2.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:3.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:3.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:3.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:3.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:3.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:3.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:4.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:4.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:2.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:2.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:2.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:3.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:3.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:3.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:3.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:3.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:3.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:5.0.2:*:*:*:*:*:*:*" ]
null
null
null
4
GHSA-q4v7-4rhw-9hqm
Code Execution through IIFE in node-serialize
Affected versions of `node-serialize` can be abused to execute arbitrary code via an [immediately invoked function expression](https://en.wikipedia.org/wiki/Immediately-invoked_function_expression) (IIFE) if untrusted user input is passed into `unserialize()`.RecommendationThere is no direct patch for this issue. The package author has reviewed this advisory, and provided the following recommendation:
[]
null
9.8
null
null
CVE-2022-4141
Heap-based Buffer Overflow in vim/vim
Heap based buffer overflow in vim/vim 9.0.0946 and below by allowing an attacker to CTRL-W gf in the expression used in the RHS of the substitute command.
[ "cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*" ]
null
null
7.3
null
GHSA-jx5w-px6r-88w4
When a parent page loaded a child in an iframe with `unsafe-inline`, the parent Content Security Policy could have overridden the child Content Security Policy. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.
[]
null
6.5
null
null
CVE-2024-11600
Borderless – Widgets, Elements, Templates and Toolkit for Elementor & Gutenberg <= 1.5.9 - Authenticated (Administrator+) Remote Code Execution
The Borderless – Widgets, Elements, Templates and Toolkit for Elementor & Gutenberg plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.5.9 via the 'write_config' function. This is due to a lack of sanitization on an imported JSON file. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server.
[]
null
7.2
null
null
CVE-2021-40392
An information disclosure vulnerability exists in the Web Application functionality of Moxa MXView Series 3.2.4. Network sniffing can lead to a disclosure of sensitive information. An attacker can sniff network traffic to exploit this vulnerability.
[ "cpe:2.3:a:moxa:mxview:3.2.4:*:*:*:*:*:*:*" ]
null
null
5.3
null
CVE-2020-27284
TPEditor (v1.98 and prior) is vulnerable to two out-of-bounds write instances in the way it processes project files, allowing an attacker to craft a special project file that may permit arbitrary code execution.
[ "cpe:2.3:a:deltaww:tpeditor:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
GHSA-qfq4-hgm7-w9m6
Multiple cross-site scripting (XSS) vulnerabilities in FortiWeb before 4.4.4 allow remote attackers to inject arbitrary web script or HTML via the (1) redir or (2) mkey parameter to waf/pcre_expression/validate.
[]
null
null
6.1
null
CVE-2015-5167
The Policy Admin Tool in Apache Ranger before 0.5.1 allows remote authenticated users to bypass intended access restrictions via the REST API.
[ "cpe:2.3:a:apache:ranger:*:*:*:*:*:*:*:*" ]
null
null
6.5
4
GHSA-4qv6-37xq-mgq2
Concrete CMS Cross-site Scripting vulnerability
Multiple Cross Site Scripting (XSS) vulnerabilities in Concrete CMS v.9.2.1 allow an attacker to execute arbitrary code via a crafted script to the Header and Footer Tracking Codes of the SEO & Statistics.
[]
null
5.4
null
null
GHSA-mcm8-xf94-x8qf
WebCalendar before 1.0.0 does not properly restrict access to assistant_edit.php, which allows remote attackers to gain privileges.
[]
null
null
null
null
CVE-2022-38279
JFinal CMS 5.1.0 is vulnerable to SQL Injection via /admin/imagealbum/list.
[ "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*" ]
null
7.2
null
null
GHSA-c489-5g62-xg74
The rose_rt_ioctl function in rose_route.c for Radionet Open Source Environment (ROSE) in Linux 2.6 kernels before 2.6.12, and 2.4 before 2.4.29, does not properly verify the ndigis argument for a new route, which allows attackers to trigger array out-of-bounds errors with a large number of digipeats.
[]
null
null
null
null
GHSA-rf9c-wvjw-39jq
Some Honor products are affected by out of bounds read vulnerability, successful exploitation could cause information leak.
[]
null
3.2
null
null
GHSA-w3pw-qxjj-6prr
Plone Authenticated Denial of Service vulnerability
traverser.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allows remote attackers with administrator privileges to cause a denial of service (infinite loop and resource consumption) via unspecified vectors related to "retrieving information for certain resources."
[]
5.9
4.4
null
null
CVE-2005-2615
Unknown vulnerability in session.php in EQdkp before 1.3.0 has unknown impact and attack vectors, possibly involving auto_login_id.
[ "cpe:2.3:a:eqdkp:eqdkp:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:eqdkp:eqdkp:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:eqdkp:eqdkp:1.2.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-mqwf-p679-m69g
A vulnerability, which was classified as problematic, was found in Dreamer CMS 4.1.3. Affected is an unknown function of the file /admin/menu/toEdit. The manipulation of the argument id leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-256314 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
null
4.3
null
null
GHSA-3vmw-cgj4-4fqj
Multiple SQL injections exist in SugarCRM Community Edition 6.5.26 and below via the track parameter to modules\Campaigns\Tracker.php and modules\Campaigns\utils.php, the default_currency_name parameter to modules\Configurator\controller.php and modules\Currencies\Currency.php, the duplicate parameter to modules\Contacts\ShowDuplicates.php, the mergecur parameter to modules\Currencies\index.php and modules\Opportunities\Opportunity.php, and the load_signed_id parameter to modules\Documents\Document.php.
[]
null
null
9.8
null
CVE-2021-39975
Hilinksvc has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause denial of service attacks.
[ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-chff-pqgh-rg4m
BabyGekko before 1.2.4 allows PHP file inclusion.
[]
null
null
null
null
GHSA-j39p-g3jw-98vv
An issue was discovered in gpac 0.8.0. The strdup function in box_code_base.c has a heap-based buffer over-read.
[]
null
7.5
null
null
CVE-2016-0616
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
[ "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.0.22:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
null
null
null
4
CVE-2012-3504
The nssconfigFound function in genkey.pl in crypto-utils 2.4.1-34 allows local users to overwrite arbitrary files via a symlink attack on the "list" file in the current working directory.
[ "cpe:2.3:a:fedoraproject:crypto-utils:2.4.1-34:*:*:*:*:*:*:*" ]
null
null
null
3.6
GHSA-628g-c62g-r2j2
Multiple stack-based buffer overflows in Trend Micro ServerProtect 5.58 before Security Patch 2 Build 1174 allow remote attackers to execute arbitrary code via crafted data to (1) TCP port 5168, which triggers an overflow in the CAgRpcClient::CreateBinding function in the AgRpcCln.dll library in SpntSvc.exe; or (2) TCP port 3628, which triggers an overflow in EarthAgent.exe. NOTE: both issues are reachable via TmRpcSrv.dll.
[]
null
null
null
null
GHSA-92hc-h32v-823w
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.1.24. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H).
[]
null
null
7.3
null
cisco-sa-spaces-conn-privesc-kgD2CcDU
Cisco Spaces Connector Privilege Escalation Vulnerability
A vulnerability in Cisco Spaces Connector could allow an authenticated, local attacker to elevate privileges and execute arbitrary commands on the underlying operating system as root. This vulnerability is due to insufficient restrictions during the execution of specific CLI commands. An attacker could exploit this vulnerability by logging in to the Cisco Spaces Connector CLI as the spacesadmin user and executing a specific command with crafted parameters. A successful exploit could allow the attacker to elevate privileges from the spacesadmin user and execute arbitrary commands on the underlying operating system as root. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
6
null
null
GHSA-mpg6-g4hw-2942
Multiple buffer overflows in Autodesk Design Review (ADR) before 2013 Hotfix 2 allow remote attackers to execute arbitrary code via crafted RLE data in a (1) BMP or (2) FLI file, (3) encoded scan lines in a PCX file, or (4) DataSubBlock or (5) GlobalColorTable in a GIF file.
[]
null
null
null
null
CVE-2020-24661
GNOME Geary before 3.36.3 mishandles pinned TLS certificate verification for IMAP and SMTP services using invalid TLS certificates (e.g., self-signed certificates) when the client system is not configured to use a system-provided PKCS#11 store. This allows a meddler in the middle to present a different invalid certificate to intercept incoming and outgoing mail.
[ "cpe:2.3:a:gnome:geary:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*" ]
null
5.9
null
2.6
CVE-2015-8538
dwarf_leb.c in libdwarf allows attackers to cause a denial of service (SIGSEGV).
[ "cpe:2.3:a:libdwarf_project:libdwarf:*:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
GHSA-3h4f-jgvh-wjvm
src/condor_schedd.V6/schedd.cpp in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 does not properly check the permissions of jobs, which allows remote authenticated users to remove arbitrary idle jobs via unspecified vectors.
[]
null
null
null
null
CVE-2023-47674
Missing authentication for critical function vulnerability in First Corporation's DVRs allows a remote unauthenticated attacker to rewrite or obtain the configuration information of the affected device. Note that updates are provided only for Late model of CFR-4EABC, CFR-4EAB, CFR-8EAB, CFR-16EAB, MD-404AB, and MD-808AB. As for the other products, apply the workaround.
[ "cpe:2.3:o:c-first:cfr-1004ea_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-1004ea:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-1008ea_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-1008ea:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-1016ea_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-1016ea:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-16eaa_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-16eaa:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-16eab_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-16eab:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-16eha_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-16eha:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-16ehd_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-16ehd:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-4eaa_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-4eaa:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-4eaam_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-4eaam:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-4eab_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-4eab:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-4eabc_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-4eabc:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-4eha_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-4eha:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-4ehd_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-4ehd:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-8eaa_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-8eaa:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-8eab_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-8eab:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-8eha_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-8eha:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-8ehd_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-8ehd:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-904e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-904e:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-908e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-908e:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-916e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-916e:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:md-404aa_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:md-404aa:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:md-404ab_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:md-404ab:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:md-404ha_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:md-404ha:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:md-404hd_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:md-404hd:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:md-808aa_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:md-808aa:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:md-808ab_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:md-808ab:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:md-808ha_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:md-808ha:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:md-808hd_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:md-808hd:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-2ggv-947x-gfhx
Merak Mail Server 8.0.3 with Icewarp Web Mail 5.4.2, when the mailbox.dat file does not exist, allows remote authenticated users to determine if a file exists via the folder parameter to attachment.html.
[]
null
null
null
null
GHSA-wwfq-8rhw-p2m7
A denial of service vulnerability exists in Remote Desktop Protocol (RDP) when an attacker connects to the target system using RDP and sends specially crafted requests, aka 'Windows Remote Desktop Protocol (RDP) Denial of Service Vulnerability'.
[]
null
null
null
null
GHSA-q3r6-wj52-xqg8
Improper conditions check in some Intel(R) Ethernet Controllers 800 series Linux drivers before version 1.4.11 may allow an authenticated user to potentially enable information disclosure or denial of service via local access.
[]
null
null
null
null
CVE-2008-0389
Unspecified vulnerability in the serveServletsByClassnameEnabled feature in IBM WebSphere Application Server (WAS) 6.0 through 6.0.2.25, 6.1 through 6.1.0.14, and 5.1.1.x before 5.1.1.18 has unknown impact and attack vectors.
[ "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:fp17:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.0.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.0.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.0.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.0.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.0.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.0.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.0.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.0.2.19:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.0.2.22:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.0.2.23:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.0.2.24:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.0.2.25:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.14:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-cj78-6w9j-286h
Firejail before 0.9.44.4, when running on a Linux kernel before 4.8, allows context-dependent attackers to bypass a seccomp-based sandbox protection mechanism via the --allow-debuggers argument.
[]
null
null
9
null
GHSA-w8m5-v6rc-xwx3
TP-Link SG105PE firmware prior to 'TL-SG105PE(UN) 1.0_1.0.0 Build 20221208' contains an authentication bypass vulnerability. Under the certain conditions, an attacker may impersonate an administrator of the product. As a result, information may be obtained and/or the product's settings may be altered with the privilege of the administrator.
[]
null
9.8
null
null
GHSA-4v5c-v752-353r
User provided input is not sanitized on the AXIS License Plate Verifier specific “api.cgi” allowing for arbitrary code execution.
[]
null
7.2
null
null
CVE-2023-49156
WordPress GoDaddy Email Marketing plugin <= 1.4.3 - Broken Access Control vulnerability
Missing Authorization vulnerability in GoDaddy GoDaddy Email Marketing allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects GoDaddy Email Marketing: from n/a through 1.4.3.
[]
null
4.3
null
null
GHSA-2c4q-25x9-p644
Zoho ManageEngine ServiceDesk Plus MSP before 10521 allows an attacker to access internal data.
[]
null
7.5
null
null
GHSA-fxw5-28xr-82fm
wp-login.php in WordPress 2.8.3 and earlier allows remote attackers to force a password reset for the first user in the database, possibly the administrator, via a key[] array variable in a resetpass (aka rp) action, which bypasses a check that assumes that $key is not an array.
[]
null
null
null
null
GHSA-8255-qf34-44mp
Sensitive Cookie Without HttpOnly and Secure Flag
Mautic prior to 2.1.1 fails to set flags on session cookies
[]
null
null
7.5
null
CVE-2007-4627
SQL injection vulnerability in index.php in ABC eStore 3.0 allows remote attackers to execute arbitrary SQL commands via the cat_id parameter.
[ "cpe:2.3:a:algera:abc_estore:3.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
RHSA-2020:1577
Red Hat Security Advisory: exiv2 security, bug fix, and enhancement update
exiv2: null pointer dereference in the Exiv2::DataValue::toLong function in value.cpp exiv2: Excessive memory allocation in Exiv2::Jp2Image::readMetadata function in jp2image.cpp exiv2: assertion failure in BigTiffImage::readData in bigtiffimage.cpp exiv2: divide by zero in BigTiffImage::printIFD in bigtiffimage.cpp exiv2: out of bounds read in IptcData::printStructure in iptc.c exiv2: out of bounds read in IptcData::printStructure in iptc.c exiv2: OOB read in pngimage.cpp:tEXtToDataBuf() allows for crash via crafted file exiv2: information leak via a crafted file exiv2: buffer overflow in samples/geotag.cpp exiv2: heap-based buffer overflow in Exiv2::d2Data in types.cpp exiv2: heap-based buffer overflow in Exiv2::ul2Data in types.cpp exiv2: NULL pointer dereference in Exiv2::DataValue::copy in value.cpp leading to application crash exiv2: Stack overflow in CiffDirectory::readDirectory() at crwimage_int.cpp leading to denial of service exiv2: infinite loop in Exiv2::Image::printIFDStructure function in image.cpp exiv2: heap-based buffer over-read in Exiv2::IptcParser::decode in iptc.cpp exiv2: infinite loop in Exiv2::PsdImage::readMetadata in psdimage.cpp exiv2: heap-based buffer over-read in PngChunk::readRawProfile in pngchunk_int.cpp exiv2: NULL pointer dereference in Exiv2::isoSpeed in easyaccess.cpp exiv2: Heap-based buffer over-read in Exiv2::tEXtToDataBuf function resulting in a denial of service exiv2: Segmentation fault in Exiv2::Internal::TiffParserWorker::findPrimaryGroups function exiv2: Heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service exiv2: Infinite loop in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service exiv2: infinite recursion in Exiv2::Image::printTiffStructure in file image.cpp resulting in denial of service exiv2: denial of service in PngImage::readMetadata exiv2: integer overflow in WebPImage::decodeChunks leads to denial of service exiv2: uncontrolled memory allocation in PngChunk::parseChunkContent causing denial of service exiv2: invalid data location in CRW image file causing denial of service exiv2: null-pointer dereference in http.c causing denial of service exiv2: infinite loop and hang in Jp2Image::readMetadata() in jp2image.cpp could lead to DoS
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.5
5.5
null
GHSA-7hq5-3x9w-x86w
"HCL iNotes is susceptible to a Cross-Site Scripting (XSS) Vulnerability. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials."
[]
null
null
null
null
GHSA-cr6g-jxw7-2xjq
The ShellExecute API in Windows Shell in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly implement file associations, which allows local users to gain privileges via a crafted application, as exploited in the wild in May 2014, aka "Windows Shell File Association Vulnerability."
[]
null
null
null
null
GHSA-9ch3-rm27-g282
Multiple cross-site scripting (XSS) vulnerabilities in paFAQ 1.0 Beta 4 allow remote attackers to inject arbitrary web script or HTML, as demonstrated via the id parameter in a Question action.
[]
null
null
null
null
CVE-2024-37632
TOTOLINK A3700R V9.1.2u.6165_20211012 was discovered to contain a stack overflow via the password parameter in function loginAuth .
[ "cpe:2.3:o:totolink:a3700r_firmware:9.1.2u.6165_20211012:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:a3700r:-:*:*:*:*:*:*:*" ]
null
6.5
null
null
CVE-2017-3871
A RADIUS Secret Disclosure vulnerability in the web network management interface of Cisco Prime Optical for Service Providers could allow an authenticated, remote attacker to disclose sensitive information in the configuration generated for a device. The attacker must have valid credentials for the device. More Information: CSCvc65257. Known Affected Releases: 10.6(0.1).
[ "cpe:2.3:a:cisco:prime_optical:10.6\\(0.1\\):*:*:*:*:*:*:*" ]
null
null
4.3
4
GHSA-6x8x-xqhg-j3hx
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AttesaWP Attesa Extra allows Stored XSS.This issue affects Attesa Extra: from n/a through 1.3.9.
[]
null
6.5
null
null
GHSA-vhx2-58f3-9f8j
Directory traversal vulnerability in IncrediMail version 1400185 and earlier allows local users to overwrite files on the local hard drive by appending .. (dot dot) sequences to filenames listed in the content.ini file.
[]
null
null
null
null
CVE-2006-6239
webadmin in MailEnable NetWebAdmin Professional 2.32 and Enterprise 2.32 allows remote attackers to authenticate using an empty password.
[ "cpe:2.3:a:mailenable:netwebadmin_enterprise:2.32:*:*:*:*:*:*:*", "cpe:2.3:a:mailenable:netwebadmin_professional:2.32:*:*:*:*:*:*:*" ]
null
null
null
7.5
RHSA-2021:2988
Red Hat Security Advisory: varnish:6 security update
varnish: HTTP/2 request smuggling attack via a large Content-Length header for a POST request
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:rhel_eus:8.1::appstream", "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.1
null
null
GHSA-cqg6-gpxx-hq82
A vulnerability has been found in osuuu LightPicture 1.2.2 and classified as critical. This vulnerability affects the function upload of the file /app/controller/Api.php. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
null
null
GHSA-v9m5-9vg5-h8w2
Vino, possibly before 3.2, does not properly document that it opens ports in UPnP routers when the "Configure network to automatically accept connections" setting is enabled, which might make it easier for remote attackers to perform further attacks.
[]
null
null
null
null
RHSA-2007:0244
Red Hat Security Advisory: busybox security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
GHSA-mrq6-622v-vmqp
Cross-Site Scripting (XSS) vulnerability exists in the User Registration and User Profile features of Codeastro Bus Ticket Booking System v1.0 allows an attacker to execute arbitrary code into the Full Name and Address fields during user registration or profile editing.
[]
null
5
null
null
GHSA-rmqj-585g-98v7
Cisco IOS XR 3.8.1 through 4.2.0 does not properly process fragmented packets within the RP-A, RP-B, PRP, and DRP-B route-processor components, which allows remote attackers to cause a denial of service (transmission outage) via (1) IPv4 or (2) IPv6 traffic, aka Bug ID CSCuh30380.
[]
null
null
null
null
RHSA-2013:0944
Red Hat Security Advisory: python-keystoneclient security and bug fix update
Keystone: Missing expiration check in Keystone PKI token validation
[ "cpe:/a:redhat:openstack:3::el6" ]
null
null
null
null
GHSA-9vp2-wg6r-vp74
SQL injection vulnerability in category.asp in A-CART Pro and A-CART 2.0 allows remote attackers to gain privileges via the catcode parameter.
[]
null
null
null
null
GHSA-3m2r-q8x3-xmf7
Moderate severity vulnerability that affects Microsoft.AspNetCore.All, Microsoft.AspNetCore.Server.Kestrel.Core, Microsoft.AspNetCore.Server.Kestrel.Transport.Abstractions, and Microsoft.AspNetCore.Server.Kestrel.Transport.Libuv
Microsoft made an internal discovery of a security vulnerability in version 2.x of ASP.NET Core where a specially crafted request can cause excess resource consumption in Kestrel.
[]
null
null
null
null
CVE-2022-40137
A buffer overflow in the WMI SMI Handler in some Lenovo models may allow an attacker with local access and elevated privileges to execute arbitrary code.
[ "cpe:2.3:o:lenovo:ideacentre_c5-14imb05_firmware:o4hkt3aa:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_c5-14imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_e96z_firmware:m26kt24a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_e96z:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_3_07iab7_firmware:m49kt1da:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_3_07iab7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_3-07imb05_firmware:m2vkt1fa:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_3-07imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_5_14iab7_firmware:m42kt40a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_5_14iab7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_5-14acn6_firmware:o5ekt23a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_5-14acn6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_5-14imb05_firmware:o4hkt3aa:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_5-14imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_5-14iob6_firmware:m3gkt38a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_5-14iob6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-22ada6_firmware:o5ckt24a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-22ada6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-22iil5_firmware:o56kt22a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-22iil5:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-22itl6_firmware:o5akt31a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-22itl6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-24ada6_firmware:o5ckt24a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-24ada6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-24alc6_firmware:o5bkt24a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-24alc6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-24iil5_firmware:o56kt22a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-24iil5:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-24itl6_firmware:o5akt31a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-24itl6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-27alc6_firmware:o5bkt24a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-27alc6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-27itl6_firmware:o5akt31a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-27itl6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_g5-14imb05_firmware:o4hkt3aa:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_g5-14imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_gaming_5_17acn7_firmware:o5ekt23a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_gaming_5_17acn7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_gaming_5_17iab7_firmware:m42kt40a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_gaming_5_17iab7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_gaming_5-14acn6_firmware:o5ekt23a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_gaming_5-14acn6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_gaming_5-14iob6_firmware:m3gkt38a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_gaming_5-14iob6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_mini_5-01imh05_firmware:o4ekt17a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_mini_5-01imh05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_c530-19icb_firmware:o4bkt21a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_c530-19icb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_t5-26iob6_firmware:o54kt20a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_t5-26iob6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_t5-28icb05_firmware:o4bkt21a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_t5-28icb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_t530-28apr_firmware:o4gkt17a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_t530-28apr:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_t530-28icb_firmware:o4bkt21a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_t530-28icb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_t7-34imz5_firmware:o4lkt1fa:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_t7-34imz5:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_t7-34imz5_firmware:o5fkt14a:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m60e_tiny_firmware:m3skt21a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m60e_tiny:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m625q_firmware:m1wkt46a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m625q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m630e_firmware:m28kt39a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m630e:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m700_tiny_firmware:fwktbfa:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m700_tiny:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m70a_firmware:m2skt26a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m70a:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m70a_gen_2_firmware:m3nkt21a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m70a_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m70a_gen_3_firmware:m4ekt18a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m70a_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m70c_firmware:m2vkt1fa:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m70c:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m70q_firmware:m2wkt55a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m70q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m70q_gen_2_firmware:m3jkt35a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m70q_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m70q_gen_3_firmware:m43kt16a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m70q_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m70s_firmware:m2tkt50a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m70s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m70s_gen_3_firmware:m41kt2da:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m70s_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m70t_firmware:m2tkt50a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m70t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m70t_gen_3_firmware:m41kt2da:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m70t_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m710e_firmware:m1zkt39a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m710e:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m710q_firmware:m1akt56a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m710q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m710s_firmware:m16kt69a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m710s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m710t_firmware:m16kt69a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m710t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m715q_2nd_gen_firmware:m1xkt58a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m715q_2nd_gen:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m715q_firmware:m11kt55a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m715q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m715s_firmware:m2ckt4da:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m715s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m715t_firmware:m2ckt4da:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m715t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m720e_firmware:m30kt27a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m720e:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m720q_firmware:m1ukt6ba:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m720q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m720s_firmware:m1ukt6ba:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m720s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m720t_firmware:m1ukt6ba:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m720t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m725s_firmware:m25kt61a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m725s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m75n_firmware:m33kt26a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m75n:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m75q_gen_2_firmware:m47kt24a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m75q_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m75q-1_firmware:m2fkt2ea:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m75q-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m75s_gen_2_firmware:m3akt44a:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m75s_gen_2_firmware:m3bkt2aa:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m75s_gen_2_firmware:m46kt2ba:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m75s_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m75s-1_firmware:m2ckt4da:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m75s-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m75t_gen_2_firmware:m3akt44a:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m75t_gen_2_firmware:m3bkt2aa:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m75t_gen_2_firmware:m46kt2ba:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m75t_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m800_firmware:fwktbfa:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m800:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m80q_firmware:m2wkt55a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m80q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m80q_gen_3_firmware:m4gkt1da:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m80q_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m80s_firmware:m2tkt50a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m80s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m80s_gen_3_firmware:m40kt2da:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m80s_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m80t_firmware:m2tkt50a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m80t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m80t_gen_3_firmware:m40kt2da:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m80t_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m810z_all-in-one_firmware:m1ckt50a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m810z_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m818z_firmware:m1ekt27a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m818z:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m820z_all-in-one_firmware:m1nkt59a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m820z_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m900_firmware:fwktbfa:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m900:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m900x_firmware:fwktbfa:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m900x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m90a_firmware:m2rkt55a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m90a:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m90a_gen_2_firmware:m3lkt26a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m90a_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m90a_gen_3_firmware:m4ikt17a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m90a_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m90q_gen_2_firmware:m3jkt35a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m90q_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m90q_gen_3_firmware:m4gkt1da:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m90q_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m90q_tiny_firmware:m2wkt55a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m90q_tiny:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m90s_firmware:m2tkt50a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m90s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m90s_gen_3_firmware:m40kt2da:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m90s_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m90t_firmware:m2tkt50a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m90t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m90t_gen_3_firmware:m40kt2da:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m90t_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m910q_firmware:m1akt56a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m910q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m910s_firmware:m1akt56a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m910s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m910t_firmware:m1akt56a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m910t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m910x_firmware:m1akt56a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m910x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m920q_firmware:m1ukt6ba:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m920q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m920s_firmware:m1ukt6ba:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m920s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m920t_firmware:m1ukt6ba:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m920t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_m920x_firmware:m1ukt6ba:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_m920x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_neo_50s_gen_3_firmware:m49kt1da:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_neo_50s_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_neo_50t_gen_3_firmware:m42kt40a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_neo_50t_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_neo_70t_gen_3_firmware:m40kt2da:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_neo_70t_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:qitian_a815_firmware:m1rkt39a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:qitian_a815:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:qt_m410_firmware:m16kt69a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:qt_m410:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:qt_b415_firmware:m16kt69a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:qt_b415:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:qt_m415_firmware:m16kt69a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:qt_m415:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_t540-15ama_g_firmware:m2ckt4da:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_t540-15ama_g:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_t540-15ick_firmware:o4kkt16a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_t540-15ick:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_e75t_firmware:m16kt69a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_e75t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_e75s_firmware:m16kt69a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_e75s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m610_firmware:m1akt56a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m610:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m6600q_firmware:fwktc0a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m6600q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m6600t_firmware:fwktc0a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m6600t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m6600s_firmware:fwktc0a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m6600s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m700q_firmware:fwktc0a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m700q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m8600t_firmware:fwktc0a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m8600t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m8600s_firmware:fwktc0a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m8600s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_3-07ada05_firmware:o4fkt33a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_3-07ada05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_5-14are05_firmware:o4zkt29a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_5-14are05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-22ada05_firmware:o4tkt29a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-22ada05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-22imb05_firmware:o4rkt3a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-22imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-24are05_firmware:o4skt28a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-24are05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-24imb05_firmware:o4rkt3a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-24imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-27imb05_firmware:o4rkt3a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-27imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_g5-14amr05_firmware:o4zkt29a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_g5-14amr05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_510-15ick_firmware:o4kkt16a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_510-15ick:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_510a-15arr_firmware:o4dkt44a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_510a-15arr:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_510a-15ick_firmware:o4kkt16a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_510a-15ick:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_510s-07icb_firmware:m22kt48a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_510s-07icb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_510s-07ick_firmware:m30kt27a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_510s-07ick:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_720-18apr_firmware:m25kt61a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_720-18apr:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_a340-22ast_all-in-one_firmware:o4ckt23a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_a340-22ast_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_a340-22icb_all-in-one_firmware:o44kt32a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_a340-22icb_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_a340-22ick_all-in-one_firmware:o4pkt15a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_a340-22ick_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_a340-22igm_all-in-one_firmware:o51kt12a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_a340-22igm_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_a340-22iwl_all-in-one_firmware:o46kt36a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_a340-22iwl_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_a340-24icb_all-in-one_firmware:o44kt32a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_a340-24icb_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_a340-24ick_all-in-one_firmware:o4pkt15a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_a340-24ick_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_a340-24igm_all-in-one_firmware:o51kt12a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_a340-24igm_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_a340-24iwl_all-in-one_firmware:o46kt36a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_a340-24iwl_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v30a-22iml_firmware:m37kt29a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v30a-22iml:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v30a-24iml_firmware:m37kt29a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v30a-24iml:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v330-20icb_all-in-one_firmware:m1qkt49a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v330-20icb_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v35s-07ada_firmware:o4fkt33a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v35s-07ada:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v50a-22imb_firmware:m36kt31a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v50a-22imb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v50a-24imb_firmware:m36kt31a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v50a-24imb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v50s-07imb_firmware:m2vkt1fa:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v50s-07imb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v50t-13imb_firmware:o4hkt3aa:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v50t-13imb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v50t-13iob_g2_firmware:m3gkt38a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v50t-13iob_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v520_firmware:m16kt69a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v520:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v520s_firmware:m16kt69a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v520s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v530-15arr_firmware:o4dkt44a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v530-15arr:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v530-15icb_firmware:m1ykt72a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v530-15icb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v530-15icr_firmware:m2ykt33a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v530-15icr:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v530-22icb_all-in-one_firmware:m20kt53a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v530-22icb_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v530-24icb_all-in-one_firmware:m20kt53a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v530-24icb_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v530s-07icb_firmware:m22kt48a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v530s-07icb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v530s-07icr_firmware:m30kt27a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v530s-07icr:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v540-24iwl_all-in-one_firmware:m29kt40a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v540-24iwl_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v55t_gen_2_13acn_firmware:o5jkt20a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v55t_gen_2_13acn:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v55t-15api_firmware:o4dkt44a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v55t-15api:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v55t-15are_firmware:o52kt23a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v55t-15are:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yangtian_afq150_firmware:fwktc0a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yangtian_afq150:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yta8900f_firmware:fwktc0a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yta8900f:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_a940-27icb_all-in-one_firmware:o43kt43a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_a940-27icb_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_hr610x_firmware:hr6n0661:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_hr610x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_hr630x_firmware:hr6n0661:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_hr630x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_hr650x_firmware:hr6n0661:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_hr650x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkserver_rd350g_firmware:vb3ts891:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkserver_rd350g:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkedge_se30_firmware:m3fkt29a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkedge_se30:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksmart_core_\\&_controller_full_room_kit\\:_microsoft_teams_rooms_firmware:m4ckt14a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksmart_core_\\&_controller_full_room_kit\\:_microsoft_teams_rooms:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksmart_core_\\&_controller_full_room_kit\\:_zoom_rooms_firmware:m4ckt14a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksmart_core_\\&_controller_full_room_kit\\:_zoom_rooms:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksmart_core_\\&_controller_kit\\:_microsoft_teams_rooms_firmware:m4ckt14a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksmart_core_\\&_controller_kit\\:_microsoft_teams_rooms:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksmart_core_\\&_controller_kit\\:_zoom_rooms_firmware:m4ckt14a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksmart_core_\\&_controller_kit\\:_zoom_rooms:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksmart_core_device_for_logitech_firmware:m4ckt14a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksmart_core_device_for_logitech:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksmart_core_device_for_poly_firmware:m4ckt14a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksmart_core_device_for_poly:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksmart_core_device\\:_zoom_rooms_firmware:m4ckt14a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksmart_core_device\\:_zoom_rooms:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksmart_hub_teams_firmware:m2xkt20a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksmart_hub_teams:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksmart_hub_zoom_firmware:m2xkt20a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksmart_hub_zoom:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksmart_hub_500_firmware:m23kt31a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksmart_hub_500:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_dx1100u_firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_dx1100u:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_dx8200d_firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_dx8200d:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:n3310_storage_firmware:5.05.0:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:n3310_storage:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:n4610_storage_firmware:5.05.0:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:n4610_storage:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx5530_firmware:afe118m:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx5530:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx3331_firmware:afe118m:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx3331:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx1021_edg_firmware:hye122f:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx1021_edg:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx1320_firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx1320:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx1321_firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx1321:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx1331_firmware:afe118m:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx1331:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx1520-r_firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx1520-r:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx1521-r_firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx1521-r:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx2320_firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx2320:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx2320-e_firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx2320-e:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx2321_firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx2321:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx2330_firmware:afe118m:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx2330:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx2331_firmware:afe118m:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx2331:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx2720-e_firmware:tee178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx2720-e:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3320_firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx3320:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3321_firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx3321:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3330_firmware:afe118m:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx3330:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3331_firmware:afe118m:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx3331:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3375_firmware:d8e128f:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx3375:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3376_firmware:d8e128f:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx3376:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3520-g_firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx3520-g:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3521-g_firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx3521-g:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3720_firmware:tee178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx3720:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3721_firmware:tee178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx3721:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx5520_firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx5520:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx5520-c_firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx5520-c:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx5521_firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx5521:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx5521-c_firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx5521-c:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx5531_firmware:afe118m:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx5531:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx7520_firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx7520:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx7521_firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx7521:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx7530_firmware:afe118m:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx7530:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx7531_firmware:afe118m:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx7531:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx7820_firmware:pse144n:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx7820:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx7821_firmware:pse144n:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx7821:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx_1u_-_mx3321_f__firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx_1u_-_mx3321_f_:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx_1u_-_mx3321_h__firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx_1u_-_mx3321_h_:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx_edge-_mx1020__firmware:hye122f:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx_edge-_mx1020_:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3330-f_all-flash_firmware:afe118m:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3330-f_all-flash:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3330-h_hybrid_firmware:afe118m:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3330-h_hybrid:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3331-f_all-flash_firmware:afe118m:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3331-f_all-flash:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3331-h_hybrid_firmware:afe118m:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3331-h_hybrid:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3520_f-_all_flash__firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3520_f-_all_flash_:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3520_h-_hybrid__firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3520_h-_hybrid_:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3530_f_all_flash_firmware:afe118m:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3530_f_all_flash:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3530-h_hybrid_firmware:afe118m:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3530-h_hybrid:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3531_h_hybrid_firmware:afe118m:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3531_h_hybrid:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3531-f_all-flash_firmware:afe118m:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3531-f_all-flash:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx-_all_flash_firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx-_all_flash:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx-_hybrid_firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx-_hybrid:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx1021_firmware:hye122f:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx1021:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx_1se_firmware:ise130e:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx_1se:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx_1u_firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx_1u:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx_2u_firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx_2u:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx_2u4n_firmware:tee178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx_2u4n:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx_4u_firmware:pse144n:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx_4u:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx1320__firmware:ise130e:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx1320_:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx2320__firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx2320_:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx2330_firmware:afe118m:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx2330:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx3320__firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx3320_:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx3330_firmware:afe118m:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx3330:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx3520-g__firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx3520-g_:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx3530-g_firmware:afe118m:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx3530-g:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx3720__firmware:tee178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx3720_:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx5520__firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx5520_:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx5530_firmware:afe118m:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx5530:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx7320_n__firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx7320_n_:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx7330_firmware:afe118m:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx7330:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx7520__firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx7520_:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx7520_n__firmware:ive178i:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx7520_n_:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx7530_firmware:afe118m:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx7530:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx7531_firmware:afe118m:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx7531:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx7820__firmware:pse144n:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx7820_:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkserver_rd350_firmware:5.05.0:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkserver_rd350:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkserver_rd450_firmware:5.05.0:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkserver_rd450:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkserver_rd550_firmware:5.03.0:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkserver_rd550:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkserver_rd650_firmware:5.05.0:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkserver_rd650:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkserver_rs160_firmware:vb1ts307:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkserver_rs160:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkserver_rs260_firmware:vb1ts307:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkserver_rs260:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkserver_sr590_firmware:tee176k:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkserver_sr590:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkserver_sr588_firmware:tee176k:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkserver_sr588:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkserver_sr860p_firmware:tee176k:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkserver_sr860p:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkserver_sd350_firmware:5.05.0:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkserver_sd350:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkserver_td350_firmware:5.04.0:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkserver_td350:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkserver_ts150_firmware:81i\\/b7s:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkserver_ts150:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkserver_ts250_firmware:81i\\/b7s:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkserver_ts250:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkserver_ts450_firmware:fwktb7s:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkserver_ts450:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkserver_ts460_firmware:tb1ts307:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkserver_ts460:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkserver_ts550_firmware:fwktb7s:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkserver_ts550:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkserver_ts560_firmware:tb1ts307:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkserver_ts560:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p310_workstation_firmware:fwktc0a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p310_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p320_tiny_workstation_firmware:m1akt56a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p320_tiny_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p320_workstation_firmware:s06kt61a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p320_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p330_tiny_workstation_firmware:m1ukt6ba:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p330_tiny_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p330_workstation_firmware:m1vkt6ba:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p330_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p330_workstation_2nd_gen_firmware:m1vkt6ba:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p330_workstation_2nd_gen:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p340_tiny_workstation_firmware:m2wkt55a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p340_tiny_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p340_workstation_firmware:s08kt50a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p340_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p348_workstation_firmware:m3kkt36a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p348_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p350_tiny_workstation_firmware:m3jkt35a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p350_tiny_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p350_workstation_firmware:s0akt35a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p350_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p360_tiny_workstation_firmware:m4gkt1da:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p360_tiny_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p520_workstation_firmware:s03kt55a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p520_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p520c_workstation_firmware:s03kt55a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p520c_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p620_workstation_firmware:s07kt4aa:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p620_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p720_workstation_firmware:s04kt62a:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p720_workstation_firmware:s04kt62p:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p720_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p920_workstation_firmware:s05kt62a:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p920_workstation_firmware:s05kt62p:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p920_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_stadia_ggp-120_firmware:s03kt55a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_stadia_ggp-120:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_thinkstation_p318_firmware:m1akt56a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_thinkstation_p318:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st50_firmware:ite125a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_st50:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st58_firmware:ite125a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_st58:-:*:*:*:*:*:*:*" ]
null
6.7
null
null
GHSA-hv87-47h9-jcvq
Uncontrolled recursion in rust-yaml
Affected versions of this crate did not prevent deep recursion while deserializing data structures. This allows an attacker to make a YAML file with deeply nested structures that causes an abort while deserializing it. The flaw was corrected by checking the recursion depth.
[]
null
null
7.5
null
CVE-2014-6018
The global beauty research (aka com.appems.topgirl) application 1.6 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:global_beauty_research_project:global_beauty_research:1.6:*:*:*:*:android:*:*" ]
null
null
null
5.4
CVE-2023-3277
The MStore API plugin for WordPress is vulnerable to Unauthorized Account Access and Privilege Escalation in versions up to, and including, 4.10.7 due to improper implementation of the Apple login feature. This allows unauthenticated attackers to log in as any user as long as they know the user's email address. We are disclosing this issue as the developer has not yet released a patch, but continues to release updates and we escalated this issue to the plugin's team 30 days ago.
[ "cpe:2.3:a:inspireui:mstore_api:*:*:*:*:*:wordpress:*:*" ]
null
9.8
null
null
GHSA-7vqg-r6cw-6w76
The YaySMTP WordPress plugin before 2.2.1 does not have capability check before displaying the Mailer Credentials in JS code for the settings, allowing any authenticated users, such as subscriber to retrieve them
[]
null
6.5
null
null
CVE-2025-46964
Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79)
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
null
5.4
null
null
CVE-2024-44573
A stored cross-site scripting (XSS) vulnerability in the VLAN configuration of RELY-PCIe v22.2.1 to v23.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
[]
null
4.7
null
null
GHSA-pm8p-867f-r9w3
When booting a Zync-7000 SOC device from nand flash memory, the nand driver in the ROM does not validate the inputs when reading in any parameters in the nand’s parameter page. IF a field read in from the parameter page is too large, this causes a buffer overflow that could lead to arbitrary code execution. Physical access and modification to the Zynq-7000 device is needed to replace the original nand flash memory with a nand flash emulator for this attack to be successful.
[]
null
null
null
null
CVE-2006-6279
index.php in @lex Guestbook 4.0.1 allows remote attackers to obtain sensitive information via a skin parameter referencing a nonexistent skin, which reveals the installation path in an error message.
[ "cpe:2.3:a:alexphpteam:alex_guestbook:4.0.1:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2011-1296
Google Chrome before 10.0.648.204 does not properly handle SVG text, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2020-11704
An issue was discovered in ProVide (formerly zFTPServer) through 13.1. The Admin Web Interface has Multiple Stored and Reflected XSS. GetInheritedProperties is Reflected via the groups parameter. GetUserInfo is Reflected via POST data. SetUserInfo is Stored via the general parameter.
[ "cpe:2.3:a:provideserver:provide_ftp_server:*:*:*:*:*:windows:*:*" ]
null
6.1
null
4.3
GHSA-g4vc-rr66-6355
In the Linux kernel, the following vulnerability has been resolved:ksmbd: fix Out-of-Bounds Write in ksmbd_vfs_stream_writeAn offset from client could be a negative value, It could allows to write data outside the bounds of the allocated buffer. Note that this issue is coming when setting 'vfs objects = streams_xattr parameter' in ksmbd.conf.
[]
null
7.8
null
null
GHSA-gf2c-jgr4-gjcq
Reflected Cross-Site Scripting (XSS) vulnerability FontMeister plugin <= 1.08 at WordPress.
[]
null
6.1
null
null
CVE-2023-3217
Use after free in WebXR in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2019-1865
Cisco Integrated Management Controller Command Injection Vulnerability
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges on an affected device. The vulnerability is due to insufficient validation of user-supplied input by the affected software. An attacker could exploit this vulnerability by invoking an interface monitoring mechanism with a crafted argument on the affected software. A successful exploit could allow the attacker to inject and execute arbitrary, system-level commands with root privileges on an affected device.
[ "cpe:2.3:a:cisco:unified_computing_system:4.0\\(1c\\)hs3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:integrated_management_controller_supervisor:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:encs_5100:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:encs_5400:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ucs-e1120d-m3:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ucs-e140s-m2:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ucs-e160d-m2:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ucs-e160s-m3:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ucs-e168d-m2:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ucs-e180d-m3:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ucs_c125_m5:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ucs_c4200:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ucs_s3260:-:*:*:*:*:*:*:*" ]
null
null
8.8
null
GHSA-qwg6-3649-6q47
Protection mechanism failure in some Intel(R) Thunderbolt(TM) DCH drivers for Windows* before version 72 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
null
null
null
null
CVE-2015-4850
Unspecified vulnerability in the PeopleSoft Enterprise HCM component in Oracle PeopleSoft Products 9.2 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Talent Acquisition Management.
[ "cpe:2.3:a:oracle:peoplesoft_products:9.2:*:*:*:*:*:*:*" ]
null
null
null
5.5
GHSA-h2gj-vmvr-rvwv
An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. They allow remote attackers to execute arbitrary commands via the dns_query_name parameter in a dns_query.cgi POST request. TRENDnet TEW-632BRP 1.010B32 is also affected.
[]
null
null
null
null