id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-6ggq-gv3v-v28c | Dell EMC Unisphere for PowerMax versions prior to 9.1.0.17, Dell EMC Unisphere for PowerMax Virtual Appliance versions prior to 9.1.0.17, and PowerMax OS Release 5978 contain an improper certificate validation vulnerability. An unauthenticated remote attacker may potentially exploit this vulnerability to carry out a man-in-the-middle attack by supplying a crafted certificate and intercepting the victim's traffic to view or modify a victim’s data in transit. | [] |
|
CVE-2023-22079 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
] |
|
CVE-2025-21927 | nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() | In the Linux kernel, the following vulnerability has been resolved:
nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu()
nvme_tcp_recv_pdu() doesn't check the validity of the header length.
When header digests are enabled, a target might send a packet with an
invalid header length (e.g. 255), causing nvme_tcp_verify_hdgst()
to access memory outside the allocated area and cause memory corruptions
by overwriting it with the calculated digest.
Fix this by rejecting packets with an unexpected header length. | [] |
GHSA-35w6-mr78-cpr4 | libxslt in Apple iOS before 9.3.3, OS X before 10.11.6, iTunes before 12.4.2 on Windows, iCloud before 5.2.1 on Windows, tvOS before 9.2.2, and watchOS before 2.2.2 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2016-4607, CVE-2016-4609, CVE-2016-4610, and CVE-2016-4612. | [] |
|
CVE-2025-3682 | PCMan FTP Server PASV Command buffer overflow | A vulnerability was found in PCMan FTP Server 2.0.7. It has been classified as critical. This affects an unknown part of the component PASV Command Handler. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [] |
GHSA-m263-hmcq-r976 | A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could allow an unauthenticated, remote attacker to bypass authentication and get the administrator privileges. | [] |
|
GHSA-g8m8-5prf-39x3 | Cross-site scripting (XSS) vulnerability in the LoginToboggan module 4.7.x-1.0, 4.7.x-1.x-dev, and 5.x-1.x-dev before 20070712 for Drupal, when configured to display a "Log out" link, allows remote attackers to inject arbitrary web script or HTML via a crafted username. NOTE: Drupal sanitizes the username by removing certain characters, so this might not be a vulnerability on default installations. | [] |
|
CVE-2018-4978 | Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-r8jr-r79v-cghp | Multiple buffer overflows in the Resolution Service for Microsoft SQL Server 2000 and Microsoft Desktop Engine 2000 (MSDE) allow remote attackers to cause a denial of service or execute arbitrary code via UDP packets to port 1434 in which (1) a 0x04 byte that causes the SQL Monitor thread to generate a long registry key name, or (2) a 0x08 byte with a long string causes heap corruption, as exploited by the Slammer/Sapphire worm. | [] |
|
CVE-2024-12558 | WP BASE Booking of Appointments, Services and Events <= 4.9.2 - Missing Authorization to Authenticated (Subscriber+) Sensitive Information Exposure via app_export_db | The WP BASE Booking of Appointments, Services and Events plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the export_db function in all versions up to, and including, 4.9.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to expose sensitive information from the database, such as the hashed administrator password. | [] |
GHSA-whp8-xgvp-xj3v | Divide By Zero in GitHub repository vim/vim prior to 9.0.1247. | [] |
|
CVE-2022-0283 | An issue has been discovered affecting GitLab versions prior to 13.5. An open redirect vulnerability was fixed in GitLab integration with Jira that a could cause the web application to redirect the request to the attacker specified URL. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:14.7:*:*:*:*:*:*:*"
] |
|
CVE-2022-3129 | codeprojects Online Driving School registration.php unrestricted upload | A vulnerability was found in codeprojects Online Driving School. It has been rated as critical. Affected by this issue is some unknown functionality of the file /registration.php. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-207872. | [
"cpe:2.3:a:online_driving_school_project_project:online_driving_school_project:-:*:*:*:*:*:*:*"
] |
CVE-2020-11293 | Out of bound read can happen in Widevine TA while copying data to buffer from user data due to lack of check of buffer length received in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking | [
"cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8037_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8037:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8064au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8064au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar8151_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8151:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csrb31024:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fsm10055_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fsm10055:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fsm10056_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fsm10056:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8920_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8920:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8937_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8937:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8940_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8940:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm3003a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm3003a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm4125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm4125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm4250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm4250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm456_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm456:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm6125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm6125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm6150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm6150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm6150a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm6150a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm6150l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm6150l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm6250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm6250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm6350_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm6350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm640a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm640a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm640l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm640l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm640p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm640p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm660a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm660a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm660l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm660l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm670a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm670a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm670l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm670l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm7250b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm7250b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm8004_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8004:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm8005_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8005:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm8008_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8008:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm8009_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8009:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm8019_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm8150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm8150a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8150a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm8150b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8150b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm8150c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8150c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm8150l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8150l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm8250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm8350_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm855a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm855a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm855b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm855b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm855l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm855l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm855p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm855p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm8916_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8916:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm8937_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8937:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm8940_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8940:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm8953_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8953:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm8996_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8996:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm8998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8998:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pmc1000h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmc1000h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pmd9655_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmd9655:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pme605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pme605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pmi632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmi632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pmi8937_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmi8937:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pmi8940_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmi8940:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pmi8952_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmi8952:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pmi8994_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmi8994:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pmi8996_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmi8996:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pmi8998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmi8998:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pmk8001_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmk8001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pmk8002_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmk8002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pmk8003_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmk8003:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pmm6155au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmm6155au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pmm8155au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmm8155au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pmm8195au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmm8195au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pmm855au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmm855au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pmm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pmr525_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmr525:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pmr735a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmr735a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pmw3100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmw3100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pmx24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmx24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pmx50_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmx50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pmx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmx55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qat3514_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qat3514:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qat3518_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qat3518:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qat3519_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qat3519:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qat3522_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qat3522:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qat3550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qat3550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qat3555_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qat3555:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qat5515_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qat5515:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qat5516_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qat5516:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qat5522_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qat5522:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qbt1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qbt1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qbt1500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qbt1500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qbt2000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qbt2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca4004_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca4004:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca4020_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca4020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6175a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6175a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6234_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6234:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6335_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6335:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6694_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6694:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6694au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6694au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9984_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9984:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcc112_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcc112:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs603_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs603:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qdm2301_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qdm2301:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qdm2302_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qdm2302:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qdm2307_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qdm2307:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qdm2308_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qdm2308:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qdm2310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qdm2310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qet4100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qet4100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qet4101_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qet4101:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qet4200aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qet4200aq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qet5100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qet5100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qet5100m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qet5100m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qet6100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qet6100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qet6105_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qet6105:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfe2080fc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe2080fc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfe2081fc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe2081fc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfe2082fc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe2082fc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfe2101_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe2101:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfe2520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe2520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfe2550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe2550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfe3100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe3100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfe3340_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe3340:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfe3440fc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe3440fc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfe4301_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe4301:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfe4302_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe4302:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfe4303_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe4303:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfe4305_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe4305:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfe4308_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe4308:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfe4309_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe4309:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfe4320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe4320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfe4373fc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe4373fc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfe4455fc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe4455fc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfe4465fc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe4465fc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfs2530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfs2530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfs2580_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfs2580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qln1020_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qln1020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qln1021aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qln1021aq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qln1030_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qln1030:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qln1031_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qln1031:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qln1035bd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qln1035bd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qln1036aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qln1036aq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qln4640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qln4640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qln5030_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qln5030:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qpa4340_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa4340:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qpa4360_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa4360:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qpa4361_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa4361:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qpa5373_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa5373:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qpa5460_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa5460:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qpa6560_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa6560:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qpa8673_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa8673:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qpa8675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa8675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qpa8686_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa8686:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qpa8688_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa8688:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qpa8801_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa8801:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qpa8802_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa8802:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qpa8803_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa8803:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qpa8821_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa8821:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qpm2630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpm2630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qpm8820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpm8820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qpm8870_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpm8870:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qsw6310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qsw6310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qsw8573_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qsw8573:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qsw8574_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qsw8574:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qtc410s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qtc410s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qtc800h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qtc800h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qtc800s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qtc800s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qtc800t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qtc800t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qtc801s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qtc801s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qtm525_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qtm525:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qualcomm215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:rgr7640au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:rgr7640au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:rsw8577_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:rsw8577:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa2150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa2150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa415m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa415m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa515m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa515m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180x\\+sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180x\\+sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd455_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd455:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd8c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd8c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd8cx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd8cx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd665_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd665:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd678_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd678:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd712_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd712:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd720g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd720g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd7c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd7c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd821_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd821:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda429w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda429w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdr051_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdr051:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdr052_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdr052:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdr105_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdr105:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdr425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdr425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdr660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdr660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdr660g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdr660g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdr675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdr675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdr735_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdr735:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdr735g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdr735g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdr8150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdr8150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdr8250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdr8250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdr845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdr845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdr865_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdr865:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx50m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx50m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdxr1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdxr1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm4125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:smb1350_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb1350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:smb1351_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb1351:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:smb1354_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb1354:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:smb1355_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb1355:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:smb1358_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb1358:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:smb1360_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb1360:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:smb1380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb1380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:smb1381_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb1381:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:smb1390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb1390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:smb1396_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb1396:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:smb231_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb231:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:smb2351_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb2351:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:smr525_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smr525:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:smr526_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smr526:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:smr545_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smr545:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:smr546_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smr546:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9306_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9306:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9360:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9371_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9371:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3999_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3999:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wgr7640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wgr7640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:whs9410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:whs9410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wtr2955_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wtr2955:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wtr2965_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wtr2965:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wtr3905_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wtr3905:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wtr3925_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wtr3925:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wtr3950_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wtr3950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wtr4905_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wtr4905:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wtr5975_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wtr5975:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wtr6955_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wtr6955:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-22544 | An issue was discovered in Linksys Router E1700 version 1.0.04 (build 3), allows authenticated attackers to execute arbitrary code via the setDateTime function. | [
"cpe:2.3:o:linksys:e1700_firmware:1.0.04:*:*:*:*:*:*:*"
] |
|
GHSA-wg8h-gxf4-g4gh | TYPO3 Cross-Site Scripting in Online Media Asset Rendering | Failing to properly encode user input, online media asset rendering (*.youtube and *.vimeo files) is vulnerable to cross-site scripting. A valid backend user account or write access on the server system (e.g. SFTP) is needed in order to exploit this vulnerability. | [] |
GHSA-jfqx-vg8w-jmcj | Cross-site scripting (XSS) vulnerability in the Create New Page form in razorCMS 0.3 RC2 and earlier allows remote authenticated users to inject arbitrary web script or HTML via the Page Title field. | [] |
|
CVE-2019-6491 | RISI Gestao de Horarios v3201.09.08 rev.23 allows SQL Injection. | [
"cpe:2.3:a:risi:gestao_de_horarios:3201.09.08:rev.23:*:*:*:*:*:*"
] |
|
GHSA-rh8p-2856-qvch | SQL injection vulnerability in messages.php in PHP-Fusion 6.00.307 and earlier allows remote authenticated users to execute arbitrary SQL commands via the srch_where parameter. | [] |
|
CVE-2006-0559 | Format string vulnerability in the SMTP server for McAfee WebShield 4.5 MR2 and earlier allows remote attackers to execute arbitrary code via format strings in the domain name portion of a destination address, which are not properly handled when a bounce message is constructed. | [
"cpe:2.3:a:mcafee:webshield_smtp:*:mr2_patch:*:*:*:*:*:*"
] |
|
CVE-2024-28174 | In JetBrains TeamCity before 2023.11.4 presigned URL generation requests in S3 Artifact Storage plugin were authorized improperly | [
"cpe:2.3:a:jetbrains:teamcity:-:*:*:*:*:*:*:*",
"cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*"
] |
|
CVE-2007-5523 | Unspecified vulnerability in the Oracle Internet Directory component in Oracle Application Server 9.0.4.3, 10.1.2.0.2, 10.1.2.2, and 10.1.4.0, and Collaboration Suite 10.1.2, has unknown impact and remote attack vectors, aka AS08. | [
"cpe:2.3:a:oracle:application_server:9.0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:10.1.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:10.1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:10.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:collaboration_suite:10.1.2:*:*:*:*:*:*:*"
] |
|
CVE-2022-40685 | Insufficiently protected credentials in the Intel(R) DCM software before version 5.0.1 may allow an authenticated user to potentially enable information disclosure via network access. | [
"cpe:2.3:a:intel:data_center_manager:*:*:*:*:*:*:*:*"
] |
|
CVE-2007-2223 | Microsoft XML Core Services (MSXML) 3.0 through 6.0 allows remote attackers to execute arbitrary code via the substringData method on a (1) TextNode or (2) XMLDOM object, which causes an integer overflow that leads to a buffer overflow. | [
"cpe:2.3:a:microsoft:xml_core_services:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:xml_core_services:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:xml_core_services:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:*:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:gold:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:*:*:*:professional:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:itanium:*",
"cpe:2.3:a:microsoft:xml_core_services:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:expression_web:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2007:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack:2007:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_groove_server:2007:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_sharepoint_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word_viewer:2003:*:*:*:*:*:*:*"
] |
|
GHSA-jpxj-vgq5-prjc | OS command execution vulnerability in Jenkins Docker Commons Plugin | Jenkins Docker Commons Plugin 1.17 and earlier does not sanitize the name of an image or a tag, resulting in an OS command execution vulnerability exploitable by attackers with Item/Configure permission or able to control the contents of a previously configured job's SCM repository. | [] |
CVE-2020-11860 | Cross-Site Scripting vulnerability on Micro Focus ArcSight Logger product, affecting all version prior to 7.1.1. The vulnerability could be remotely exploited resulting in Cross-Site Scripting (XSS) | [
"cpe:2.3:a:microfocus:arcsight_logger:*:*:*:*:*:*:*:*"
] |
|
GHSA-x8mr-64rx-qcvm | HPE OneView Global Dashboard (OVGD) 1.9 has a remote information disclosure vulnerability. HPE OneView Global Dashboard - After Upgrade or Install of OVGD Version 1.9, Appliance Firewall May Leave Ports Open. This is resolved in OVGD 1.91 or later. | [] |
|
CVE-2022-32092 | D-Link DIR-645 v1.03 was discovered to contain a command injection vulnerability via the QUERY_STRING parameter at __ajax_explorer.sgi. | [
"cpe:2.3:o:dlink:dir-645_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-645:-:*:*:*:*:*:*:*"
] |
|
GHSA-mxhg-mc93-9g8m | A race condition was addressed with additional validation. This issue is fixed in macOS Ventura 13.6.8, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, macOS Sonoma 14.6. A malicious attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. | [] |
|
GHSA-6w72-cgpx-qmf9 | The GittiGidiyor (aka com.gittigidiyormobil) application 1.4.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
CVE-2023-22715 | WordPress WP-CommentNavi Plugin <= 1.12.1 is vulnerable to Cross Site Scripting (XSS) | Auth. (admin+) Cross-Site Scripting (XSS) vulnerability in Lester 'GaMerZ' Chan WP-CommentNavi plugin <= 1.12.1 versions. | [
"cpe:2.3:a:wp-commentnavi_project:wp-commentnavi:*:*:*:*:*:wordpress:*:*"
] |
GHSA-x37m-q3cw-3j2c | In the function process_crypto_cmd, the values of ptrs[i] can be potentially equal to NULL which is valid value after calling slice_map_array(). Later this values will be derefenced without prior NULL check, which can lead to local Temporary DoS or OOB Read, leading to information disclosure. | [] |
|
GHSA-gv2q-xcvg-jr5q | The jp2_colr_destroy function in libjasper/jp2/jp2_cod.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (NULL pointer dereference). | [] |
|
GHSA-7px4-864r-qv7w | Use-after-free vulnerability in the GetLoadTimes function in renderer/loadtimes_extension_bindings.cc in the Extensions implementation in Google Chrome before 47.0.2526.73 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that modifies a pointer used for reporting loadTimes data. | [] |
|
CVE-2023-33909 | In Contacts service, there is a possible missing permission check.This could lead to local information disclosure with no additional execution privileges | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] |
|
CVE-2013-1317 | Integer overflow in Microsoft Publisher 2003 SP3 allows remote attackers to execute arbitrary code via a crafted Publisher file that triggers an improper allocation-size calculation, aka "Publisher Integer Overflow Vulnerability." | [
"cpe:2.3:a:microsoft:publisher:2003:sp3:*:*:*:*:*:*"
] |
|
CVE-2018-19052 | An issue was discovered in mod_alias_physical_handler in mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of a single directory above an alias target, with a specific mod_alias configuration where the matched alias lacks a trailing '/' character, but the alias target filesystem path does have a trailing '/' character. | [
"cpe:2.3:a:lighttpd:lighttpd:*:*:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp2:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp4:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] |
|
GHSA-5ch3-2r78-59w3 | Cross-site scripting (XSS) vulnerability in Trend Micro Control Manager (TMCM) 3.5 allows remote attackers to inject arbitrary web script or HTML via the username field on the login page, which is not properly sanitized before being displayed in the error log. | [] |
|
CVE-2023-5173 | In a non-standard configuration of Firefox, an integer overflow could have occurred based on network traffic (possibly under influence of a local unprivileged webpage), leading to an out-of-bounds write to privileged process memory.
*This bug only affects Firefox if a non-standard preference allowing non-HTTPS Alternate Services (`network.http.altsvc.oe`) is enabled.* This vulnerability affects Firefox < 118. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] |
|
GHSA-93rm-4fw3-6c3x | A vulnerability has been found in SourceCodester Online Jewelry Store 1.0 and classified as critical. This vulnerability affects unknown code of the file login.php. The manipulation of the argument username/password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-235606 is the identifier assigned to this vulnerability. | [] |
|
GHSA-4793-w44w-m7xm | Plone Zope cross-site scripting (XSS) vulnerability | Multiple cross-site scripting (XSS) vulnerabilities in Zope, as used in Plone 3.3.x through 3.3.6, 4.0.x through 4.0.9, 4.1.x through 4.1.6, 4.2.x through 4.2.7, and 4.3 through 4.3.2, allow remote attackers to inject arbitrary web script or HTML via unspecified input in the (1) browser_id_manager or (2) OFS.Image method. | [] |
GHSA-34gm-4qqx-g892 | Incorrect access control in ECOS System Management Appliance (aka SMA) 5.2.68 allows a user to compromise authentication keys, and access and manipulate security relevant configurations, via unrestricted database access during Easy Enrollment. | [] |
|
GHSA-jh6f-6q67-5q7v | Due to lack of server-side input validation, attackers can inject malicious JavaScript code into users personal spaces of the web portal. | [] |
|
GHSA-rpv2-6qv2-hjhv | Cross-site scripting (XSS) vulnerability in theme/views_lang_switch.theme.inc in the Views Language Switcher module before 7.x-1.2 for Drupal allows remote attackers to inject arbitrary web script or HTML via the q parameter. | [] |
|
CVE-2021-33966 | Cross site scripting (XSS) vulnerability in spotweb 1.4.9, allows authenticated attackers to execute arbitrary code via crafted GET request to the login page. | [
"cpe:2.3:a:spotweb_project:spotweb:1.4.9:*:*:*:*:*:*:*"
] |
|
GHSA-mr27-h878-23c8 | In the Linux kernel, the following vulnerability has been resolved:drm/vc4: don't check if plane->state->fb == state->fbCurrently, when using non-blocking commits, we can see the following
kernel warning:[ 110.908514] ------------[ cut here ]------------
[ 110.908529] refcount_t: underflow; use-after-free.
[ 110.908620] WARNING: CPU: 0 PID: 1866 at lib/refcount.c:87 refcount_dec_not_one+0xb8/0xc0
[ 110.908664] Modules linked in: rfcomm snd_seq_dummy snd_hrtimer snd_seq snd_seq_device cmac algif_hash aes_arm64 aes_generic algif_skcipher af_alg bnep hid_logitech_hidpp vc4 brcmfmac hci_uart btbcm brcmutil bluetooth snd_soc_hdmi_codec cfg80211 cec drm_display_helper drm_dma_helper drm_kms_helper snd_soc_core snd_compress snd_pcm_dmaengine fb_sys_fops sysimgblt syscopyarea sysfillrect raspberrypi_hwmon ecdh_generic ecc rfkill libaes i2c_bcm2835 binfmt_misc joydev snd_bcm2835(C) bcm2835_codec(C) bcm2835_isp(C) v4l2_mem2mem videobuf2_dma_contig snd_pcm bcm2835_v4l2(C) raspberrypi_gpiomem bcm2835_mmal_vchiq(C) videobuf2_v4l2 snd_timer videobuf2_vmalloc videobuf2_memops videobuf2_common snd videodev vc_sm_cma(C) mc hid_logitech_dj uio_pdrv_genirq uio i2c_dev drm fuse dm_mod drm_panel_orientation_quirks backlight ip_tables x_tables ipv6
[ 110.909086] CPU: 0 PID: 1866 Comm: kodi.bin Tainted: G C 6.1.66-v8+ #32
[ 110.909104] Hardware name: Raspberry Pi 3 Model B Rev 1.2 (DT)
[ 110.909114] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 110.909132] pc : refcount_dec_not_one+0xb8/0xc0
[ 110.909152] lr : refcount_dec_not_one+0xb4/0xc0
[ 110.909170] sp : ffffffc00913b9c0
[ 110.909177] x29: ffffffc00913b9c0 x28: 000000556969bbb0 x27: 000000556990df60
[ 110.909205] x26: 0000000000000002 x25: 0000000000000004 x24: ffffff8004448480
[ 110.909230] x23: ffffff800570b500 x22: ffffff802e03a7bc x21: ffffffecfca68c78
[ 110.909257] x20: ffffff8002b42000 x19: ffffff802e03a600 x18: 0000000000000000
[ 110.909283] x17: 0000000000000011 x16: ffffffffffffffff x15: 0000000000000004
[ 110.909308] x14: 0000000000000fff x13: ffffffed577e47e0 x12: 0000000000000003
[ 110.909333] x11: 0000000000000000 x10: 0000000000000027 x9 : c912d0d083728c00
[ 110.909359] x8 : c912d0d083728c00 x7 : 65646e75203a745f x6 : 746e756f63666572
[ 110.909384] x5 : ffffffed579f62ee x4 : ffffffed579eb01e x3 : 0000000000000000
[ 110.909409] x2 : 0000000000000000 x1 : ffffffc00913b750 x0 : 0000000000000001
[ 110.909434] Call trace:
[ 110.909441] refcount_dec_not_one+0xb8/0xc0
[ 110.909461] vc4_bo_dec_usecnt+0x4c/0x1b0 [vc4]
[ 110.909903] vc4_cleanup_fb+0x44/0x50 [vc4]
[ 110.910315] drm_atomic_helper_cleanup_planes+0x88/0xa4 [drm_kms_helper]
[ 110.910669] vc4_atomic_commit_tail+0x390/0x9dc [vc4]
[ 110.911079] commit_tail+0xb0/0x164 [drm_kms_helper]
[ 110.911397] drm_atomic_helper_commit+0x1d0/0x1f0 [drm_kms_helper]
[ 110.911716] drm_atomic_commit+0xb0/0xdc [drm]
[ 110.912569] drm_mode_atomic_ioctl+0x348/0x4b8 [drm]
[ 110.913330] drm_ioctl_kernel+0xec/0x15c [drm]
[ 110.914091] drm_ioctl+0x24c/0x3b0 [drm]
[ 110.914850] __arm64_sys_ioctl+0x9c/0xd4
[ 110.914873] invoke_syscall+0x4c/0x114
[ 110.914897] el0_svc_common+0xd0/0x118
[ 110.914917] do_el0_svc+0x38/0xd0
[ 110.914936] el0_svc+0x30/0x8c
[ 110.914958] el0t_64_sync_handler+0x84/0xf0
[ 110.914979] el0t_64_sync+0x18c/0x190
[ 110.914996] ---[ end trace 0000000000000000 ]---This happens because, although `prepare_fb` and `cleanup_fb` are
perfectly balanced, we cannot guarantee consistency in the check
plane->state->fb == state->fb. This means that sometimes we can increase
the refcount in `prepare_fb` and don't decrease it in `cleanup_fb`. The
opposite can also be true.In fact, the struct drm_plane .state shouldn't be accessed directly
but instead, the `drm_atomic_get_new_plane_state()` helper function should
be used. So, we could stick to this check, but using
`drm_atomic_get_new_plane_state()`. But actually, this check is not re
---truncated--- | [] |
|
GHSA-mvwv-8vjm-2v48 | The wp-greet plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 6.2. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] |
|
GHSA-rq9h-384r-f2cc | Stack-based buffer overflow in the RDP protocol password decoder in Cain & Abel 4.9.23 and 4.9.24, and possibly earlier, allows remote attackers to execute arbitrary code via an RDP file containing a long string. | [] |
|
CVE-2009-4067 | Buffer overflow in the auerswald_probe function in the Auerswald Linux USB driver for the Linux kernel before 2.6.27 allows physically proximate attackers to execute arbitrary code, cause a denial of service via a crafted USB device, or take full control of the system. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*"
] |
|
CVE-2018-2434 | A content spoofing vulnerability in the following components allows to render html pages containing arbitrary plain text content, which might fool an end user: UI add-on for SAP NetWeaver (UI_Infra, 1.0), SAP UI Implementation for Decoupled Innovations (UI_700, 2.0): SAP NetWeaver 7.00 Implementation, SAP User Interface Technology (SAP_UI 7.4, 7.5, 7.51, 7.52). There is little impact as it is not possible to embed active contents such as JavaScript or hyperlinks. | [
"cpe:2.3:a:sap:netweaver:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:ui_infra:1.0:*:*:*:*:netweaver:*:*",
"cpe:2.3:a:sap:user_interface_technology:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:user_interface_technology:7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:user_interface_technology:7.51:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:user_interface_technology:7.52:*:*:*:*:*:*:*"
] |
|
CVE-2013-0214 | Cross-site request forgery (CSRF) vulnerability in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to hijack the authentication of arbitrary users by leveraging knowledge of a password and composing requests that perform SWAT actions. | [
"cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*"
] |
|
GHSA-5mhj-whm9-8phq | Scripting Engine Memory Corruption Vulnerability | [] |
|
CVE-2023-36384 | WordPress Booking Calendar Contact Form Plugin <= 1.2.40 is vulnerable to Cross Site Scripting (XSS) | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in CodePeople Booking Calendar Contact Form plugin <= 1.2.40 versions. | [
"cpe:2.3:a:booking_calendar_project:booking_calendar:*:*:*:*:*:wordpress:*:*"
] |
CVE-2017-10817 | MaLion for Windows and Mac 5.0.0 to 5.2.1 allows remote attackers to bypass authentication to alter settings in Relay Service Server. | [
"cpe:2.3:a:intercom:malion:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:intercom:malion:*:*:*:*:*:windows:*:*"
] |
|
CVE-2025-20176 | A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device.
This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition.
This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system. | [] |
|
CVE-2010-5212 | Untrusted search path vulnerability in Adobe LiveCycle Designer ES2 9.0.0.20091029.1.612548 allows local users to gain privileges via a Trojan horse objectassisten_US.dll file in the current working directory, as demonstrated by a directory that contains a .tds file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:adobe:livecycle_designer_es2:9.0.0.20091029.1.612548:*:*:*:*:*:*:*"
] |
|
GHSA-5f5v-hf9p-3jjx | PHP remote file inclusion vulnerability in admin/admin_album_otf.php in the MX Smartor Full Album Pack (FAP) 2.0 RC1 module for mxBB allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter. | [] |
|
CVE-2017-1000033 | Wordpress Plugin Vospari Forms version < 1.4 is vulnerable to a reflected cross site scripting in the form submission resulting in javascript code execution in the context on the current user. | [
"cpe:2.3:a:vospari_forms_project:vospari_forms:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2013-5404 | Cross-site scripting (XSS) vulnerability in the search implementation in IBM Rational Quality Manager (RQM) 2.0 through 2.0.1.1, 3.x before 3.0.1.6 iFix 1, and 4.x before 4.0.5, as used in Rational Team Concert, Rational Requirements Composer, and other products, allows remote authenticated users to inject arbitrary web script or HTML via vectors involving an IFRAME element. | [
"cpe:2.3:a:ibm:rational_quality_manager:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:2.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:3.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:3.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:3.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:3.0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:3.0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:3.0.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_requirements_composer:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_requirements_composer:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_requirements_composer:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_requirements_composer:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_requirements_composer:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_requirements_composer:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_requirements_composer:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_requirements_composer:3.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_requirements_composer:3.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_requirements_composer:3.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_requirements_composer:3.0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_requirements_composer:3.0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_requirements_composer:3.0.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_requirements_composer:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_requirements_composer:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_requirements_composer:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_requirements_composer:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_requirements_composer:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:3.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:3.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:3.0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:3.0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:3.0.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.5:*:*:*:*:*:*:*"
] |
|
GHSA-63f9-382x-9vr8 | A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP2). The affected application incorrectly neutralizes special elements when creating batch operations which could lead to command injection. An authenticated remote attacker with administrative privileges could exploit this vulnerability to execute arbitrary code on the system with system privileges. | [] |
|
CVE-2021-30589 | Insufficient validation of untrusted input in Sharing in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to bypass navigation restrictions via a crafted click-to-call link. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
] |
|
CVE-2018-5971 | SQL Injection exists in the MediaLibrary Free 4.0.12 component for Joomla! via the id parameter or the mid array parameter. | [
"cpe:2.3:a:ordasoft:medialibrary:4.0.12:*:*:*:basic:joomla\\!:*:*"
] |
|
CVE-2021-3709 | Apport file permission bypass through emacs byte compilation errors | Function check_attachment_for_errors() in file data/general-hooks/ubuntu.py could be tricked into exposing private data via a constructed crash file. This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior to 2.20.1-0ubuntu2.30+esm2; 2.20.9 versions prior to 2.20.9-0ubuntu7.26; 2.20.11 versions prior to 2.20.11-0ubuntu27.20; 2.20.11 versions prior to 2.20.11-0ubuntu65.3; | [
"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu1:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu2:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.17:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.18:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.19:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.20:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.21:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.23:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.24:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.25:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.27:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.28:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.29:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.29\\+esm7:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu1:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.21:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.23:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.25:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.26:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.27:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.28:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.30:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.30\\+esm1:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu1:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu2:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu3:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu4:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu5:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu6:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.12:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.13:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.14:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.15:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.16:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.17:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.18:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.19:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.21:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.23:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.24:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu8:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu9:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu10:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu11:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu12:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu13:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu14:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu15:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu16:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu17:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu18:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu19:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu20:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu21:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu22:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu23:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu24:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu25:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu26:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.2:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.3:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.4:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.5:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.6:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.7:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.8:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.9:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.10:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.11:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.12:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.13:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.14:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.16:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.17:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.18:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu28:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu29:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu30:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu31:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu32:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu33:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu34:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu35:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu36:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu37:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu38:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu39:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu40:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu41:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu42:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu43:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu44:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu45:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu46:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu47:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu48:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu49:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu50:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu50.1:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu50.2:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu50.3:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu50.5:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu50.7:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu51:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu52:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu53:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu54:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu55:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu56:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu57:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu58:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu59:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu60:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu61:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu62:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu63:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu64:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu65:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu65.1:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:21.04:*:*:*:*:*:*:*"
] |
GHSA-x8fr-74rg-389v | In the Linux kernel, the following vulnerability has been resolved:ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo()In an unlikely (and probably wrong?) case that the 'ppi' parameter of
ata_host_alloc_pinfo() points to an array starting with a NULL pointer,
there's going to be a kernel oops as the 'pi' local variable won't get
reassigned from the initial value of NULL. Initialize 'pi' instead to
'&ata_dummy_port_info' to fix the possible kernel oops for good...Found by Linux Verification Center (linuxtesting.org) with the SVACE static
analysis tool. | [] |
|
GHSA-2xxr-prx9-m533 | A security vulnerability has been identified in Bludit, allowing authenticated attackers to execute arbitrary code through the Image API. This vulnerability arises from improper handling of file uploads, enabling malicious actors to upload and execute PHP files. | [] |
|
CVE-2022-4604 | wp-english-wp-admin Plugin english-wp-admin.php register_endpoints cross-site request forgery | A vulnerability classified as problematic was found in wp-english-wp-admin Plugin up to 1.5.1. Affected by this vulnerability is the function register_endpoints of the file english-wp-admin.php. The manipulation leads to cross-site request forgery. The attack can be launched remotely. Upgrading to version 1.5.2 is able to address this issue. The name of the patch is ad4ba171c974c65c3456e7c6228f59f40783b33d. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216199. | [
"cpe:2.3:a:wp-english-wp-admin_project:wp-english-wp-admin:*:*:*:*:*:wordpress:*:*"
] |
GHSA-gmpp-xvgm-fpmg | Directory traversal vulnerability in _conf/_php-core/common-tpl-vars.php in PHPmyGallery 1.5 beta allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the conf[lang] parameter, a different issue than CVE-2008-6318. NOTE: this might be the same issue as CVE-2008-6316. | [] |
|
CVE-2021-40347 | An issue was discovered in views/list.py in GNU Mailman Postorius before 1.3.5. An attacker (logged into any account) can send a crafted POST request to unsubscribe any user from a mailing list, also revealing whether that address was subscribed in the first place. | [
"cpe:2.3:a:postorius_project:postorius:*:*:*:*:*:*:*:*"
] |
|
GHSA-mrmg-vfrw-qcjm | Multiple directory traversal vulnerabilities in TikiWiki 1.9.8.1 and earlier allow remote attackers to include and execute arbitrary files via an absolute pathname in (1) error_handler_file and (2) local_php parameters to (a) tiki-index.php, or (3) encoded "..%2F" sequences in the imp_language parameter to tiki-imexport_languages.php. | [] |
|
CVE-2024-1157 | The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's button URL in all versions up to, and including, 4.8.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:bold-themes:bold_page_builder:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2016-7859 | Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:flash_player_for_linux:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:x64:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
] |
|
CVE-2018-13405 | The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:mrg_realtime:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_aus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:16.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:16.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:15.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:16.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:16.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:15.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:16.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:15.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:16.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:15.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:16.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:15.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:16.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:15.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:16.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:15.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:16.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:15.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:16.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:16.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:15.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:16.0.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-6951 | SourceCodester Simple Online Book Store System admin_delete.php sql injection | A vulnerability, which was classified as critical, was found in SourceCodester Simple Online Book Store System 1.0. This affects an unknown part of the file admin_delete.php. The manipulation of the argument bookisbn leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-272073 was assigned to this vulnerability. | [
"cpe:2.3:a:simple_online_book_store_system_project:simple_online_book_store_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oretnom23:simple_online_book_store_system:1.0:*:*:*:*:*:*:*"
] |
CVE-2024-11318 | IDOR vulnerability in AbsysNet | An IDOR (Insecure Direct Object Reference) vulnerability has been discovered in AbsysNet, affecting version 2.3.1. This vulnerability could allow a remote attacker to obtain the session of an unauthenticated user by brute-force attacking the session identifier on the "/cgi-bin/ocap/" endpoint. | [
"cpe:2.3:a:baratz_innovacion:absysnet:*:*:*:*:*:*:*:*"
] |
CVE-2005-0256 | The wu_fnmatch function in wu_fnmatch.c in wu-ftpd 2.6.1 and 2.6.2 allows remote attackers to cause a denial of service (CPU exhaustion by recursion) via a glob pattern with a large number of * (wildcard) characters, as demonstrated using the dir command. | [
"cpe:2.3:a:washington_university:wu-ftpd:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:washington_university:wu-ftpd:2.6.2:*:*:*:*:*:*:*"
] |
|
GHSA-hxw6-pfp4-6vc8 | Improper resource management in firmware of some Solidigm DC Products may allow an attacker to potentially enable denial of service. | [] |
|
CVE-2006-2773 | admin/redigera/redigera2.asp in Hogstorps hogstorp Guestbook 2.0 does not verify user credentials, which allows remote attackers to edit arbitrary posts via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:hogstorps:hogstorp_guestbook:2.0:*:*:*:*:*:*:*"
] |
|
CVE-2019-2459 | Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). Supported versions that are affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L). | [
"cpe:2.3:a:oracle:outside_in_technology:8.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*"
] |
|
CVE-2022-3207 | Simple File List < 4.4.12 - Admin+ Stored Cross-Site Scripting | The Simple File List WordPress plugin before 4.4.12 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | [
"cpe:2.3:a:simplefilelist:simple-file-list:*:*:*:*:*:wordpress:*:*"
] |
CVE-2008-5842 | Multiple cross-site scripting (XSS) vulnerabilities in Fujitsu-Siemens WebTransactions 7.0, 7.1, and possibly other versions allow remote attackers to inject arbitrary web script or HTML via vectors associated with (1) a demo application shipped with WebTransactions and possibly (2) an unspecified "dynamic application." | [
"cpe:2.3:a:fujitsu-siemens:webtransactions:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fujitsu-siemens:webtransactions:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fujitsu-siemens:webtransactions:7.1:*:*:*:*:*:*:*"
] |
|
GHSA-cm77-cg9p-x2w6 | When BIG-IP 14.0.0-14.1.0.1, 13.0.0-13.1.1.4, 12.1.0-12.1.4, 11.6.1-11.6.3.4, and 11.5.2-11.5.8 are processing certain rare data sequences occurring in PPTP VPN traffic, the BIG-IP system may execute incorrect logic. The TMM may restart and produce a core file as a result of this condition. The BIG-IP system provisioned with the CGNAT module and configured with a virtual server using a PPTP profile is exposed to this vulnerability. | [] |
|
CVE-2022-30177 | Azure RTOS GUIX Studio Remote Code Execution Vulnerability | Azure RTOS GUIX Studio Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:azure_real_time_operating_system_guix_studio:-:*:*:*:*:*:*:*"
] |
CVE-2017-15243 | IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to a "Possible Stack Corruption starting at PDF!xmlGetGlobalState+0x00000000000568a4." | [
"cpe:2.3:a:irfanview:irfanview:4.44:*:*:*:*:*:x86:*",
"cpe:2.3:a:irfanview:pdf:4.43:*:*:*:*:*:*:*"
] |
|
CVE-2012-5765 | The Web Client (aka CQ Web) in IBM Rational ClearQuest 7.1.2.x before 7.1.2.9 and 8.0.0.x before 8.0.0.5 allows remote attackers to obtain sensitive information via unspecified vectors that trigger a SQL error message. | [
"cpe:2.3:a:ibm:rational_clearquest:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:8.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:8.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:8.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:8.0.0.4:*:*:*:*:*:*:*"
] |
|
GHSA-m6fv-rjwf-hmj9 | A use-after-free vulnerability in WebCore::RenderLayer::updateDescendantDependentFlags in WebKitGTK before 2.36.8 allows attackers to execute code remotely. | [] |
|
CVE-2011-3500 | Directory traversal vulnerability in the web server in Cogent DataHub 7.1.1.63 and earlier allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in an HTTP request. | [
"cpe:2.3:a:cogentdatahub:cogent_datahub:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cogentdatahub:cogent_datahub:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.1.63:*:*:*:*:*:*:*"
] |
|
GHSA-pgj7-38qw-cw8c | An arbitrary file upload vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-write administrator with access to the web interface to disrupt system processes and potentially execute arbitrary code with limited privileges on the firewall. | [] |
|
CVE-2016-10634 | scala-standalone-bin is a Binary wrapper for ScalaJS. scala-standalone-bin downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server. | [
"cpe:2.3:a:scalajs-standalone-bin_project:scalajs-standalone-bin:*:*:*:*:*:node.js:*:*"
] |
|
GHSA-2wjg-qcgr-7p52 | In the Linux kernel, the following vulnerability has been resolved:io_uring: lock overflowing for IOPOLLsyzbot reports an issue with overflow filling for IOPOLL:WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
CPU: 0 PID: 28 Comm: kworker/u4:1 Not tainted 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
Workqueue: events_unbound io_ring_exit_work
Call trace:
io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
io_fill_cqe_req io_uring/io_uring.h:168 [inline]
io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
worker_thread+0x340/0x610 kernel/workqueue.c:2436
kthread+0x12c/0x158 kernel/kthread.c:376
ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863There is no real problem for normal IOPOLL as flush is also called with
uring_lock taken, but it's getting more complicated for IOPOLL|SQPOLL,
for which __io_cqring_overflow_flush() happens from the CQ waiting path. | [] |
|
GHSA-9548-764x-cvqv | Smarty before 3.0.0 beta 7 does not properly handle the <?php and ?> tags, which has unspecified impact and remote attack vectors. | [] |
|
GHSA-5vv3-mh73-wpg3 | Insufficient validation of untrusted input in Blink in Google Chrome prior to 80.0.3987.87 allowed a local attacker to bypass content security policy via a crafted HTML page. | [] |
|
CVE-2022-47438 | WordPress Booking calendar, Appointment Booking System Plugin <= 3.2.3 is vulnerable to Cross Site Scripting (XSS) | Auth. (editor+) Stored Cross-Site Scripting (XSS) vulnerability in WpDevArt Booking calendar, Appointment Booking System plugin <= 3.2.3 versions. | [
"cpe:2.3:a:wpdevart:booking_calendar:*:*:*:*:*:wordpress:*:*"
] |
CVE-2022-23994 | An Improper access control vulnerability in StBedtimeModeReceiver in Wear OS 3.0 prior to Firmware update Feb-2022 Release allows untrusted applications to change bedtime mode without a proper permission. | [
"cpe:2.3:o:samsung:wear_os:*:*:*:*:*:*:*:*"
] |
|
CVE-2011-1064 | SQL injection vulnerability in member/list.php in qibosoft Qi Bo CMS 7 allows remote attackers to execute arbitrary SQL commands via the aidDB[] parameter. | [
"cpe:2.3:a:qibosoft:qi_bo_cms:7:*:*:*:*:*:*:*"
] |
|
CVE-2024-7527 | Unexpected marking work at the start of sweeping could have led to a use-after-free. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, Firefox ESR < 128.1, Thunderbird < 128.1, and Thunderbird < 115.14. | [
"cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:-:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:-:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:128.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:128.0.1:*:*:*:*:*:*:*"
] |
|
GHSA-34x7-vxc3-qvr6 | FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the host_ip parameter in the web_snmp_v3host_add_post function. | [] |
|
CVE-2024-38858 | Cross-site scripting in Robotmk logs view | Improper neutralization of input in Checkmk before version 2.3.0p14 allows attackers to inject and run malicious scripts in the Robotmk logs view. | [
"cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p10:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p11:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p12:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p13:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p8:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p9:*:*:*:*:*:*"
] |
CVE-2017-6315 | Astaro Security Gateway (aka ASG) 7 allows remote attackers to execute arbitrary code via a crafted request to index.plx. | [
"cpe:2.3:o:sophos:astaro_security_gateway_firmware:7.500:*:*:*:*:*:*:*",
"cpe:2.3:o:sophos:astaro_security_gateway_firmware:7.506:*:*:*:*:*:*:*",
"cpe:2.3:h:sophos:astaro_security_gateway:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-6920 | Stored XSS in NAC Telecommunication's NACPremium | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NAC Telecommunication Systems Inc. NACPremium allows Stored XSS.This issue affects NACPremium: through 01082024. | [
"cpe:2.3:a:nac:nacpremium:*:*:*:*:*:*:*:*"
] |
GHSA-97j9-jggv-92q2 | Symantec Web Gateway (SWG) before 5.2.5 allows remote authenticated users to execute arbitrary OS commands. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.