id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-4rr8-cvf6-p4f6 | An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is an invalid pointer dereference in the function GF_IPMPX_AUTH_Delete() in odf/ipmpx_code.c. | [] |
|
CVE-2019-16123 | In Kartatopia PilusCart 1.4.1, the parameter filename in the file catalog.php is mishandled, leading to ../ Local File Disclosure. | [
"cpe:2.3:a:kartatopia:piluscart:*:*:*:*:*:*:*:*"
] |
|
GHSA-pp6h-5j34-grmp | In fpc_ta_get_build_info of fpc_ta_kpi.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-137014293References: N/A | [] |
|
CVE-2023-6548 | Improper Control of Generation of Code ('Code Injection') in NetScaler ADC and NetScaler Gateway allows an attacker with access to NSIP, CLIP or SNIP with management interface to perform Authenticated (low privileged) remote code execution on Management Interface. | [
"cpe:2.3:a:citrix:netscaler_application_delivery_controller:14.1:*:*:*:-:*:*:*",
"cpe:2.3:a:citrix:netscaler_application_delivery_controller:13.1:*:*:*:-:*:*:*",
"cpe:2.3:a:citrix:netscaler_application_delivery_controller:13.0:*:*:*:-:*:*:*",
"cpe:2.3:a:citrix:netscaler_application_delivery_controller:13.1:*:*:*:fips:*:*:*",
"cpe:2.3:a:citrix:netscaler_application_delivery_controller:12.1:*:*:*:fips:*:*:*",
"cpe:2.3:a:citrix:netscaler_application_delivery_controller:12.1:*:*:*:ndcpp:*:*:*",
"cpe:2.3:a:citrix:netscaler_gateway:14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:netscaler_gateway:13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:netscaler_gateway:13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:fips:*:*:*",
"cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:ndcpp:*:*:*",
"cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:-:*:*:*",
"cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*"
] |
|
GHSA-3mg8-g497-8859 | A vulnerability has been found in iboss Secure Web Gateway up to 10.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /login of the component Login Portal. The manipulation of the argument redirectUrl leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 10.2.0.160 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-259501 was assigned to this vulnerability. | [] |
|
GHSA-qcj3-h27m-mp9x | Openstack Octavia allows Insertion of Sensitive Information into Log File | In a default Red Hat Openstack Platform Director installation, openstack-octavia before versions openstack-octavia 2.0.2-5 and openstack-octavia-3.0.1-0.20181009115732 creates log files that are readable by all users. Sensitive information such as private keys can appear in these log files allowing for information exposure. | [] |
GHSA-j23m-2qch-pvvp | Multiple cross-site scripting (XSS) vulnerabilities in index.cgi in Barracuda Spam Firewall (BSF) before 3.5.12.007, Message Archiver before 1.2.1.002, Web Filter before 3.3.0.052, IM Firewall before 3.1.01.017, and Load Balancer before 2.3.024 allow remote attackers to inject arbitrary web script or HTML via (1) the Policy Name field in Search Based Retention Policy in Message Archiver; unspecified parameters in the (2) IP Configuration, (3) Administration, (4) Journal Accounts, (5) Retention Policy, and (6) GroupWise Sync components in Message Archiver; (7) input to search operations in Web Filter; and (8) input used in error messages and (9) hidden INPUT elements in (a) Spam Firewall, (b) IM Firewall, and (c) Web Filter. | [] |
|
GHSA-q2x2-4cf5-f275 | Unauthenticated arbitrary file upload vulnerability in jQuery Picture Cut <= v1.1Beta | [] |
|
CVE-2014-8741 | Directory traversal vulnerability in the GfdFileUploadServerlet servlet in Lexmark MarkVision Enterprise before 2.1 allows remote attackers to write to arbitrary files via unspecified vectors. | [
"cpe:2.3:a:lexmark:markvision_enterprise:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-11836 | OPPO Android Phone with MTK chipset and Android 8.1/9/10/11 versions have an information leak vulnerability. The “adb shell getprop ro.vendor.aee.enforcing” or “adb shell getprop ro.vendor.aee.enforcing” return no. | [
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:h:oppo:a12:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oppo:a15:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oppo:a15s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oppo:a31:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oppo:a33:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oppo:a5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oppo:a52:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oppo:a53:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oppo:a9:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oppo:f15:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oppo:f17:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oppo:f17_pro:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oppo:reno_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oppo:reno_2f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oppo:reno_2z:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oppo:reno_3_pro:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oppo:reno_4_pro:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oppo:reno_5_pro_5g:-:*:*:*:*:*:*:*"
] |
|
GHSA-3xg5-v3r3-xvcq | In JetBrains TeamCity before 2021.2, health items of pull requests were shown to users who lacked appropriate permissions. | [] |
|
GHSA-6mp6-q63m-fh2h | A vulnerability was found in Pixsoft Vivaz 6.0.11. It has been classified as problematic. Affected is an unknown function of the file /servlet?act=login&submit=1&evento=0&pixrnd=0125021817031859360231 of the component Login Endpoint. The manipulation of the argument sistema leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] |
|
CVE-2023-1249 | A use-after-free flaw was found in the Linux kernel’s core dump subsystem. This flaw allows a local user to crash the system. Only if patch 390031c94211 ("coredump: Use the vma snapshot in fill_files_note") not applied yet, then kernel could be affected. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-45599 | Aztech WMB250AC Mesh Routers Firmware Version 016 2020 is vulnerable to PHP Type Juggling in file /var/www/login.php, allows attackers to gain escalated privileges only when specific conditions regarding a given accounts hashed password. | [
"cpe:2.3:o:aztech:wmb250ac_firmware:016_2020:*:*:*:*:*:*:*",
"cpe:2.3:h:aztech:wmb250ac:-:*:*:*:*:*:*:*"
] |
|
GHSA-7v6q-3gw2-jc2p | The Detox Juicing Diet Recipes (aka com.wDetoxJuicingDietRecipes) application 1.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
GHSA-7r3c-3rhp-45ch | Use-after-free vulnerability in Microsoft Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel 2016, Excel for Mac 2011, Excel 2016 for Mac, and Excel Services on SharePoint Server 2010 SP2 and 2013 SP1 allows remote attackers to execute arbitrary code via a crafted calculatedColumnFormula object in an Office document, aka "Microsoft Office Memory Corruption Vulnerability." | [] |
|
GHSA-vhx2-58f3-9f8j | Directory traversal vulnerability in IncrediMail version 1400185 and earlier allows local users to overwrite files on the local hard drive by appending .. (dot dot) sequences to filenames listed in the content.ini file. | [] |
|
CVE-2010-1909 | Buffer overflow in the RunCmd method in the SdcUser.TgConCtl ActiveX control in tgctlcm.dll in Consona Live Assistance, Dynamic Agent, and Subscriber Assistance allows remote attackers to execute arbitrary code via vectors involving "CreateProcess params." NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:consona:consona_dynamic_agent:-:-:enterprise:*:*:*:*:*",
"cpe:2.3:a:consona:consona_dynamic_agent:-:-:marketing:*:*:*:*:*",
"cpe:2.3:a:consona:consona_dynamic_agent:-:-:support:*:*:*:*:*",
"cpe:2.3:a:consona:consona_live_assistance:*:*:*:*:*:*:*:*",
"cpe:2.3:a:consona:consona_subscriber_assistance:*:*:*:*:*:*:*:*"
] |
|
GHSA-f958-6c9p-jx25 | A vulnerability in Cisco Application Policy Infrastructure Controller (APIC) Software could allow an unauthenticated, local attacker with physical access to obtain sensitive information from an affected device. The vulnerability is due to insecure removal of cleartext encryption keys stored on local partitions in the hard drive of an affected device. An attacker could exploit this vulnerability by retrieving data from the physical disk on the affected partition(s). A successful exploit could allow the attacker to retrieve encryption keys, possibly allowing the attacker to further decrypt other data and sensitive information on the device, which could lead to the disclosure of confidential information. | [] |
|
GHSA-g4wm-3vx4-m4qq | Atom.CMS 2.0 is vulnerable to SQL Injection via Atom.CMS_admin_uploads.php | [] |
|
GHSA-q36w-fgp3-q2gw | A local file inclusion vulnerability exists in haotian-liu/llava at commit c121f04. This vulnerability allows an attacker to access any file on the system by sending multiple crafted requests to the server. The issue is due to improper input validation in the gradio web UI component. | [] |
|
CVE-2024-51022 | Netgear XR300 v1.0.3.78 was discovered to contain a stack overflow via the ssid parameter in bridge_wireless_main.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request. | [
"cpe:2.3:o:netgear:xr300_firmware:1.0.3.78:*:*:*:*:*:*:*"
] |
|
GHSA-h3qq-3jf5-8qc6 | Inclusion of sensitive information in the source code has been reported to affect certain QNAP switches running QSS. If exploited, this vulnerability allows attackers to read application data. This issue affects: QNAP Systems Inc. QSS versions prior to 1.0.3 build 20210505 on QSW-M2108-2C; versions prior to 1.0.3 build 20210505 on QSW-M2108-2S; versions prior to 1.0.3 build 20210505 on QSW-M2108R-2C; versions prior to 1.0.12 build 20210506 on QSW-M408. | [] |
|
GHSA-28jh-gp7h-pj6v | Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-0278 and CVE-2014-0279. | [] |
|
GHSA-hxf7-pgg4-qhm3 | The File Check Utility (fcheck.exe) in ASG-Sentry Network Manager 7.0.0 and earlier allows remote attackers to cause a denial of service (CPU consumption) or overwrite arbitrary files via a query string that specifies the -b option, probably due to an argument injection vulnerability. | [] |
|
GHSA-j4m3-366v-h3q9 | Cross-site scripting (XSS) vulnerability in Zoho ManageEngine EventLog Analyzer 11.12 allows remote attackers to inject arbitrary web script or HTML via the import logs feature. | [] |
|
CVE-2020-23834 | Insecure Service File Permissions in the bd service in Real Time Logic BarracudaDrive v6.5 allow local attackers to escalate privileges to admin by replacing the %SYSTEMDRIVE%\bd\bd.exe file. When the computer next starts, the new bd.exe will be run as LocalSystem. | [
"cpe:2.3:a:realtimelogic:barracudadrive:6.5:*:*:*:*:*:*:*"
] |
|
CVE-2022-0667 | Assertion failure on delayed DS lookup | When the vulnerability is triggered the BIND process will exit. BIND 9.18.0 | [
"cpe:2.3:a:isc:bind:9.18.0:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*"
] |
CVE-2023-2384 | Netgear SRX5308 Web Management Interface cross site scripting | A vulnerability was found in Netgear SRX5308 up to 4.3.5-3. It has been declared as problematic. This vulnerability affects unknown code of the file scgi-bin/platform.cgi?page=dmz_setup.htm of the component Web Management Interface. The manipulation of the argument dhcp.SecDnsIPByte2 leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-227662 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:o:netgear:srx5308_firmware:4.3.5-3:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:srx5308:-:*:*:*:*:*:*:*"
] |
GHSA-r2c7-qvrq-pwg6 | An information disclosure vulnerability exists when Exchange allows creation of entities with Display Names having non-printable characters. An authenticated attacker could exploit this vulnerability by creating entities with invalid display names, which, when added to conversations, remain invisible. This security update addresses the issue by validating display names upon creation in Microsoft Exchange, and by rendering invalid display names correctly in Microsoft Outlook clients., aka 'Microsoft Exchange Information Disclosure Vulnerability'. | [] |
|
GHSA-ccpq-qrrm-9f6q | In the Linux kernel, the following vulnerability has been resolved:platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbiosinit_dell_smbios_wmi() only registers the dell_smbios_wmi_driver on systems
where the Dell WMI interface is supported. While exit_dell_smbios_wmi()
unregisters it unconditionally, this leads to the following oops:[ 175.722921] ------------[ cut here ]------------
[ 175.722925] Unexpected driver unregister!
[ 175.722939] WARNING: CPU: 1 PID: 3630 at drivers/base/driver.c:194 driver_unregister+0x38/0x40
...
[ 175.723089] Call Trace:
[ 175.723094] cleanup_module+0x5/0xedd [dell_smbios]
...
[ 175.723148] ---[ end trace 064c34e1ad49509d ]---Make the unregister happen on the same condition the register happens
to fix this. | [] |
|
CVE-2016-2539 | Cross-site request forgery (CSRF) vulnerability in install_modules.php in ATutor before 2.2.2 allows remote attackers to hijack the authentication of users for requests that upload arbitrary files and execute arbitrary PHP code via vectors involving a crafted zip file. | [
"cpe:2.3:a:atutor:atutor:*:*:*:*:*:*:*:*"
] |
|
GHSA-7c59-c4r2-h8w2 | Buffer overflow in the arp command of IBM AIX 5.3 L, 5.3, 5.2.2, 5.2 L, and 5.2 allows local users to cause a denial of service (crash) via a long iftype argument. | [] |
|
CVE-2021-3971 | A potential vulnerability by a driver used during older manufacturing processes on some consumer Lenovo Notebook devices that was mistakenly included in the BIOS image could allow an attacker with elevated privileges to modify firmware protection region by modifying an NVRAM variable. | [
"cpe:2.3:o:lenovo:ideapad_3-14ada05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-14ada05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-14ada6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-14ada6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-14alc6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-14alc6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-14are05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-14are05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-15ada6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-15ada6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-15alc6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-15alc6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-15are05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-15are05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-15igl05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-15igl05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-17ada05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-17ada05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-17ada6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-17ada6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-17alc6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-17alc6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-17are05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-17are05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-17iil05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-17iil05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-15ada05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-15ada05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:l3-15itl6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:l3-15itl6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:l340-15irh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:l340-15irh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:l340-15iwl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:l340-15iwl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:l340-15iwl_touch_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:l340-15iwl_touch:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:l340-17irh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:l340-17irh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:l340-17iwl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:l340-17iwl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5_pro-16ach6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5_pro-16ach6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5_pro-16ach6h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5_pro-16ach6h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5_pro-16ith6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5_pro-16ith6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5_pro-16ith6h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5_pro-16ith6h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-15ach6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-15ach6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-15ach6a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-15ach6a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-15ach6h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-15ach6h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-15ith6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-15ith6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-15ith6h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-15ith6h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-17ach6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-17ach6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-17ach6h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-17ach6h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-17ith6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-17ith6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-17ith6h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-17ith6h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_7-16achg6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_7-16achg6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_7-16ithg6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_7-16ithg6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_y540-15irh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_y540-15irh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_y540-15irh-pg0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_y540-15irh-pg0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_y540-17irh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_y540-17irh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_y540-17irh-pg0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_y540-17irh-pg0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_y545_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_y545:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_y545-pg0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_y545-pg0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_y7000-2019_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_y7000-2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_y7000-2019-pg0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_y7000-2019-pg0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s145-14api_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s145-14api:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s145-14ast_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s145-14ast:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s145-14igm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s145-14igm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s145-14iil_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s145-14iil:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s145-15api_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s145-15api:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s145-15ast_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s145-15ast:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s145-15igm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s145-15igm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s145-15iil_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s145-15iil:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s540-13api_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s540-13api:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v14_g2-acl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v14_g2-acl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v14-ada_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v14-ada:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v14-are_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v14-are:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v14-igl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v14-igl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v14-iil_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v14-iil:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v140-15iwl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v140-15iwl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v15_g2-alc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v15_g2-alc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v15-ada_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v15-ada:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v15-igl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v15-igl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v15-iil_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v15-iil:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v17-iil_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v17-iil:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v340-17iwl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v340-17iwl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7_pro-14ach5_d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7_pro-14ach5_d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7_pro-14ach5_od_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7_pro-14ach5_od:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-14iil05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-14iil05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-14igl05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-14igl05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-15iil05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-15iil05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_5-15are05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_5-15are05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_creator_5-15imh05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_creator_5-15imh05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_gaming_3-15arh05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_gaming_3-15arh05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_gaming_3-15imh05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_gaming_3-15imh05:-:*:*:*:*:*:*:*"
] |
|
CVE-2023-20880 | VMware Aria Operations contains a privilege escalation vulnerability. A malicious actor with administrative access to the local system can escalate privileges to 'root'. | [
"cpe:2.3:a:vmware:aria_operations:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*"
] |
|
CVE-2007-1276 | Multiple cross-site scripting (XSS) vulnerabilities in chooser.cgi in Webmin before 1.330 and Usermin before 1.260 allow remote attackers to inject arbitrary web script or HTML via a crafted filename. | [
"cpe:2.3:a:usermin:usermin:1.000:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.010:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.020:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.030:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.040:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.051:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.060:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.070:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.080:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.090:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.100:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.110:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.120:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.130:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.140:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.150:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.210:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.220:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.230:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.240:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.250:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.0.00:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.0.40:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.0.50:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.0.51:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.0.60:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.0.70:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.0.80:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.0.90:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.1.00:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.1.30:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.1.40:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.1.50:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.2.30:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.2.40:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.2.50:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.3.20:*:*:*:*:*:*:*"
] |
|
GHSA-pf99-2jcr-hrxm | Blizzard Entertainment StarCraft Brood War 1.15.1 and earlier allows remote attackers to cause a denial of service (application crash) via a malformed map, which triggers an out-of-bounds read during a minimap preview. | [] |
|
CVE-2022-49714 | irqchip/realtek-rtl: Fix refcount leak in map_interrupts | In the Linux kernel, the following vulnerability has been resolved:
irqchip/realtek-rtl: Fix refcount leak in map_interrupts
of_find_node_by_phandle() returns a node pointer with refcount
incremented, we should use of_node_put() on it when not need anymore.
This function doesn't call of_node_put() in error path.
Call of_node_put() directly after of_property_read_u32() to cover
both normal path and error path. | [] |
GHSA-8cqv-gpw9-fq7h | Memory Corruption in SPS Application while exporting public key in sorter TA. | [] |
|
CVE-2023-7192 | Kernel: refcount leak in ctnetlink_create_conntrack() | A memory leak problem was found in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c in the Linux Kernel. This issue may allow a local attacker with CAP_NET_ADMIN privileges to cause a denial of service (DoS) attack due to a refcount overflow. | [
"cpe:/o:redhat:rhel_tus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/a:redhat:rhel_tus:8.2::realtime",
"cpe:/a:redhat:rhel_tus:8.2::nfv",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos",
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/a:redhat:rhel_tus:8.4::realtime",
"cpe:/a:redhat:rhel_tus:8.4::nfv",
"cpe:/o:redhat:rhel_eus:8.6::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8",
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/o:redhat:rhel_eus:8.8::baseos",
"cpe:/o:redhat:rhel_eus:9.0::baseos",
"cpe:/a:redhat:rhel_eus:9.0::crb",
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::realtime",
"cpe:/a:redhat:rhel_eus:9.0::nfv",
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/o:redhat:rhel_eus:9.2::baseos",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/a:redhat:rhel_eus:9.2::nfv",
"cpe:/a:redhat:rhel_eus:9.2::realtime",
"cpe:/o:redhat:enterprise_linux:6",
"cpe:/o:redhat:enterprise_linux:7",
"cpe:/o:redhat:enterprise_linux:8",
"cpe:/o:redhat:enterprise_linux:9",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*"
] |
CVE-2017-11109 | Vim 8.0 allows attackers to cause a denial of service (invalid free) or possibly have unspecified other impact via a crafted source (aka -S) file. NOTE: there might be a limited number of scenarios in which this has security relevance. | [
"cpe:2.3:a:vim:vim:8.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-39533 | libp2p nodes vulnerable to attack using large RSA keys | go-libp2p is the Go implementation of the libp2p Networking Stack. Prior to versions 0.27.8, 0.28.2, and 0.29.1 malicious peer can use large RSA keys to run a resource exhaustion attack & force a node to spend time doing signature verification of the large key. This vulnerability is present in the core/crypto module of go-libp2p and can occur during the Noise handshake and the libp2p x509 extension verification step. To prevent this attack, go-libp2p versions 0.27.8, 0.28.2, and 0.29.1 restrict RSA keys to <= 8192 bits. To protect one's application, it is necessary to update to these patch releases and to use the updated Go compiler in 1.20.7 or 1.19.12. There are no known workarounds for this issue. | [
"cpe:2.3:a:libp2p:go-libp2p:*:*:*:*:*:go:*:*",
"cpe:2.3:a:libp2p:go-libp2p:0.29.0:*:*:*:*:go:*:*"
] |
GHSA-2gf6-g5m3-qg3c | Technicolor DPC2320 dpc2300r2-v202r1244101-150420a-v6 devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests. | [] |
|
GHSA-px39-46h2-2hqq | Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects GS105Ev2 before 1.6.0.4, GS105PE before 1.6.0.4, GS408EPP before 1.0.0.15, GS808E before 1.7.0.7, GS908E before 1.7.0.3, GSS108E before 1.6.0.4, and GSS108EPP before 1.0.0.15. | [] |
|
CVE-2024-46871 | drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX | In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX
[Why & How]
It actually exposes '6' types in enum dmub_notification_type. Not 5. Using smaller
number to create array dmub_callback & dmub_thread_offload has potential to access
item out of array bound. Fix it. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
CVE-2023-3317 | A use-after-free flaw was found in mt7921_check_offload_capability in drivers/net/wireless/mediatek/mt76/mt7921/init.c in wifi mt76/mt7921 sub-component in the Linux Kernel. This flaw could allow an attacker to crash the system after 'features' memory release. This vulnerability could even lead to a kernel information leak problem. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.3:-:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.3:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.3:rc5:*:*:*:*:*:*"
] |
|
CVE-2014-5421 | CareFusion Pyxis SupplyStation 8.1 with hardware test tool 1.0.16 and earlier has a hardcoded database password, which makes it easier for local users to gain privileges by leveraging cabinet access. | [
"cpe:2.3:h:carefusion:pyxis_supplystation:8.1:*:*:*:*:*:*:*"
] |
|
GHSA-2hv6-3c5r-xmfv | A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. Set3G param is not object. An attacker can send an HTTP request to trigger this vulnerability. | [] |
|
GHSA-xjjg-vmw6-c2p9 | Open Redirect in httpie | All versions of the HTTPie package prior to version 1.0.3 are vulnerable to Open Redirect that allows an attacker to write an arbitrary file with supplied filename and content to the current directory, by redirecting a request from HTTP to a crafted URL pointing to a server in his or hers control. | [] |
CVE-2012-4823 | Unspecified vulnerability in the JRE component in IBM Java 7 SR2 and earlier, Java 6.0.1 SR3 and earlier, Java 6 SR11 and earlier, Java 5 SR14 and earlier, and Java 142 SR13 FP13 and earlier; as used in IBM Rational Host On-Demand, Rational Change, Tivoli Monitoring, Smart Analytics System 5600, Tivoli Remote Control 5.1.2, WebSphere Real Time, Lotus Notes & Domino, Tivoli Storage Productivity Center, and Service Deliver Manager; and other products from other vendors such as Red Hat, allows remote attackers to execute arbitrary code via vectors related to "insecure use of the java.lang.ClassLoder defineClass() method." | [
"cpe:2.3:a:ibm:java:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.0.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.0.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.0.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.0.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes_sametime:8.0.80407:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes_sametime:8.0.80822:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes_sametime:8.5.1.20100709-1631:*:*:*:advanced_embedded:*:*:*",
"cpe:2.3:a:ibm:lotus_notes_traveler:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes_traveler:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes_traveler:8.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes_traveler:8.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes_traveler:8.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes_traveler:8.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes_traveler:8.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes_traveler:8.5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes_traveler:8.5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes_traveler:8.5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes_traveler:8.5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes_traveler:8.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes_traveler:8.5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes_traveler:8.5.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes_traveler:8.5.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes_traveler:8.5.3.3:interim_fix_1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_change:4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_change:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_change:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_change:5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_host_on-demand:1.6.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_host_on-demand:8.0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_host_on-demand:9.0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_host_on-demand:10.0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_host_on-demand:10.0.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_host_on-demand:11.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_host_on-demand:11.0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_host_on-demand:11.0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_host_on-demand:11.0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_host_on-demand:11.0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_host_on-demand:11.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:service_delivery_manager:7.2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:service_delivery_manager:7.2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:smart_analytics_system_5600_software:-:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:smart_analytics_system_5600_software:9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_remote_control:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_real_time:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_real_time:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tivoli_storage_productivity_center:5.0:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tivoli_storage_productivity_center:5.1:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tivoli_storage_productivity_center:5.1.1:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:smart_analytics_system_5600:7200:*:*:*:*:*:*:*"
] |
|
GHSA-8v5c-chfg-fcjx | An authorized user may trigger an invariant which may result in denial of service or server exit if a relevant aggregation request is sent to a shard. Usually, the requests are sent via mongos and special privileges are required in order to know the address of the shards and to log in to the shards of an auth enabled environment. | [] |
|
GHSA-cjvp-xw2h-c8v3 | Directory traversal vulnerability in McAfee Web Gateway (MWG) 7.4.x before 7.4.1, 7.3.x before 7.3.2.6, and 7.2.0.9 and earlier allows remote authenticated users to read arbitrary files via a crafted request to the web filtering port. | [] |
|
CVE-2020-1219 | A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory, aka 'Microsoft Browser Memory Corruption Vulnerability'. | [
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-56901 | A Cross-Site Request Forgery (CSRF) vulnerability in Geovision GV-ASWeb application with the version 6.1.1.0 or less that allows attackers to arbitrarily create Administrator accounts via a crafted GET request method. This vulnerability is used in chain with CVE-2024-56903 for a successful CSRF attack. | [] |
|
GHSA-c2j7-mgrp-5g3p | Untrusted search path vulnerability in Empirical Project Monitor - eXtended all versions allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory. | [] |
|
CVE-2023-2640 | On Ubuntu kernels carrying both c914c0e27eb0 and "UBUNTU: SAUCE: overlayfs: Skip permission checking for trusted.overlayfs.* xattrs", an unprivileged user may set privileged extended attributes on the mounted files, leading them to be set on the upper files without the appropriate security checks. | [
"cpe:2.3:o:canonical:ubantu_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:23.04:*:*:*:*:*:*:*"
] |
|
GHSA-63gm-vx3p-q2xg | Unknown vulnerability in newtask for Solaris 9 allows local users to gain root privileges. | [] |
|
CVE-2017-16725 | A Stack-based Buffer Overflow issue was discovered in Xiongmai Technology IP Cameras and DVRs using the NetSurveillance Web interface. The stack-based buffer overflow vulnerability has been identified, which may allow an attacker to execute code remotely or crash the device. After rebooting, the device restores itself to a more vulnerable state in which Telnet is accessible. | [
"cpe:2.3:o:xiongmaitech:ahb7008f8-h_firmware:4.02.r11.3070:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7008f8-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7008f4-h_firmware:4.02.r11.3070:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7008f4-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7008f2-h_firmware:4.02.r11.3070:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7008f2-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7008t-mh-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7008t-mh-v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7004t-mh-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7004t-mh-v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7004t-h-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7004t-h-v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7016t-lm-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7016t-lm-v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7008t-lm-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7008t-lm-v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7016t4-mh-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7016t4-mh-v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7016t-mh-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7016t-mh-v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7008t4-h-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7008t4-h-v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7008t-h-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7008t-h-v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7008t4-h-v2:_firmware:4.02.r11.7601:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7032f8-lm-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7032f8-lm-v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7032f4-lm-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7032f4-lm-v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7808r-ms-v3_firmware:4.02.r11.nat.onvifc.20170327:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7808r-ms-v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7804r-ms-v3_firmware:4.02.r11.nat.onvifc.20170327:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7804r-ms-v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7016t-lm-v3_firmware:4.02.r11.3070:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7016t-lm-v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7008t-lm-v3_firmware:4.02.r11.3070:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7008t-lm-v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7004t-lm-v3_firmware:4.02.r11.3070:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7004t-lm-v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7016t4-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7016t4-gs-v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7016t-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7016t-gs-v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7008t-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7008t-gs-v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7004t-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7004t-gs-v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7016t-mh-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7016t-mh-v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7008t-mh-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7008t-mh-v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7004t-mh-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7004t-mh-v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7008t-gl-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7008t-gl-v4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7004t-gl-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7004t-gl-v4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7004t-g-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7004t-g-v4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7016f8-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7016f8-gs-v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7016f8-gl-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7016f8-gl-v4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7016f4-gl-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7016f4-gl-v4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7016f2-gl-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7016f2-gl-v4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7808r-lm-v3_firmware:4.02.r11.nat.onvifc.20171120:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7808r-lm-v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7804r-lm-v3_firmware:4.02.r11.nat.onvifc.20171120:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7804r-lm-v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7804r-lms-v3_firmware:4.02.r11.nat.onvifc.20171019:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7804r-lms-v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7008f8-g-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7008f8-g-v4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7008f4-g-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7008f4-g-v4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7008f2-g-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7008f2-g-v4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7032f4-lm-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7032f4-lm-v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7032f2-lm-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7032f2-lm-v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7032f8-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7032f8-gs-v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7032f4-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7032f4-gs-v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7032f2-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7032f2-gs-v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7016t-lme-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7016t-lme-v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7008t-lme-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7008t-lme-v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7004t-lme-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7004t-lme-v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7808r-mh-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7808r-mh-v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7804r-mh-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb7804r-mh-v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-50h10pl-p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-50h10pl-p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-50h10pl-b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-50h10pl-b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-50h10pl-ae_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-50h10pl-ae:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-50h10pl-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-50h10pl-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-52h10pl-p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-52h10pl-p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-52h10pl-b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-52h10pl-b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-53h13pet-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-53h13pet-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-53h13pls-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-53h13pls-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-53h13pes-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-53h13pes-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-53h13pes-sl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-53h13pes-sl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-53h13pl-p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-53h13pl-p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-53h13pl-b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-53h13pl-b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-53h13pl-ae_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-53h13pl-ae:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-53h13pl-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-53h13pl-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-53h13p-p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-53h13p-p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-53h13p-b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-53h13p-b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-53h13p-ae_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-53h13p-ae:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-53h13p-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-53h13p-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-83h40pl-b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-83h40pl-b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-83h40pl-p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-83h40pl-p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-83h50p-p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-83h50p-p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-83h50p-b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-83h50p-b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-53h10pe-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-53h10pe-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-50h10pe-sl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-50h10pe-sl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-50h10pe-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-50h10pe-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipm-50hv10pt-wr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipm-50hv10pt-wr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipm-50v10pl-wr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipm-50v10pl-wr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipm-50h10pe-wr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipm-50h10pe-wr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-54h13pe-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-54h13pe-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-54h20pl-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-54h20pl-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-50h10pl-r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-50h10pl-r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipm-50h10pe-o\\(r\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipm-50h10pe-o\\(r\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-53h13pl-r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-53h13pl-r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-50h10pe-wp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-50h10pe-wp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-50hv10pt-wp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-50hv10pt-wp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-53hv13pa-wp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-53hv13pa-wp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-53h13pe-wp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-53h13pe-wp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-53h20pl-p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-53h20pl-p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-53h20pl-b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-53h20pl-b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-53h20pl-ae_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-53h20pl-ae:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-53h20pl-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-53h20pl-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-50hv20pet-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-50hv20pet-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-50hv20pet-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-50hv20pet-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-50hv20pes-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-50hv20pes-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-50h10pe-wk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-50h10pe-wk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-53h13pe-wk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-53h13pe-wk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-53h13pe-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-53h13pe-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipm-50h10pe-wrm_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipm-50h10pe-wrm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipm-53h13pe-wrm_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipm-53h13pe-wrm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-83h40af_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-83h40af:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipm-50v10pl-wrc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipm-50h10pe-wrc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipm-50h10pe-wrc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-50x10pt-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-50x10pt-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-50x10pe-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-50x10pe-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-53x13pt-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-53x13pt-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-53x13pa-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-53x13pa-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-53x13pe-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-53x13pe-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipm-53h13pe-wrc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipm-53h13pe-wrc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipm-53hv13pe-wr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipm-53hv13pe-wr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipm-53v13pl-wr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipm-53v13pl-wr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipm-53h13pe-wr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipm-53h13pe-wr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-50h10pe-wk-2f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-50h10pe-wk-2f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-83h20pl-p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-83h20pl-p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-83h20pl-b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-83h20pl-b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-53hv13pt-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-53hv13pt-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-53hv13pa-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-53hv13pa-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-53hv13pa-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-53hv13pa-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipm-50hv20pe-wr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipm-50hv20pe-wr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-50hv10pt-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-50hv10pt-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-50hv10pt-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-50hv10pt-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-50hv10pv-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-50hv10pv-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-50hv10pv-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-50hv10pv-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-80h20pt-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-80h20pt-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-80h20pt-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-80h20pt-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-50h20pt-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-50h20pt-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-53h20py-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-53h20py-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-53h13pe-wk-4f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-53h13pe-wk-4f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-83h20pa-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-83h20pa-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-83h20pa-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-83h20pa-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-50hv20psa-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-50hv20psa-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-50hv20psb-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-50hv20psb-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-50hv20psb-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-50hv20psb-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ivg-hp203y-ae_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ivg-hp203y-ae:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ivg-hp203y-se_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ivg-hp203y-se:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-hp500nr-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-hp500nr-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ipg-80he20ps-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ipg-80he20ps-s:-:*:*:*:*:*:*:*"
] |
|
GHSA-87j9-45v6-cvx8 | WebUI in qBittorrent before 3.3.11 did not set the X-Frame-Options header, which could potentially lead to clickjacking. | [] |
|
CVE-2013-1429 | Lintian before 2.5.12 allows remote attackers to gather information about the "host" system using crafted symlinks. | [
"cpe:2.3:a:debian:lintian:*:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:lintian:2.5.11:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"
] |
|
GHSA-fvh6-48v9-mqh2 | Windows Themes Spoofing Vulnerability | [] |
|
GHSA-m734-688v-8r3r | Stack-based buffer overflow in Nullsoft Winamp 5.12 and 5.13 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted .m3u file that causes an incorrect strncpy function call when the player pauses or stops the file. | [] |
|
GHSA-v79g-8rxh-2q7g | Improper Input Validation vulnerability in handling apdu of libsec-ril prior to SMR Apr-2024 Release 1 allows local privileged attackers to write out-of-bounds memory. | [] |
|
CVE-2014-4884 | The Conrad Hotel (aka com.wConradHotel) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:conrad_hotel_project:conrad_hotel:0.1:*:*:*:*:android:*:*"
] |
|
CVE-2015-5660 | Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code. | [
"cpe:2.3:a:extplorer:extplorer:*:*:*:*:*:*:*:*"
] |
|
GHSA-8973-436w-prf3 | NetApp OnCommand Unified Manager for Linux versions 7.2 through 7.3 ship with the Java Management Extension Remote Method Invocation (JMX RMI) service bound to the network, and are susceptible to unauthenticated remote code execution. | [] |
|
GHSA-9xp3-mp9c-47rf | A flaw was found in dnsmasq before version 2.83. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the "Birthday Attacks" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity. | [] |
|
GHSA-mx46-jh22-vrmf | Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.36, prior to 6.0.16 and prior to 6.1.2. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N). | [] |
|
GHSA-5hfv-r9xg-387j | SQL injection vulnerability in index.php in IntegraMOD 1.4.0 and earlier allows remote attackers to execute arbitrary SQL commands via double-encoded "'" characters in the STYLE_URL parameter. | [] |
|
GHSA-jh3w-4vvf-mjgr | Django has regular expression denial of service vulnerability in EmailValidator/URLValidator | In Django 3.2 before 3.2.20, 4 before 4.1.10, and 4.2 before 4.2.3, `EmailValidator` and `URLValidator` are subject to a potential ReDoS (regular expression denial of service) attack via a very large number of domain name labels of emails and URLs. | [] |
CVE-2009-2056 | Cisco IOS XR 3.8.1 and earlier allows remote authenticated users to cause a denial of service (process crash) via vectors involving a BGP UPDATE message with many AS numbers prepended to the AS path. | [
"cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.2.3:*:crs-1:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.2.3:*:prp:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.2.50:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.8.0:*:*:*:*:*:*:*"
] |
|
GHSA-287c-cc7v-7v95 | The Categorify plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.7.4. This is due to missing or incorrect nonce validation on the categorifyAjaxUpdateFolderPosition function. This makes it possible for unauthenticated attackers to update the folder position of categories as well as update the metadata of other taxonomies via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] |
|
GHSA-v3jv-wrf4-5845 | Local Privilege Escalation in npm | Affected versions of `npm` use predictable temporary file names during archive unpacking. If an attacker can create a symbolic link at the location of one of these temporary file names, the attacker can arbitrarily write to any file that the user which owns the `npm` process has permission to write to, potentially resulting in local privilege escalation.RecommendationUpdate to version 1.3.3 or later. | [] |
CVE-2018-15798 | Pivotal Concourse allows malicious redirect urls on login | Pivotal Concourse Release, versions 4.x prior to 4.2.2, login flow allows redirects to untrusted websites. A remote unauthenticated attacker could convince a user to click on a link using the oAuth redirect link with an untrusted website and gain access to that user's access token in Concourse. | [
"cpe:2.3:a:pivotal_software:concourse:*:*:*:*:*:*:*:*"
] |
GHSA-m8m3-3pmc-xj5p | An improper certificate validation vulnerability was reported in LADM that could allow a network attacker with the ability to redirect an update request to a remote server and execute code with elevated privileges. | [] |
|
CVE-2022-24154 | Tenda AX3 v16.03.12.10_CN was discovered to contain a stack overflow in the function formSetRebootTimer. This vulnerability allows attackers to cause a Denial of Service (DoS) via the rebootTime parameter. | [
"cpe:2.3:o:tenda:ax3_firmware:16.03.12.10_cn:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ax3:-:*:*:*:*:*:*:*"
] |
|
GHSA-5px9-63j7-5f27 | The E-Mail autoconfiguration feature in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 places a password in a GET request, which allows remote attackers to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer logs, or (3) the browser history. | [] |
|
CVE-2018-11164 | Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 22 of 46). | [
"cpe:2.3:a:quest:disk_backup:*:*:*:*:*:*:*:*"
] |
|
CVE-2016-2836 | Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to Http2Session::Shutdown and SpdySession31::Shutdown, and other vectors. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*"
] |
|
GHSA-2fp3-g54x-pvwq | FTPGetter Standard v.5.97.0.177 allows remote code execution when a user initiates an FTP connection to an attacker-controlled machine that sends crafted responses. Long responses can also crash the FTP client with memory corruption. | [] |
|
CVE-2024-2471 | The FooGallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via image attachment fields (such as 'Title', 'Alt Text', 'Custom URL', 'Custom Class', and 'Override Type') in all versions up to, and including, 2.4.14 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
CVE-2024-1489 | The SMS Alert Order Notifications – WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.6.9. This is due to missing or incorrect nonce validation on the processBulkAction function. This makes it possible for unauthenticated attackers to delete pages and posts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] |
|
CVE-2014-8871 | Directory traversal vulnerability in hybris Commerce software suite 5.0.3.3 and earlier, 5.0.0.3 and earlier, 5.0.4.4 and earlier, 5.1.0.1 and earlier, 5.1.1.2 and earlier, 5.2.0.3 and earlier, and 5.3.0.1 and earlier. | [
"cpe:2.3:a:sap:hybris:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-4915 | Campcodes Online Examination System result.php sql injection | A vulnerability, which was classified as critical, was found in Campcodes Online Examination System 1.0. Affected is an unknown function of the file result.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-264450 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:campcodes:online_examination_system:1.0:*:*:*:*:*:*:*"
] |
GHSA-qh2c-49jf-6c8g | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Tribulant Newsletters allows Reflected XSS.This issue affects Newsletters: from n/a through 4.9.9.1. | [] |
|
CVE-2023-0988 | SourceCodester Online Pizza Ordering System cross-site request forgery | A vulnerability, which was classified as problematic, has been found in SourceCodester Online Pizza Ordering System 1.0. This issue affects some unknown processing of the file admin/ajax.php?action=save_user. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221681 was assigned to this vulnerability. | [
"cpe:2.3:a:online_pizza_ordering_system_project:online_pizza_ordering_system:1.0:*:*:*:*:*:*:*"
] |
GHSA-4344-38jh-mj6x | Unspecified vulnerability in SAP Sybase Adaptive Server Enterprise (ASE) 15.0.3 before 15.0.3 ESD#4.3, 15.5 before 15.5 ESD#5.3, and 15.7 before 15.7 SP50 or 15.7 SP100 allows local users to obtain sensitive information via unspecified vectors. | [] |
|
GHSA-7gfx-wxfh-7rvm | Smarty Path Traversal Vulnerability | `Smarty_Security::isTrustedResourceDir()` in Smarty before 3.1.33 is prone to a path traversal vulnerability due to insufficient template code sanitization. This allows attackers controlling the executed template code to bypass the trusted directory security restriction and read arbitrary files. | [] |
GHSA-cqmc-38m3-4v5v | Cross-site scripting (XSS) vulnerability in the NGP COO/CWP Integration (crmngp) module 6.x before 6.x-1.12 for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified "user-supplied information." | [] |
|
CVE-2023-4612 | MFA bypass in Apereo CAS | Improper Authentication vulnerability in Apereo CAS in jakarta.servlet.http.HttpServletRequest.getRemoteAddr method allows Multi-Factor Authentication bypass.This issue affects CAS: through 7.0.0-RC7. It is unknown whether in new versions the issue will be fixed. For the date of publication there is no patch, and the vendor does not treat it as a vulnerability. | [
"cpe:2.3:a:apereo:central_authentication_service:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apereo:central_authentication_service:7.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apereo:central_authentication_service:7.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:apereo:central_authentication_service:7.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:apereo:central_authentication_service:7.0.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:apereo:central_authentication_service:7.0.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:apereo:central_authentication_service:7.0.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:apereo:central_authentication_service:7.0.0:rc7:*:*:*:*:*:*"
] |
CVE-2025-3340 | codeprojects Online Restaurant Management System combo_update.php sql injection | A vulnerability, which was classified as critical, has been found in codeprojects Online Restaurant Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/combo_update.php. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | [] |
GHSA-33q5-mhvx-53mf | The openssl_random_pseudo_bytes function in ext/openssl/openssl.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 incorrectly relies on the deprecated RAND_pseudo_bytes function, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors. | [] |
|
CVE-2020-17395 | This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 15.1.4. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the prl_naptd process. The issue results from the lack of proper validation of user-supplied data, which can result in an integer underflow before writing to memory. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the hypervisor. Was ZDI-CAN-11134. | [
"cpe:2.3:a:parallels:parallels_desktop:*:*:*:*:*:macos:*:*"
] |
|
CVE-2019-10418 | Jenkins Kubernetes :: Pipeline :: Arquillian Steps Plugin provides a custom whitelist for script security that allowed attackers to invoke arbitrary methods, bypassing typical sandbox protection. | [
"cpe:2.3:a:jenkins:kubernetes_pipeline:*:*:*:*:*:jenkins:*:*"
] |
|
CVE-2023-28371 | In Stellarium through 1.2, attackers can write to files that are typically unintended, such as ones with absolute pathnames or .. directory traversal. | [
"cpe:2.3:a:stellarium:stellarium:*:*:*:*:*:*:*:*"
] |
|
GHSA-h3g7-crqm-323f | modules/certs/manifests/config.pp in katello-configure before 1.3.3.pulpv2 in Katello uses weak permissions (666) for the Candlepin bootstrap RPM, which allows local users to modify the Candlepin CA certificate by writing to this file. | [] |
|
GHSA-f6vv-86p4-jjqr | An out-of-bounds read vulnerability was found in OpenJPEG 2.1.2, in the j2k_to_image tool. Converting a specially crafted JPEG2000 file to another format could cause the application to crash or, potentially, disclose some data from the heap. | [] |
|
CVE-2021-47325 | iommu/arm-smmu: Fix arm_smmu_device refcount leak in address translation | In the Linux kernel, the following vulnerability has been resolved:
iommu/arm-smmu: Fix arm_smmu_device refcount leak in address translation
The reference counting issue happens in several exception handling paths
of arm_smmu_iova_to_phys_hard(). When those error scenarios occur, the
function forgets to decrease the refcount of "smmu" increased by
arm_smmu_rpm_get(), causing a refcount leak.
Fix this issue by jumping to "out" label when those error scenarios
occur. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
CVE-2019-11499 | In the IMAP Server in Dovecot 2.3.3 through 2.3.5.2, the submission-login component crashes if AUTH PLAIN is attempted over a TLS secured channel with an unacceptable authentication message. | [
"cpe:2.3:a:dovecot:dovecot:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
] |
|
GHSA-34m4-9vvp-p7j9 | A vulnerability, which was classified as critical, has been found in Codezips Gym Management System 1.0. Affected by this issue is some unknown functionality of the file /dashboard/admin/updateroutine.php. The manipulation of the argument tid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.