id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2007-0516 | Yana Framework before 2.8.5a allows remote authenticated users with permissions to modify a guestbook profile to modify or delete arbitrary guestbook profiles via unspecified vectors. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:yana_framework:yana_framework:*:*:*:*:*:*:*:*",
"cpe:2.3:a:yana_framework:yana_framework:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:yana_framework:yana_framework:2.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:yana_framework:yana_framework:2.8.2a:*:*:*:*:*:*:*",
"cpe:2.3:a:yana_framework:yana_framework:2.8.3a:*:*:*:*:*:*:*"
] |
|
CVE-2023-36007 | Microsoft Send Customer Voice survey from Dynamics 365 Spoofing Vulnerability | Microsoft Send Customer Voice survey from Dynamics 365 Spoofing Vulnerability | [
"cpe:2.3:a:microsoft:send_customer_voice_survey_from_dynamics_365:*:*:*:*:*:*:*:*"
] |
CVE-2021-1298 | Cisco SD-WAN Command Injection Vulnerabilities | Multiple vulnerabilities in Cisco SD-WAN products could allow an authenticated attacker to perform command injection attacks against an affected device, which could allow the attacker to take certain actions with root privileges on the device. For more information about these vulnerabilities, see the Details section of this advisory. | [
"cpe:2.3:o:cisco:sd-wan_firmware:18.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sd-wan_firmware:18.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sd-wan_firmware:18.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sd-wan_firmware:18.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sd-wan_firmware:19.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sd-wan_firmware:19.2.99:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sd-wan_firmware:20.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sd-wan_vsmart_controller_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_100_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_1000_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_100b_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_100m_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_100wm_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_2000_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_5000_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_cloud_router:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:-:*:*:*:*:*:*:*"
] |
GHSA-48j8-pv27-h2vc | The Gangsta Auto Thief III (aka com.apptreestudios.gdup3) application 1.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
GHSA-wx56-xj4w-qc5p | KTH Kerberos IV allows local users to overwrite arbitrary files via a symlink attack on a ticket file. | [] |
|
GHSA-5fw4-hg92-mgm7 | An information disclosure vulnerability in GitLab CE/EE affecting all versions starting from 9.3 before 15.2.5, all versions starting from 15.3 before 15.3.4, all versions starting from 15.4 before 15.4.1 allows a project maintainer to access the DataDog integration API key from webhook logs. | [] |
|
GHSA-77r2-rjfh-m7wh | Cleartext transmission of sensitive information vulnerability in synorelayd in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows man-in-the-middle attackers to spoof servers via an HTTP session. | [] |
|
CVE-2021-36392 | In Moodle, an SQL injection risk was identified in the library fetching a user's enrolled courses. | [
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*"
] |
|
GHSA-wr75-c4vc-pmxm | A maliciously crafted CATPRODUCT file, when parsed through Autodesk AutoCAD, can force an Uninitialized Variable vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process. | [] |
|
GHSA-p2h9-m2hm-4gjp | IBM WebSphere MQ 7.1 is vulnerable to a denial of service, caused by an error when handling user ids. A remote attacker could exploit this vulnerability to bypass the security configuration setup on a SVRCONN channel and flood the queue manager. | [] |
|
GHSA-vww8-62hf-x3fx | kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks. | [] |
|
CVE-2008-0643 | Cross-site scripting (XSS) vulnerability in Adobe ColdFusion MX 7 and ColdFusion 8 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:adobe:coldfusion:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:8.0:*:*:*:*:*:*:*"
] |
|
CVE-2020-2748 | Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 3.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N). | [
"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
] |
|
CVE-2017-12335 | A vulnerability in the CLI of Cisco NX-OS System Software could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation of command arguments. An attacker could exploit this vulnerability by injecting crafted command arguments into a vulnerable CLI command and gain unauthorized access to the underlying operating system of the device. An exploit could allow the attacker to execute arbitrary commands at the user's privilege level. On products that support multiple virtual device contexts (VDCs), this vulnerability could allow an attacker to execute commands at the user's privilege level outside the user's environment. This vulnerability affects the following products running Cisco NX-OS System Software: Multilayer Director Switches, Nexus 2000 Series Fabric Extenders, Nexus 3000 Series Switches, Nexus 5000 Series Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules, Unified Computing System Manager. Cisco Bug IDs: CSCvf14923, CSCvf14926, CSCvg04095. | [
"cpe:2.3:o:cisco:nx-os:7.0\\(0\\)hsk\\(0.357\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.1\\(0\\)bd\\(0.20\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:7.0\\(0\\)hsk\\(0.357\\):*:*:*:*:*:*:*"
] |
|
GHSA-rhf4-g6xh-53vf | The ElementsKit Elementor addons plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.1.0 via the generate_navigation_markup function of the Onepage Scroll module. This makes it possible for authenticated attackers, with contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. | [] |
|
GHSA-2fx6-2pm7-cwvm | Server-Side Request Forgery (SSRF) vulnerability in Vova Anokhin WP Shortcodes Plugin — Shortcodes Ultimate.This issue affects WP Shortcodes Plugin — Shortcodes Ultimate: from n/a through 5.12.6. | [] |
|
GHSA-4f4x-r49q-p83m | TalkBack 2.3.14 does not properly restrict access to the edit comment feature (comments.php), which allows remote attackers to modify comments. | [] |
|
GHSA-59cp-cwvf-86j6 | Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects D8500 before 1.0.3.58, R6900P before 1.3.2.132, R7000P before 1.3.2.132, R7100LG before 1.0.0.64, WNDR3400v3 before 1.0.1.38, and XR300 before 1.0.3.56. | [] |
|
CVE-2023-47175 | Cross-site scripting vulnerability in LuxCal Web Calendar prior to 5.2.4M (MySQL version) and LuxCal Web Calendar prior to 5.2.4L (SQLite version) allows a remote unauthenticated attacker to execute an arbitrary script on the web browser of the user who is accessing the product. | [
"cpe:2.3:a:luxsoft:luxcal_web_calendar:*:*:*:*:sqlite:*:*:*",
"cpe:2.3:a:luxsoft:luxcal_web_calendar:*:*:*:*:mysql:*:*:*"
] |
|
CVE-2023-21947 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services). Supported versions that are affected are 8.0.32 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
] |
|
GHSA-r324-w5w4-pgc6 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.7.23 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.0 Base Score 5.4 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L). | [] |
|
CVE-2021-29768 | IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 could allow a low level user to obtain sensitive information from the details of the 'Cloud Storage' page for which they should not have access. IBM X-Force ID: 202682. | [
"cpe:2.3:a:ibm:cognos_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.1.7:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.1.7:fixpack1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.1.7:fixpack2:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.1.7:fixpack3:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.1.7:fixpack4:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
] |
|
CVE-2008-2554 | Multiple SQL injection vulnerabilities in BP Blog 6.0 allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to template_permalink.asp and (2) cat parameter to template_archives_cat.asp. | [
"cpe:2.3:a:bp_blog:bp_blog:6.0:*:*:*:*:*:*:*"
] |
|
CVE-2021-32582 | An issue was discovered in ConnectWise Automate before 2021.5. A blind SQL injection vulnerability exists in core agent inventory communication that can enable an attacker to extract database information or administrative credentials from an instance via crafted monitor status responses. | [
"cpe:2.3:a:connectwise:connectwise_automate:*:*:*:*:*:*:*:*"
] |
|
GHSA-qc7j-rj7f-v6w6 | The mintToken function of a smart contract implementation for TCash, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [] |
|
GHSA-73m9-q5p6-vhgf | Wibu-Systems CodeMeter Runtime before 5.20 uses weak permissions (read and write access for all users) for codemeter.exe, which allows local users to gain privileges via a Trojan horse file. | [] |
|
GHSA-rxgh-9c22-r8rj | Multiple memory corruption issues were addressed with improved input validation. This issue is fixed in macOS Mojave 10.14.4. Processing malicious data may lead to unexpected application termination. | [] |
|
CVE-2024-27628 | Buffer Overflow vulnerability in DCMTK v.3.6.8 allows an attacker to execute arbitrary code via the EctEnhancedCT method component. | [
"cpe:2.3:a:offis:dcmtk:3.6.8:*:*:*:*:*:*:*"
] |
|
CVE-2007-0342 | WebCore in Apple WebKit build 18794 allows remote attackers to cause a denial of service (null dereference and application crash) via a TD element with a large number in the ROWSPAN attribute, as demonstrated by a crash of OmniWeb 5.5.3 on Mac OS X 10.4.8, a different vulnerability than CVE-2006-2019. | [
"cpe:2.3:a:apple:safari:2.0.4_419.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:webkit:build_18794:*:*:*:*:*:*:*",
"cpe:2.3:a:omnigroup:omniweb:5.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*"
] |
|
CVE-2025-3246 | Markdown math block sanitization bypass allows privilege escalation and unauthorized workflow triggers | An improper neutralization of input vulnerability was identified in GitHub Enterprise Server that allowed cross-site scripting in GitHub Markdown that used `$$..$$` math blocks. Exploitation required access to the target GitHub Enterprise Server instance and privileged user interaction with the malicious elements. This vulnerability affected version 3.16.1 of GitHub Enterprise Server and was fixed in version 3.16.2. This vulnerability was reported via the GitHub Bug Bounty program. | [] |
GHSA-5hqm-r2hv-cmwq | SQL injection vulnerability in search.php in VCD-db 0.98 and earlier allows remote attackers to execute arbitrary SQL commands via the by parameter. | [] |
|
GHSA-vm8x-w2mq-hvv9 | Oracle JDeveloper 9.0.4, 9.0.5, and 10.1.2 passes the cleartext password as a parameter when starting sqlplus, which allows local users to gain sensitive information. | [] |
|
CVE-2024-48396 | AIML Chatbot 1.0 (fixed in 2.0) is vulnerable to Cross Site Scripting (XSS). The vulnerability is exploited through the message input field, where attackers can inject malicious HTML or JavaScript code. The chatbot fails to sanitize these inputs, leading to the execution of malicious scripts. | [
"cpe:2.3:a:sohelamin:chatbot:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2010-2770 | Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 on Mac OS X allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted font in a data: URL. | [
"cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*"
] |
|
GHSA-r7c8-hj86-5mfc | The Advanced Custom Fields (ACF) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via a custom text field in all versions up to, and including, 6.2.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
GHSA-48x8-8cxr-j62c | TOTOLINK X6000R V9.4.0cu.852_B20230719 is vulnerable to Incorrect Access Control.Attackers can reset login password & WIFI passwords without authentication. | [] |
|
GHSA-7g54-698x-rx4w | The binary MP4Box in Gpac through 1.0.1 has a double-free vulnerability in the iloc_entry_del funciton in box_code_meta.c, which allows attackers to cause a denial of service. | [] |
|
GHSA-w84c-gxm3-wgvc | An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at ‘company_filter’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. | [] |
|
CVE-2024-55920 | Cross-Site Request Forgery in Dashboard Module in TYPO3 | TYPO3 is a free and open source Content Management Framework. A vulnerability has been identified in the backend user interface functionality involving deep links. Specifically, this functionality is susceptible to Cross-Site Request Forgery (CSRF). Additionally, state-changing actions in downstream components incorrectly accepted submissions via HTTP GET and did not enforce the appropriate HTTP method. Successful exploitation of this vulnerability requires the victim to have an active session on the backend user interface and to be deceived into interacting with a malicious URL targeting the backend, which can occur under the following conditions: The user opens a malicious link, such as one sent via email. The user visits a compromised or manipulated website while the following settings are misconfigured: 1. `security.backend.enforceReferrer` feature is disabled, 2. `BE/cookieSameSite` configuration is set to lax or none. The vulnerability in the affected downstream component “Dashboard Module” allows attackers to manipulate the victim’s dashboard configuration. Users are advised to update to TYPO3 versions 11.5.42 ELTS, 12.4.25 LTS, 13.4.3 LTS which fix the problem described. There are no known workarounds for this vulnerability. | [] |
CVE-2013-3738 | A File Inclusion vulnerability exists in Zabbix 2.0.6 due to inadequate sanitization of request strings in CGI scripts, which could let a remote malicious user execute arbitrary code. | [
"cpe:2.3:a:zabbix:zabbix:2.0.6:*:*:*:*:*:*:*"
] |
|
GHSA-qjrp-xgm3-mxhj | Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links. | [] |
|
CVE-2017-16582 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.2.25013. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the clearItems XFA method. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5288. | [
"cpe:2.3:a:foxitsoftware:foxit_reader:8.3.2.25013:*:*:*:*:*:*:*"
] |
|
CVE-2006-6483 | Adobe ColdFusion MX 7.x before 7.0.2 does not properly filter HTML tags when protecting against cross-site scripting (XSS) attacks, which allows remote attackers to inject arbitrary web script or HTML via a NULL byte (%00) in certain HTML tags, as demonstrated using "%00script" in a tag. | [
"cpe:2.3:a:adobe:coldfusion:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:7.0.1:*:*:*:*:*:*:*"
] |
|
CVE-2021-25947 | Prototype pollution vulnerability in 'nestie' versions 0.0.0 through 1.0.0 allows an attacker to cause a denial of service and may lead to remote code execution. | [
"cpe:2.3:a:nestie_project:nestie:*:*:*:*:*:node.js:*:*"
] |
|
GHSA-cqr3-h8cv-gwg3 | Insecure Direct Object References (IDOR) in access control in Customer Portal before 2.1.4 on NightWolf Penetration Testing allows an attacker to access via manipulating request parameters or object references. | [] |
|
CVE-2011-1341 | Cross-site request forgery (CSRF) vulnerability in Aimluck Aipo before 4.0.4.0, and Aipo for ASP before 4.0.4.0, allows remote attackers to hijack the authentication of administrators for requests that modify data. | [
"cpe:2.3:a:aimluck:aipo:*:*:*:*:*:*:*:*",
"cpe:2.3:a:aimluck:aipo:4.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:aimluck:aipo:4.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:aimluck:aipo-asp:*:*:*:*:*:*:*:*"
] |
|
GHSA-qhh9-23rj-2x83 | An improper access control issue in GitLab CE/EE affecting all versions from 11.3 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allowed an unauthorized user to see release names even when releases we set to be restricted to project members only | [] |
|
GHSA-j6pg-h597-gcx9 | A host header injection vulnerability in MEANStore 1.0 allows attackers to obtain the password reset token via user interaction with a crafted password reset link. This allows attackers to arbitrarily reset other users' passwords and compromise their accounts. | [] |
|
GHSA-wfg6-p4vx-3rfr | The LTL Freight Quotes – SEFL Edition plugin for WordPress is vulnerable to SQL Injection via the 'dropship_edit_id' and 'edit_id' parameters in all versions up to, and including, 3.2.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | [] |
|
GHSA-x2pc-9gc4-6xm6 | Windows Storage Services in Windows 10 versions 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way objects are handled in memory, aka "Windows Storage Services Elevation of Privilege Vulnerability". | [] |
|
GHSA-c76g-44jf-rggf | Freelance Website Script 2.0.6 has SQL Injection via the jobdetails.php pr_id parameter or the searchbycat_list.php catid parameter. | [] |
|
CVE-2018-8472 | An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, allowing an attacker to retrieve information from a targeted system, aka "Windows GDI Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
|
CVE-2017-17725 | In Exiv2 0.26, there is an integer overflow leading to a heap-based buffer over-read in the Exiv2::getULong function in types.cpp. Remote attackers can exploit the vulnerability to cause a denial of service via a crafted image file. Note that this vulnerability is different from CVE-2017-14864, which is an invalid memory address dereference. | [
"cpe:2.3:a:exiv2:exiv2:0.26:*:*:*:*:*:*:*"
] |
|
GHSA-pmxv-x7hh-7gg7 | Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android insufficiently sanitized DevTools URLs, which allowed a remote attacker to read local files via a crafted HTML page. | [] |
|
CVE-2023-30437 | IBM Security Guardium information disclosure | IBM Security Guardium 11.3, 11.4, and 11.5 could allow an unauthorized user to enumerate usernames by sending a specially crafted HTTP request. IBM X-Force ID: 252293. | [
"cpe:2.3:a:ibm:security_guardium:11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_guardium:11.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_guardium:11.5:*:*:*:*:*:*:*"
] |
GHSA-8595-j2cp-f8px | The login for Hosting Controller 1.1 through 1.4.1 returns different error messages when a valid or invalid user is provided, which allows remote attackers to determine the existence of valid usernames and makes it easier to conduct a brute force attack. | [] |
|
CVE-2021-32711 | Leak of information via Store-API | Shopware is an open source eCommerce platform. Versions prior to 6.3.5.1 may leak of information via Store-API. The vulnerability could only be fixed by changing the API system, which involves a non-backward-compatible change. Only consumers of the Store-API should be affected by this change. We recommend to update to the current version 6.3.5.1. You can get the update to 6.3.5.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 The vulnerability could only be fixed by changing the API system, which involves a non-backward-compatible change. Only consumers of the Store-API should be affected by this change. Please check your plugins if you have it in use. Detailed technical information can be found in the upgrade information. https://github.com/shopware/platform/blob/v6.3.5.1/UPGRADE-6.3.md#6351 ### Workarounds For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021 | [
"cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:*"
] |
GHSA-fj34-jgxp-cv4f | If Firefox is installed to a user-writable directory, the Mozilla Maintenance Service would execute updater.exe from the install location with system privileges. Although the Mozilla Maintenance Service does ensure that updater.exe is signed by Mozilla, the version could have been rolled back to a previous version which would have allowed exploitation of an older bug and arbitrary code execution with System Privileges. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 80, Thunderbird < 78.2, Thunderbird < 68.12, Firefox ESR < 68.12, and Firefox ESR < 78.2. | [] |
|
CVE-2025-24095 | This issue was addressed with additional entitlement checks. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4. An app may be able to bypass Privacy preferences. | [] |
|
GHSA-gg3w-r79x-787f | An out-of-bounds write in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to cause a denial of service. | [] |
|
CVE-2010-1059 | Directory traversal vulnerability in staff/app/common.inc.php in Phpkobo Address Book Script 1.09, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the LANG_CODE parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:phpkobo:address_book_script:1.09:*:*:*:*:*:*:*"
] |
|
GHSA-vcqh-2q2g-pgc3 | The “LANDesk(R) Management Agent” service exposes a socket and once connected, it is possible to launch commands only for signed executables. This is a security bug that allows a limited user to get escalated admin privileges on their system. | [] |
|
CVE-2023-33007 | Jenkins LoadComplete support Plugin 1.0 and earlier does not escape the LoadComplete test name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | [
"cpe:2.3:a:jenkins:loadcomplete_support:*:*:*:*:*:jenkins:*:*"
] |
|
GHSA-v9mp-rrg9-4gxj | SQL injection vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via the emp_id parameter at employee_detail.php. | [] |
|
CVE-2013-4272 | The BOTCHA Spam Prevention module 7.x-1.x before 7.x-1.6, 7.x-2.x before 7.x-2.1, and 7.x-3.x before 7.x-3.3 for Drupal, when the debugging level is set to 5 or 6, logs the content of submitted forms, which allows context-dependent users to obtain sensitive information such as usernames and passwords by reading the log file. | [
"cpe:2.3:a:botcha_spam_prevention_project:botcha:7.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:botcha_spam_prevention_project:botcha:7.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:botcha_spam_prevention_project:botcha:7.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:botcha_spam_prevention_project:botcha:7.x-1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:botcha_spam_prevention_project:botcha:7.x-1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:botcha_spam_prevention_project:botcha:7.x-1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:botcha_spam_prevention_project:botcha:7.x-1.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:botcha_spam_prevention_project:botcha:7.x-2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:botcha_spam_prevention_project:botcha:7.x-2.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:botcha_spam_prevention_project:botcha:7.x-3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:botcha_spam_prevention_project:botcha:7.x-3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:botcha_spam_prevention_project:botcha:7.x-3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:botcha_spam_prevention_project:botcha:7.x-3.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*"
] |
|
GHSA-h3fj-247x-cqr8 | Citrix NetScaler AppFirewall, as used in NetScaler 10.5, allows remote attackers to bypass intended firewall restrictions via a crafted Content-Type header, as demonstrated by the application/octet-stream and text/xml Content-Types. | [] |
|
CVE-2010-0028 | Integer overflow in Microsoft Paint in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 allows remote attackers to execute arbitrary code via a crafted JPEG (.JPG) file, aka "MS Paint Integer Overflow Vulnerability." | [
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*"
] |
|
CVE-2021-38553 | HashiCorp Vault and Vault Enterprise 1.4.0 through 1.7.3 initialized an underlying database file associated with the Integrated Storage feature with excessively broad filesystem permissions. Fixed in Vault and Vault Enterprise 1.8.0. | [
"cpe:2.3:a:hashicorp:vault:*:*:*:*:-:*:*:*",
"cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*"
] |
|
CVE-2022-2754 | Ketchup Restaurant Reservations <= 1.0.0 - Unauthenticated Blind SQLi | The Ketchup Restaurant Reservations WordPress plugin through 1.0.0 does not validate and escape some reservation parameters before using them in SQL statements, which could allow unauthenticated attackers to perform SQL Injection attacks | [
"cpe:2.3:a:ketchup_restaurant_reservations_project:ketchup_restaurant_reservations:*:*:*:*:*:wordpress:*:*"
] |
GHSA-g2p3-j47p-8cwj | Kerberos Security Feature Bypass Vulnerability | [] |
|
CVE-2020-5854 | On BIG-IP 15.0.0-15.0.1.1, 14.1.0-14.1.2.2, 14.0.0-14.0.1, 13.1.0-13.1.3.1, 12.1.0-12.1.5, and 11.6.0-11.6.5.1, the tmm crashes under certain circumstances when using the connector profile if a specific sequence of connections are made. | [
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-iq_centralized_management:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:enterprise_manager:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:iworkflow:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*"
] |
|
CVE-2013-5421 | Cross-site scripting (XSS) vulnerability in the IMS server before Ifix 6 in IBM Security Access Manager for Enterprise Single Sign-On (ISAM ESSO) 8.2 allows remote attackers to inject arbitrary web script or HTML via crafted input to an unspecified dynamic web form. | [
"cpe:2.3:a:ibm:security_access_manager_for_enterprise_single_sign-on:8.2:*:*:*:*:*:*:*"
] |
|
GHSA-c4gp-6356-63vc | In MuPDF 1.12.0 and earlier, multiple use of uninitialized value bugs in the PDF parser could allow an attacker to cause a denial of service (crash) or influence program flow via a crafted file. | [] |
|
GHSA-xj8q-vqrm-hvqr | Cross-site scripting (XSS) vulnerability in _layouts/help.aspx in Microsoft SharePoint Server 2007 12.0.0.6421 and possibly earlier, and SharePoint Services 3.0 SP1 and SP2, versions, allows remote attackers to inject arbitrary web script or HTML via the cid0 parameter. | [] |
|
CVE-2008-0263 | The SIP module in Ingate Firewall before 4.6.1 and SIParator before 4.6.1 does not reuse SIP media ports in unspecified call hold and send-only stream scenarios, which allows remote attackers to cause a denial of service (port exhaustion) via unspecified vectors. | [
"cpe:2.3:a:ingate:firewall:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ingate:ingate_siparator:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-37466 | WordPress Mega Elements plugin <= 1.2.2 - Contributor+ Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kraftplugins Mega Elements.This issue affects Mega Elements: from n/a through 1.2.2. | [
"cpe:2.3:a:kraftplugins:mega_elements:*:*:*:*:*:wordpress:*:*"
] |
GHSA-v775-c4m3-q2r5 | The weblibrarian plugin before 3.4.8.5 for WordPress has XSS via front-end short codes. | [] |
|
CVE-2020-10915 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of VEEAM One Agent 9.5.4.4587. Authentication is not required to exploit this vulnerability. The specific flaw exists within the HandshakeResult method. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-10401. | [
"cpe:2.3:a:veeam:one:9.5.4.4587:*:*:*:*:*:*:*"
] |
|
GHSA-h3w5-5wfj-phcx | A malicious crafted dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process. | [] |
|
GHSA-j68f-72hx-632q | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L). | [] |
|
GHSA-gv66-5jhq-833c | Tenda AC10 V4.0si_V16.03.10.20 is vulnerable to Buffer Overflow in AdvSetMacMtuWan via serviceName2. | [] |
|
CVE-2021-36260 | A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands. | [
"cpe:2.3:o:hikvision:ds-2cd2026g2-iu\\/sl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2026g2-iu\\/sl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2046g2-iu\\/sl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2046g2-iu\\/sl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2066g2-i\\(u\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2066g2-i\\(u\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2066g2-iu\\/sl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2066g2-iu\\/sl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2086g2-i\\(u\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2086g2-i\\(u\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2086g2-iu\\/sl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2086g2-iu\\/sl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2166g2-i\\(su\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2166g2-i\\(su\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2186g2-i\\(su\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2186g2-i\\(su\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2186g2-isu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2186g2-isu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2326g2-isu\\/sl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2326g2-isu\\/sl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2346g2-isu\\/sl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2346g2-isu\\/sl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2366g2-i\\(u\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2366g2-i\\(u\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2366g2-isu\\/sl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2366g2-isu\\/sl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2386g2-i\\(u\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2386g2-i\\(u\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2386g2-isu\\/sl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2386g2-isu\\/sl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2426g2-i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2426g2-i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2446g2-i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2446g2-i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2526g2-i\\(s\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2526g2-i\\(s\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2526g2-is_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2526g2-is:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2546g2-i\\(s\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2546g2-i\\(s\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2566g2-i\\(s\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2566g2-i\\(s\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2586g2-i\\(s\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2586g2-i\\(s\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2626g2-izsu\\/sl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2626g2-izsu\\/sl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2646g2-izsu\\/sl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2646g2-izsu\\/sl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2666g2-izs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2666g2-izs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2666g2-izsu\\/sl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2666g2-izsu\\/sl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2686g2-izs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2686g2-izs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2686g2-izsu\\/sl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2686g2-izsu\\/sl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2766g2-izs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2766g2-izs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2786g2-izs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2786g2-izs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2027g2-l\\(u\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2027g2-l\\(u\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2047g2-l\\(u\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2047g2-l\\(u\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2027g2-lu\\/sl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2027g2-lu\\/sl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2087g2-l\\(u\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2087g2-l\\(u\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2127g2-\\(-su\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2127g2-\\(-su\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2147g2-l\\(su\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2147g2-l\\(su\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2327g2-l\\(u\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2327g2-l\\(u\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2347g2-l\\(u\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2347g2-l\\(u\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2347g2-lsu\\/sl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2347g2-lsu\\/sl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2387g2-l\\(u\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2387g2-l\\(u\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2527g2-ls_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2527g2-ls:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2547g2-ls_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2547g2-ls:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2547g2-lzs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2547g2-lzs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2121g0-i\\(w\\)\\(s\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2121g0-i\\(w\\)\\(s\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2321g0-i\\/nf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2321g0-i\\/nf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2421g0-i\\(d\\)\\(w\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2421g0-i\\(d\\)\\(w\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2421g0-i\\(d\\)w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2421g0-i\\(d\\)w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2621g0-i\\(z\\)\\(s\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2621g0-i\\(z\\)\\(s\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2721g0-i\\(z\\)\\(s\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2721g0-i\\(z\\)\\(s\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2121g1-i\\(w\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2121g1-i\\(w\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2121g1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2121g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2121g1-idw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2121g1-idw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2023g2-i\\(u\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2023g2-i\\(u\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2043g2-i\\(u\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2043g2-i\\(u\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2063g2-i\\(u\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2063g2-i\\(u\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2083g2-i\\(u\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2083g2-i\\(u\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2123g2-i\\(s\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2123g2-i\\(s\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2123g2-iu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2123g2-iu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2143g2-i\\(s\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2143g2-i\\(s\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2143g2-iu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2143g2-iu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2163g2-i\\(s\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2163g2-i\\(s\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2163g2-iu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2163g2-iu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2183g2-i\\(s\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2183g2-i\\(s\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2183g2-iu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2183g2-iu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2323g2-i\\(u\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2323g2-i\\(u\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2343g2-i\\(u\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2343g2-i\\(u\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2363g2-i\\(u\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2363g2-i\\(u\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2183g2-i\\(u\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2183g2-i\\(u\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2523g2-i\\(s\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2523g2-i\\(s\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2543g2-i\\(ws\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2543g2-i\\(ws\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2563g2-i\\(s\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2563g2-i\\(s\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2583g2-i\\(s\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2583g2-i\\(s\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2623g2-izs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2623g2-izs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2643g2-izs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2643g2-izs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2663g2-izs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2663g2-izs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2683g2-izs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2683g2-izs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2723g2-izs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2723g2-izs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2743g2-izs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2743g2-izs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2763g2-izs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2763g2-izs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2783g2-izs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2783g2-izs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3023g2-iu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3023g2-iu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3043g2-iu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3043g2-iu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3063g2-iu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3063g2-iu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3123g2-i\\(s\\)u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3123g2-i\\(s\\)u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3143g2-i\\(s\\)u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3143g2-i\\(s\\)u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3163g2-i\\(s\\)u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3163g2-i\\(s\\)u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3323g2-iu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3323g2-iu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3343g2-iu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3343g2-iu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3363g2-iu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3363g2-iu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3523g2-is_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3523g2-is:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3543g2-is_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3543g2-is:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3563g2-is_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3563g2-is:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3623g2-izs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3623g2-izs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3643g2-izs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3643g2-izs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3663g2-izs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3663g2-izs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3723g2-izs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3723g2-izs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3743g2-izs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3743g2-izs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3763g2-izs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3763g2-izs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2021g1-i\\(w\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2021g1-i\\(w\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2383g2-i\\(u\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2383g2-i\\(u\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2523g2-i\\(u\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2523g2-i\\(u\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3026g2-iu\\/sl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3026g2-iu\\/sl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3056g2iu\\/sl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3056g2iu\\/sl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3126g2-is_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3126g2-is:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3126g2-is\\(u\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3126g2-is\\(u\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3156g2-is_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3156g2-is:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3156g2-is\\(u\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3156g2-is\\(u\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3186g2-is\\(u\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3186g2-is\\(u\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3326g2-isu\\/sl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3326g2-isu\\/sl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3356g2-is_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3356g2-is:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3356g2-is\\(u\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3356g2-is\\(u\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3356g2-isu\\/sl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3356g2-isu\\/sl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3386g2-is_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3386g2-is:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3386g2-is\\(u\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3386g2-is\\(u\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3526g2-is_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3526g2-is:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3556g2-is_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3556g2-is:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3586g2-is_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3586g2-is:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3626g2-izs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3626g2-izs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3726g2-izs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3726g2-izs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3026g2-is_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3026g2-is:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3056g2-is_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3056g2-is:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3056g2-iu\\/sl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3056g2-iu\\/sl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3086g2-is_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3086g2-is:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3656g2-izs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3656g2-izs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3686g2-izs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3686g2-izs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3756g2-izs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3756g2-izs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3786g2-izs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3786g2-izs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3047g2-ls_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3047g2-ls:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3347g2-ls\\(u\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3347g2-ls\\(u\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd3547g2-ls_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd3547g2-ls:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2xe6242f-is\\/316l\\(b\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2xe6242f-is\\/316l\\(b\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2xe6422fwd-izhrs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2xe6422fwd-izhrs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2xe6442f-izhrs\\(b\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2xe6442f-izhrs\\(b\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2xe6452f-izh\\(r\\)s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2xe6452f-izh\\(r\\)s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2xe6482f-izhrs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2xe6482f-izhrs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2dyh2a0ixs-d\\(t2\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2dyh2a0ixs-d\\(t2\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2dy9236i8x-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2dy9236i8x-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2dy9236i8x-a\\(t3\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2dy9236i8x-a\\(t3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2dy9236ix-a\\(t3\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2dy9236ix-a\\(t3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2dy9236x-a\\(t3\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2dy9236x-a\\(t3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2dy9240ix-a\\(t5\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2dy9240ix-a\\(t5\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2dy9250izs-a\\(t5\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2dy9250izs-a\\(t5\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2dy92500x-a\\(t5\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2dy92500x-a\\(t5\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ptz-n2204i-de3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ptz-n2204i-de3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ptz-n2404i-de3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ptz-n2404i-de3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ptz-n4215-de3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ptz-n4215-de3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ptz-n4215i-de_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ptz-n4215i-de:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ptz-n4225i-de_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ptz-n4225i-de:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ptz-n5225i-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ptz-n5225i-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df5225x-ae3\\(t3\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df5225x-ae3\\(t3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df5225x-ael\\(t3\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df5225x-ael\\(t3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df5232x-ae3\\)t3\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df5232x-ae3\\)t3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df5232x-ael\\(t3\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df5232x-ael\\(t3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df6a225x-ael\\)t3\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df6a225x-ael\\)t3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df6a236x-ael\\(t3\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df6a236x-ael\\(t3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df6a425x-ael\\(t3\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df6a425x-ael\\(t3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df6a436x-ael\\(t3\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df6a436x-ael\\(t3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df6a436x-ael\\(t5\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df6a436x-ael\\(t5\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df6a436x-aely\\(t5\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df6a436x-aely\\(t5\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df6a825x-ael_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df6a825x-ael:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df6a836x-ael\\(t5\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df6a836x-ael\\(t5\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df7225ix-ael\\(t3\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df7225ix-ael\\(t3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df7225ix-aelw\\(t3\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df7225ix-aelw\\(t3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df7232ix-ael\\(t3\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df7232ix-ael\\(t3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df7232ix-aelw\\(t3\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df7232ix-aelw\\(t3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df8225ih-ael_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df8225ih-ael:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df8225ih-ael\\(w\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df8225ih-ael\\(w\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df8225ix-ael\\(t3\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df8225ix-ael\\(t3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df8225ix-ael\\(t5\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df8225ix-ael\\(t5\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df8225ix-aelw\\(t3\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df8225ix-aelw\\(t3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df8225ix-aelw\\(t5\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df8225ix-aelw\\(t5\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df8236i5x-aelw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df8236i5x-aelw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df8242i5x-aelw\\(t3\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df8242i5x-aelw\\(t3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df8242i5x-aelw\\(t5\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df8242i5x-aelw\\(t5\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df8242i5x-ael\\(t3\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df8242i5x-ael\\(t3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df8242ix-ael\\(t5\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df8242ix-ael\\(t5\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df8242ix-aelw\\(t3\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df8242ix-aelw\\(t3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df8242ix-aely\\(t3\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df8242ix-aely\\(t3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df8250i8x-ael\\(t3\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df8250i8x-ael\\(t3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df8425ix-ael\\(t3\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df8425ix-ael\\(t3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df8425ix-ael\\(t5\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df8425ix-ael\\(t5\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df8425ix-aelw\\(t3\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df8425ix-aelw\\(t3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df8425ix-aelw\\(t5\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df8425ix-aelw\\(t5\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df8436i5x-aelw\\(t3\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df8436i5x-aelw\\(t3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df8442ixs-ael\\(t5\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df8442ixs-ael\\(t5\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df8442ixs-aelw\\(t2\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df8442ixs-aelw\\(t2\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df8442ixs-aelw\\(t5\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df8442ixs-aelw\\(t5\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df8442ixs-aelwy\\(t5\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df8442ixs-aelwy\\(t5\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df8442ixs-aely\\(t5\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df8442ixs-aely\\(t5\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df8a442ixs-ael\\(t2\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df8a442ixs-ael\\(t2\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df8a442ixs-ael\\(t5\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df8a442ixs-ael\\(t5\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df8a442ixs-aely\\(t5\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df8a442ixs-aely\\(t5\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df8a442ixs-af\\/sp\\(t5\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df8a442ixs-af\\/sp\\(t5\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df8a442nxs-ael\\(t5\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df8a442nxs-ael\\(t5\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2df8a842ixs-ael\\(t5\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2df8a842ixs-ael\\(t5\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ids-2pt9a144mxs-d\\/t2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ids-2pt9a144mxs-d\\/t2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ids-2sk718mxs-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ids-2sk718mxs-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ids-2sk8144ixs-d\\/j_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ids-2sk8144ixs-d\\/j:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ids-2vs435-f840-ey_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ids-2vs435-f840-ey:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ids-2vs435-f840-ey\\(t3\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ids-2vs435-f840-ey\\(t3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2td1217b-3\\/pa_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2td1217b-3\\/pa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2td1217b-6\\/pa_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2td1217b-6\\/pa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2td1117-2\\/pa_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2td1117-2\\/pa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2td1117-3\\/pa_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2td1117-3\\/pa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2td1117-6\\/pa_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2td1117-6\\/pa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2td4136t-9_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2td4136t-9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2td4137-25\\/w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2td4137-25\\/w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2td4137-50\\/w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2td4137-50\\/w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2td4166t-9_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2td4166t-9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2td4167-25\\/w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2td4167-25\\/w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2td4167-50\\/w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2td4167-50\\/w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2td6236t-50h2l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2td6236t-50h2l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2td6237-50h4l\\/w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2td6237-50h4l\\/w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2td6237-75c4l\\/w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2td6237-75c4l\\/w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2td6266t-25h2l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2td6266t-25h2l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2td6266t-50h2l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2td6266t-50h2l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2td6267-100c4l\\/w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2td6267-100c4l\\/w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2td6267-100c4l\\/wy_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2td6267-100c4l\\/wy:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2td6267-50h4l\\/w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2td6267-50h4l\\/w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2td6267-75c4l\\/w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2td6267-75c4l\\/w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2td6267-75c4l\\/wy_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2td6267-75c4l\\/wy:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2td8166-100c2f\\/v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2td8166-100c2f\\/v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2td8166-150ze2f\\/v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2td8166-150ze2f\\/v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2td8166-150zh2f\\/v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2td8166-150zh2f\\/v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2td8166-180ze2f\\/v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2td8166-180ze2f\\/v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2td8166-75c2f\\/v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2td8166-75c2f\\/v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2td8167-150zc4f\\/w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2td8167-150zc4f\\/w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2td8167-190ze2f\\/w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2td8167-190ze2f\\/w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2td8167-190ze2f\\/wy_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2td8167-190ze2f\\/wy:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2td8167-230zg2f\\/w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2td8167-230zg2f\\/w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2td8167-230zg2f\\/wy_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2td8167-230zg2f\\/wy:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-7604ni-k1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-7604ni-k1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-760ni-k1\\/4p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-760ni-k1\\/4p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-7604ni-k1\\/4p\\/4g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-7604ni-k1\\/4p\\/4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-7608ni-k1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-7608ni-k1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-7608ni-k1\\/4g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-7608ni-k1\\/4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-7608ni-k1\\/8p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-7608ni-k1\\/8p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-7608ni-k1\\/8p\\/4g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-7608ni-k1\\/8p\\/4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-7616ni-k1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-7616ni-k1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-7604ni-q1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-7604ni-q1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-7604ni-q1\\/4p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-7604ni-q1\\/4p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-7608ni-q1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-7608ni-q1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-7608ni-q1\\/8p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-7608ni-q1\\/8p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-7608ni-q2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-7608ni-q2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-7608ni-q2\\/8p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-7608ni-q2\\/8p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-7616ni-q1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-7616ni-q1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-7616ni-q2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-7616ni-q2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-7616ni-q2\\/16p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-7616ni-q2\\/16p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-7104ni-q1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-7104ni-q1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-7104ni-q1\\/4p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-7104ni-q1\\/4p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-7104ni-q1\\/4p\\/m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-7104ni-q1\\/4p\\/m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-7104ni-q1\\/m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-7104ni-q1\\/m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-7108ni-q1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-7108ni-q1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-7108ni-q1\\/8p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-7108ni-q1\\/8p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-7108ni-q1\\/8p\\/m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-7108ni-q1\\/8p\\/m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-7108ni-q1\\/m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-7108ni-q1\\/m:-:*:*:*:*:*:*:*"
] |
|
CVE-2023-1725 | SSRF in Infoline Project Management System | Server-Side Request Forgery (SSRF) vulnerability in Infoline Project Management System allows Server Side Request Forgery.This issue affects Project Management System: before 4.09.31.125.
| [
"cpe:2.3:a:infoline-tr:project_management_system:*:*:*:*:*:*:*:*"
] |
CVE-2017-0663 | A remote code execution vulnerability in libxml2 could enable an attacker using a specially crafted file to execute arbitrary code within the context of an unprivileged process. This issue is rated as High due to the possibility of remote code execution in an application that uses this library. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37104170. | [
"cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*"
] |
|
CVE-2022-22990 | Limited authentication bypass vulnerability on Western Digital My Cloud devices | A limited authentication bypass vulnerability was discovered that could allow an attacker to achieve remote code execution and escalate privileges on the My Cloud devices. Addressed this vulnerability by changing access token validation logic and rewriting rule logic on PHP scripts. | [
"cpe:2.3:o:westerndigital:my_cloud_os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_dl2100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_dl4100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_ex2_ultra:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_ex2100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_ex4100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_mirror_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_pr2100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_pr4100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:wd_cloud:-:*:*:*:*:*:*:*"
] |
GHSA-qv8f-prp5-4524 | Stack-based buffer overflow in GOM Player 2.1.33.5071 allows user-assisted remote attackers to execute arbitrary code via a .ASX file with a long URI in the "ref href" tag. NOTE: this issue exists because of a CVE-2007-0707 regression. | [] |
|
GHSA-xc6q-cvpj-g5ch | IBM WebSphere Application Server - Liberty 17.0.0.3 through 20.0.0.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 176670. | [] |
|
GHSA-rrwf-mrcc-mrgc | Mozilla Firefox 3.0.8 and earlier 3.0.x versions allows remote attackers to cause a denial of service (memory corruption) via an XML document composed of a long series of start-tags with no corresponding end-tags. NOTE: it was later reported that 3.0.10 and earlier are also affected. | [] |
|
GHSA-8m4h-6f46-9p55 | A heap based buffer overflow issue exists in GNU LibreDWG 0.10.2641 via output_TEXT ../../programs/dwg2SVG.c:114. | [] |
|
CVE-2007-5782 | Directory traversal vulnerability in dl.php in FireConfig 0.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter. | [
"cpe:2.3:a:fireconfig:fireconfig:0.5:*:*:*:*:*:*:*"
] |
|
GHSA-pmw6-mg69-65jh | NewType WebEIP v3.0 does not properly validate user input, allowing a remote attacker with regular privileges to insert JavaScript into specific parameters, resulting in a Reflected Cross-site Scripting (XSS) attack. The affected product is no longer maintained. It is recommended to upgrade to the new product. | [] |
|
GHSA-h4gg-9gq4-7c4h | rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access. | [] |
|
CVE-2019-20042 | In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function wp_targeted_link_rel() can be used in a particular way to result in a stored cross-site scripting (XSS) vulnerability. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release. | [
"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] |
|
CVE-2025-23566 | WordPress Custom Post plugin <= 1.0 - CSRF to Stored XSS vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Syed Amir Hussain Custom Post allows Stored XSS.This issue affects Custom Post: from n/a through 1.0. | [] |
CVE-2009-1814 | SQL injection vulnerability in mail.php in PHPenpals 1.1 and earlier allows remote attackers to execute arbitrary SQL commands via the ID parameter. NOTE: the profile.php vector is already covered by CVE-2006-0074. | [
"cpe:2.3:a:jevontech:phpenpals:*:*:*:*:*:*:*:*"
] |
|
GHSA-fwqp-wm97-mvcp | Microsoft Defender for Endpoint Spoofing Vulnerability. | [] |
|
CVE-2022-42159 | D-Link COVR 1200,1202,1203 v1.08 was discovered to have a predictable seed in a Pseudo-Random Number Generator. | [
"cpe:2.3:o:dlink:covr_1203_firmware:1.08:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:covr_1203:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:covr_1202_firmware:1.08:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:covr_1202:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:covr_1200_firmware:1.08:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:covr_1200:-:*:*:*:*:*:*:*"
] |
|
GHSA-pcmx-c2wg-899q | In Progress® Telerik® Report Server versions prior to 2024 Q3 (10.2.24.806), an HTTP DoS attack is possible on anonymous endpoints without rate limiting. | [] |
|
CVE-2016-1000109 | HHVM does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. This issue affects HHVM versions prior to 3.9.6, all versions between 3.10.0 and 3.12.4 (inclusive), and all versions between 3.13.0 and 3.14.2 (inclusive). | [
"cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*"
] |
|
GHSA-8gf5-q9p9-wvmc | Data race in atomic-option | An issue was discovered in the atomic-option crate through 2020-10-31 for Rust. Because AtomicOption<T> implements Sync unconditionally, a data race can occur. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.