id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2022-22600 | The issue was addressed with improved permissions logic. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, macOS Monterey 12.3, watchOS 8.5. A malicious application may be able to bypass certain Privacy preferences. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-26375 | WordPress AB Press Optimizer plugin <= 1.1.1 - Auth. Stored Cross-Site Scripting (XSS) vulnerability | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Mammothology AB Press Optimizer plugin <= 1.1.1 on WordPress. | [
"cpe:2.3:a:abpressoptimizer:ab_press_optimizer:*:*:*:*:*:wordpress:*:*"
] |
GHSA-f2hm-6r67-2w7v | Cross-site scripting (XSS) vulnerability in Ortro before 1.3.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
CVE-2024-10734 | Project Worlds Life Insurance Management System editPayment.php sql injection | A vulnerability was found in Project Worlds Life Insurance Management System 1.0. It has been classified as critical. This affects an unknown part of the file /editPayment.php. The manipulation of the argument recipt_no leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:projectworlds:life_insurance_management_system:1.0:*:*:*:*:*:*:*"
] |
GHSA-ww87-ccm2-r7w7 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15535. | [] |
|
CVE-2022-36924 | Local Privilege Escalation in Zoom Rooms Installer for Windows | The Zoom Rooms Installer for Windows prior to 5.12.6 contains a local privilege escalation vulnerability. A local low-privileged user could exploit this vulnerability during the install process to escalate their privileges to the SYSTEM user. | [
"cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*"
] |
CVE-2024-54356 | WordPress Online Booking & Scheduling Calendar for WordPress by vcita plugin <= 4.5 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in vCita.com Online Booking & Scheduling Calendar for WordPress by vcita allows Cross Site Request Forgery.This issue affects Online Booking & Scheduling Calendar for WordPress by vcita: from n/a through 4.5. | [] |
CVE-2012-0156 | DirectWrite in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly render Unicode characters, which allows remote attackers to cause a denial of service (application hang) via a (1) instant message or (2) web site, aka "DirectWrite Application Denial of Service Vulnerability." | [
"cpe:2.3:o:microsoft:windows_7:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:*:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
] |
|
GHSA-3wmf-6xrp-7qch | Web sessions in the management interface in Palo Alto Networks PAN-OS software do not expire in certain situations, making it susceptible to unauthorized access. | [] |
|
CVE-2024-45696 | D-Link WiFi router - Hidden Functionality | Certain models of D-Link wireless routers contain hidden functionality. By sending specific packets to the web service, the attacker can forcibly enable the telnet service and log in using hard-coded credentials. The telnet service enabled through this method can only be accessed from within the same local network as the device. | [
"cpe:2.3:o:dlink:covr-x1870_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-x4860_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:covr-x1870:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-x4860_firmware:1.00:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-x4860_firmware:1.04:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-x4860:a1:*:*:*:*:*:*:*"
] |
CVE-2025-28094 | shopxo v6.4.0 has a ssrf/xss vulnerability in multiple places. | [] |
|
CVE-2014-9045 | The FTP backend in user_external in ownCloud Server before 5.0.18 and 6.x before 6.0.6 allows remote attackers to bypass intended authentication requirements via a crafted password. | [
"cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.14:a:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:6.0.5:*:*:*:*:*:*:*"
] |
|
GHSA-v8gr-gp4p-fpww | Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected is 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data as well as unauthorized read access to a subset of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). | [] |
|
CVE-2006-4354 | PHP remote file inclusion vulnerability in e/class/CheckLevel.php in Phome Empire CMS 3.7 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the check_path parameter. | [
"cpe:2.3:a:phome_empire:phome_empire_cms:3.7:*:*:*:*:*:*:*"
] |
|
CVE-2022-30686 | AEM Reflected XSS Arbitrary code execution | Adobe Experience Manager versions 6.5.13.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. Exploitation of this issue requires low-privilege access to AEM. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:-:*:*:*:cloud_service:*:*:*"
] |
GHSA-9397-457v-6qhp | A vulnerability classified as problematic was found in PHPGurukul Credit Card Application Management System 1.0. This vulnerability affects unknown code of the file /admin/new-ccapplication.php. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | [] |
|
CVE-2016-9413 | The Admin control panel in MyBB (aka MyBulletinBoard) before 1.8.7 and MyBB Merge System before 1.8.7 allows remote attackers to conduct clickjacking attacks via unspecified vectors. | [
"cpe:2.3:a:mybb:merge_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-3604 | Flynax Bridge <= 2.2.0 - Unauthenticated Privilege Escalation via Account Takeover | The Flynax Bridge plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 2.2.0. This is due to the plugin not properly validating a user's identity prior to updating their details like email. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account. | [] |
GHSA-fcxw-jr7h-j53p | Mule Enterprise Management Console (MMC) does not properly restrict access to handler/securityService.rpc, which allows remote authenticated users to gain administrator privileges and execute arbitrary code via a crafted request that adds a new user. NOTE: this issue was originally reported for ESB Runtime 3.5.1, but it originates in MMC. | [] |
|
GHSA-c37p-qfh4-9v45 | Logical defects in code implementation in some products. Successful exploitation of this vulnerability may affect the availability of some features. | [] |
|
CVE-2020-23042 | Dropouts Technologies LLP Super Backup v2.0.5 was discovered to contain a cross-site scripting (XSS) vulnerability in the path parameter of the `list` and `download` module. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted GET request. | [
"cpe:2.3:a:dropouts:super_backup:2.0.5:*:*:*:*:ipados:*:*",
"cpe:2.3:a:dropouts:super_backup:2.0.5:*:*:*:*:iphone_os:*:*"
] |
|
CVE-2016-2242 | Exponent CMS 2.x before 2.3.7 Patch 3 allows remote attackers to execute arbitrary code via the sc parameter to install/index.php. | [
"cpe:2.3:a:exponentcms:exponent_cms:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.0.4:p3:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.0.5:p1:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.0.6:p2:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.0.8:p2:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.0.9:p5:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.1.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.1.4:p11:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.2.0:p5:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.2.2:p2:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.2.3:p14:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.3.0:p4:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.3.1:p4:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.3.2:p2:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.3.3:p1:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.3.4:p1:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.3.5:p2:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.3.8:*:*:*:*:*:*:*"
] |
|
CVE-2023-35989 | An integer overflow vulnerability exists in the LXT2 zlib block allocation functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability. | [
"cpe:2.3:a:tonybybell:gtkwave:3.3.115:*:*:*:*:*:*:*"
] |
|
CVE-2017-0391 | A denial of service vulnerability in decoder/ihevcd_decode.c in libhevc in Mediaserver could enable a remote attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1. Android ID: A-32322258. | [
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*"
] |
|
GHSA-vhxx-2mfr-ffpp | Multiple cross-site scripting (XSS) vulnerabilities in the Kunena component before 3.0.6 for Joomla! allow remote attackers to inject arbitrary web script or HTML via the (1) index value of an array parameter or the filename parameter in the Content-Disposition header to the (2) file or (3) profile image upload functionality. | [] |
|
GHSA-cj34-qf96-c4gj | NVIDIA SHIELD TV, all versions prior to 8.2.2, contains a vulnerability in the implementation of the RPMB command status, in which an attacker can write to the Write Protect Configuration Block, which may lead to denial of service or escalation of privileges. | [] |
|
CVE-2021-30183 | Cleartext storage of sensitive information in multiple versions of Octopus Server where in certain situations when running import or export processes, the password used to encrypt and decrypt sensitive values would be written to the logs in plaintext. | [
"cpe:2.3:a:octopus:server:*:*:*:*:*:*:*:*"
] |
|
GHSA-jmrg-wp7g-g3wc | In various firmware versions of Lenovo System x, the integrated management module II (IMM2)'s first failure data capture (FFDC) includes the web server's private key in the generated log file for support. | [] |
|
GHSA-r2j7-cpgf-7qq3 | A Cross Site Scripting (XSS) vulnerability exists in FUEL-CMS 1.5.1 in the Assets page via an SVG file. | [] |
|
GHSA-rp5c-q9p5-vm9v | FFmpeg 0.5.x, as used in MPlayer and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed VC-1 file. | [] |
|
GHSA-52jp-38ff-h36v | GasGauge in Apple watchOS before 2 allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5919. | [] |
|
CVE-2022-45796 | SHARP Multifunction Printer - Command Injection | Command injection vulnerability in nw_interface.html in SHARP multifunction printers (MFPs)'s Digital Full-color Multifunctional System 202 or earlier, 120 or earlier, 600 or earlier, 121 or earlier, 500 or earlier, 402 or earlier, 790 or earlier, and Digital Multifunctional System (Monochrome) 200 or earlier, 211 or earlier, 102 or earlier, 453 or earlier, 400 or earlier, 202 or earlier, 602 or earlier, 500 or earlier, 401 or earlier allows remote attackers to execute arbitrary commands via unspecified vectors. | [
"cpe:2.3:o:sharp:bp-30c25_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-30c25:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-30c25t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-30c25t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-30c25y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-30c25y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-30c25z_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-30c25z:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-30m28_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-30m28:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-30m28t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-30m28t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-30m31_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-30m31:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-30m31t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-30m31t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-30m35_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-30m35:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-30m35t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-30m35t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-50c26_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-50c26:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-50c31_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-50c31:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-50c36_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-50c36:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-50c45_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-50c45:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-50c55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-50c55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-50c65_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-50c65:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-50m26_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-50m26:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-50m31_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-50m31:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-50m36_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-50m36:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-50m45_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-50m45:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-50m50_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-50m50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-50m55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-50m55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-55c26_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-55c26:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-60c31_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-60c31:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-60c36_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-60c36:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-60c45_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-60c45:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-70c31_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-70c31:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-70c36_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-70c36:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-70c45_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-70c45:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-70c55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-70c55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-70c65_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-70c65:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-70m31_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-70m31:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-70m36_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-70m36:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-70m45_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-70m45:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-70m55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-70m55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-70m65_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-70m65:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-70m75_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-70m75:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:bp-70m90_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:bp-70m90:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-2630n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-2630n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-2651_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-2651:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3050n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3050n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3050n_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3050n_a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3050v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3050v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3050v_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3050v_a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3051_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3051:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3060n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3060n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3060v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3060v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3061_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3061:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3061s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3061s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3070n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3070n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3070n_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3070n_a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3070v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3070v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3070v_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3070v_a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3071_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3071:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3071s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3071s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3550n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3550n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3550v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3550v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3551_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3551:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3560n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3560n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3560v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3560v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3561_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3561:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3561s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3561s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3570n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3570n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3570v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3570v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3571_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3571:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-3571s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-3571s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4050n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4050n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4050v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4050v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4051_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4051:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4060n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4060n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4060v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4060v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4061_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4061:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4061s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4061s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4070n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4070n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4070n_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4070n_a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4070v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4070v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4070v_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4070v_a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4071_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4071:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-4071s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-4071s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-5050n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-5050n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-5050v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-5050v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-5051_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-5051:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-5070n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-5070n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-5070v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-5070v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-5071_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-5071:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-5071s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-5071s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-6050n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-6050n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-6050v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-6050v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-6051_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-6051:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-6070n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-6070n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-6070n_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-6070n_a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-6070v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-6070v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-6070v_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-6070v_a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-6071_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-6071:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-6071s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-6071s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-6580n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-6580n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-7081_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-7081:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-7090n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-7090n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-7580n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-7580n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-8081_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-8081:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-8090n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-8090n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b355w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b355w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b355wt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b355wt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b355wz_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b355wz:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b356w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b356w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b356wh_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b356wh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b376w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b376w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b376wh_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b376wh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b455w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b455w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b455wt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b455wt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b455wz_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b455wz:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b456w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b456w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b456wh_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b456wh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b476w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b476w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-b476wh_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-b476wh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-c303_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-c303:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-c303w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-c303w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-c303wh_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-c303wh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-c304_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-c304:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-c304w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-c304w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-c304wh_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-c304wh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m1056_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m1056:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m1206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m1206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m2630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m2630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m2630_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m2630_a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m2651_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m2651:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m3050_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m3050:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m3050_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m3050_a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m3051_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m3051:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m3070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m3070:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m3070_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m3070_a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m3071_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m3071:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m3071s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m3071s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m3550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m3550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m3551_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m3551:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m3570_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m3570:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m3571_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m3571:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m3571s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m3571s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m4050_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m4050:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m4051_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m4051:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m4070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m4070:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m4070_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m4070_a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m4071_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m4071:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m4071s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m4071s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m5050_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m5050:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m5051_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m5051:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m5070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m5070:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m5071_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m5071:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m5071s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m5071s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m6050_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m6050:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m6051_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m6051:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m6070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m6070:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m6070_a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m6070_a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m6071_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m6071:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m6071s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m6071s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m6570_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m6570:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m7570_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m7570:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:mx-m905_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:mx-m905:-:*:*:*:*:*:*:*"
] |
GHSA-qffj-xvw3-9g6g | SQL Injection vulnerability in Talend ESB Runtime 7.3.1-R2022-09-RT thru 8.0.1-R2022-10-RT when using the provisioning service. | [] |
|
CVE-2008-6998 | Stack-based buffer overflow in chrome/common/gfx/url_elider.cc in Google Chrome 0.2.149.27 and other versions before 0.2.149.29 might allow user-assisted remote attackers to execute arbitrary code via a link target (href attribute) with a large number of path elements, which triggers the overflow when the status bar is updated after the user hovers over the link. | [
"cpe:2.3:a:google:chrome:0.2.149.27:*:*:*:*:*:*:*"
] |
|
GHSA-c5f2-m637-877p | IBM WebSphere Application Server 5.0.2 (or any earlier cumulative fix) and 5.1.1 (or any earlier cumulative fix) allows EJB access on Solaris systems via a crafted LTPA token. | [] |
|
CVE-2011-4106 | TimThumb (timthumb.php) before 2.0 does not validate the entire source with the domain white list, which allows remote attackers to upload and execute arbitrary code via a URL containing a white-listed domain in the src parameter, then accessing it via a direct request to the file in the cache directory, as exploited in the wild in August 2011. | [
"cpe:2.3:a:binarymoon:timthumb:*:*:*:*:*:*:*:*"
] |
|
GHSA-6h2m-p8m3-57fx | Cross-site scripting (XSS) vulnerability in the mobile-browser subsystem in Cisco WebEx Meeting Center allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCul36228. | [] |
|
CVE-2021-26569 | Race Condition within a Thread vulnerability in iscsi_snapshot_comm_core in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to execute arbitrary code via crafted web requests. | [
"cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*"
] |
|
CVE-2013-5221 | The mobile-upload feature in Esri ArcGIS for Server 10.1 through 10.2 allows remote authenticated users to upload .exe files by leveraging (1) publisher or (2) administrator privileges. | [
"cpe:2.3:a:esri:arcgis_server:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:esri:arcgis_server:10.2:*:*:*:*:*:*:*"
] |
|
GHSA-qqjx-v7vc-77w8 | SecureCRT before 8.7.2 allows remote attackers to execute arbitrary code via an Integer Overflow and a Buffer Overflow because a banner can trigger a line number to CSI functions that exceeds INT_MAX. | [] |
|
GHSA-cp2m-j67p-96qc | The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.6, macOS Sequoia 15.5, macOS Sonoma 14.7.6. An app may be able to bypass ASLR. | [] |
|
GHSA-264r-p5m9-6v8c | This issue was addressed by adding an additional prompt for user consent. This issue is fixed in macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, macOS Sonoma 14.6. A shortcut may be able to bypass Internet permission requirements. | [] |
|
CVE-2013-5830 | Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries. | [
"cpe:2.3:a:oracle:jdk:1.5.0:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update18:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update19:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update20:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update22:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update23:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update24:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update26:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update27:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update28:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update29:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update30:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update34:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update35:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update36:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update38:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update39:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update41:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update45:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update51:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update18:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update19:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update20:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update32_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update32_b32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update33_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update33_b32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update33_b33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update34_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update34_b32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update35:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update35_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update35_b32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update37:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update37_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update37_b32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update38:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update38_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update39:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update41:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update43:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update43_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update45:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update51:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update51_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update51_b32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update60:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update10_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update11_b32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update17_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update17_b32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update21_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update25_b33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update25_b34:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update25_b35:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update18:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update19:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update20:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update22:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update23:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update24:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update26:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update27:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update28:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update29:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update30:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update34:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update35:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update36:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update38:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update39:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update41:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update45:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update51:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update18:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update19:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update20:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update35:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update37:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update38:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update39:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update41:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update43:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update45:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update51:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update60:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update10_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update11_b32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update17_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update17_b32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update21_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update25_b33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update25_b34:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update25_b35:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update7_b32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update9_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update9_b32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jrockit:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*"
] |
|
CVE-2022-48820 | phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable() | In the Linux kernel, the following vulnerability has been resolved:
phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable()
This error path needs to decrement "usbphyc->n_pll_cons.counter" before
returning. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*"
] |
CVE-2022-37928 | Insufficient Verification of Data Authenticity vulnerability in Hewlett Packard Enterprise HPE Nimble Storage Hybrid Flash Arrays and Nimble Storage Secondary Flash Arrays.
| [
"cpe:2.3:o:hpe:sf100_firmware:*:*:*:*:ltsr:*:*:*",
"cpe:2.3:o:hpe:sf100_firmware:5.3.0.0:*:*:*:-:*:*:*",
"cpe:2.3:h:hpe:sf100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:sf300_firmware:*:*:*:*:ltsr:*:*:*",
"cpe:2.3:o:hpe:sf300_firmware:5.3.0.0:*:*:*:-:*:*:*",
"cpe:2.3:h:hpe:sf300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:hf60c_firmware:*:*:*:*:ltsr:*:*:*",
"cpe:2.3:o:hpe:hf60c_firmware:5.3.0.0:*:*:*:-:*:*:*",
"cpe:2.3:h:hpe:hf60c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:hf40c_firmware:*:*:*:*:ltsr:*:*:*",
"cpe:2.3:o:hpe:hf40c_firmware:5.3.0.0:*:*:*:-:*:*:*",
"cpe:2.3:h:hpe:hf40c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:hf20_firmware:*:*:*:*:ltsr:*:*:*",
"cpe:2.3:o:hpe:hf20_firmware:5.3.0.0:*:*:*:-:*:*:*",
"cpe:2.3:h:hpe:hf20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:hf40_firmware:*:*:*:*:ltsr:*:*:*",
"cpe:2.3:o:hpe:hf40_firmware:5.3.0.0:*:*:*:-:*:*:*",
"cpe:2.3:h:hpe:hf40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:hf60_firmware:*:*:*:*:ltsr:*:*:*",
"cpe:2.3:o:hpe:hf60_firmware:5.3.0.0:*:*:*:-:*:*:*",
"cpe:2.3:h:hpe:hf60:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:hf20h_firmware:*:*:*:*:ltsr:*:*:*",
"cpe:2.3:o:hpe:hf20h_firmware:5.3.0.0:*:*:*:-:*:*:*",
"cpe:2.3:h:hpe:hf20h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:hf20c_firmware:*:*:*:*:ltsr:*:*:*",
"cpe:2.3:o:hpe:hf20c_firmware:5.3.0.0:*:*:*:-:*:*:*",
"cpe:2.3:h:hpe:hf20c:-:*:*:*:*:*:*:*"
] |
|
CVE-2021-21946 | Two heap-based buffer overflow vulnerabilities exists in the JPEG-JFIF lossless Huffman image parser functionality of Accusoft ImageGear 19.10. A specially-crafted file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger these vulnerabilities.This heap-based buffer overflow takes place when the `SOF3` precision is lower than 9. | [
"cpe:2.3:a:accusoft:imagegear:19.10:*:*:*:*:*:*:*"
] |
|
CVE-2023-42278 | hutool v5.8.21 was discovered to contain a buffer overflow via the component JSONUtil.parse(). | [
"cpe:2.3:a:hutool:hutool:5.8.21:*:*:*:*:*:*:*"
] |
|
GHSA-c5c2-62v4-q5vq | Adobe Audition version 24.0 (and earlier) and 23.6.1 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] |
|
CVE-2013-0927 | Google Chrome OS before 26.0.1410.57 relies on a Pango pango-utils.c read_config implementation that loads the contents of the .pangorc file in the user's home directory, and the file referenced by the PANGO_RC_FILE environment variable, which allows attackers to bypass intended access restrictions via crafted configuration data. | [
"cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.5:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.6:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.7:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.8:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.9:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.10:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.11:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.12:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.14:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.15:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.16:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.17:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.18:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.19:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.20:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.21:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.22:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.23:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.24:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.25:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.26:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.27:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.28:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.29:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.30:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.31:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.32:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.33:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.34:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.35:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.36:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.37:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.38:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.39:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.40:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.41:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.42:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.43:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.44:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.45:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.46:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.47:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.48:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.49:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.50:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.51:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.52:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.54:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:26.0.1410.55:*:*:*:*:*:*:*"
] |
|
CVE-2020-28334 | Barco wePresent WiPG-1600W devices use Hard-coded Credentials (issue 2 of 2). Affected Version(s): 2.5.1.8, 2.5.0.25, 2.5.0.24, 2.4.1.19. The Barco wePresent WiPG-1600W device has a hardcoded root password hash included in the firmware image. Exploiting CVE-2020-28329, CVE-2020-28330 and CVE-2020-28331 could potentially be used in a simple and automated exploit chain to go from unauthenticated remote attacker to root shell. | [
"cpe:2.3:o:barco:wepresent_wipg-1600w_firmware:2.4.1.19:*:*:*:*:*:*:*",
"cpe:2.3:o:barco:wepresent_wipg-1600w_firmware:2.5.0.24:*:*:*:*:*:*:*",
"cpe:2.3:o:barco:wepresent_wipg-1600w_firmware:2.5.0.25:*:*:*:*:*:*:*",
"cpe:2.3:o:barco:wepresent_wipg-1600w_firmware:2.5.1.8:*:*:*:*:*:*:*",
"cpe:2.3:h:barco:wepresent_wipg-1600w:-:*:*:*:*:*:*:*"
] |
|
GHSA-2gx8-cvf4-pwjh | A vulnerability has been identified in LOGO! Soft Comfort (All versions). The software insecurely loads libraries which makes it vulnerable to DLL hijacking. Successful exploitation by a local attacker could lead to a takeover of the system where the software is installed. | [] |
|
CVE-2022-37769 | libjpeg commit 281daa9 was discovered to contain a segmentation fault via HuffmanDecoder::Get at huffmandecoder.hpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted file. | [
"cpe:2.3:a:jpeg:libjpeg:-:*:*:*:*:*:*:*"
] |
|
GHSA-cv8w-w978-3xww | A user with permission to log on to the machine hosting the AXIS Device Manager client could under certain conditions extract a memory dump from the built-in Windows Task Manager application. The memory dump may potentially contain credentials of connected Axis devices. | [] |
|
GHSA-q9m6-5269-jg29 | The Grapevine update process in Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) 1.0 allows remote authenticated users to execute arbitrary commands as root via a crafted upgrade parameter, aka Bug ID CSCux15507. | [] |
|
GHSA-22xv-75pc-484w | TWiki allows arbitrary shell command execution via the Include function | [] |
|
CVE-2012-0528 | Unspecified vulnerability in the Enterprise Manager Base Platform component in Oracle Database Server 10.2.0.3, 10.2.0.4, 10.2.0.5, and 11.1.0.7, and Oracle Enterprise Manager Grid Control, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Security Framework. | [
"cpe:2.3:a:oracle:database_server:10.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:10.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:10.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_grid_control:*:*:*:*:*:*:*:*"
] |
|
GHSA-j5fj-6hcw-p5pm | Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters). The supported version that is affected is 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data as well as unauthorized read access to a subset of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). | [] |
|
GHSA-2fm9-5hwg-96ch | A vulnerability has been found in Chengdu Flash Flood Disaster Monitoring and Warning System 2.0 and classified as critical. This vulnerability affects unknown code of the file /App_Resource/UEditor/server/upload.aspx. The manipulation of the argument file leads to unrestricted upload. The exploit has been disclosed to the public and may be used. VDB-235066 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] |
|
GHSA-qpgc-3j29-9h54 | Biscom Secure File Transfer versions 5.0.0.0 trough 5.1.1024 are vulnerable to post-authentication persistent cross-site scripting (XSS) in the "Name" and "Description" fields of a Workspace, as well as the "Description" field of a File Details pane of a file stored in a Workspace. This issue has been resolved in version 5.1.1025. | [] |
|
GHSA-f5gp-267j-g6xq | Cisco AsyncOS 9.7.0-125 on Email Security Appliance (ESA) devices allows remote attackers to bypass intended spam filtering via crafted executable content in a ZIP archive, aka Bug ID CSCuy39210. | [] |
|
CVE-2006-3669 | Mercury Messenger, possibly 1.7.1.1 and other versions, when running on a multi-user Mac OS X platform, stores chat logs with world-readable permissions within the /Users directory, which allows local users to read the chat logs from other users. | [
"cpe:2.3:a:mercury_messenger:mercury_messenger:*:*:*:*:*:*:*:*"
] |
|
GHSA-8f32-635r-wf8j | The Synergy Systems & Solutions PLC & RTU system has a vulnerability in HUSKY RTU 6049-E70 firmware versions 5.0 and prior. Specially crafted malicious packets could cause disconnection of active authentic connections or reboot of device. This is a different issue than CVE-2019-16879 and CVE-2019-20046. | [] |
|
CVE-2024-5819 | Gutenberg Blocks with AI by Kadence WP – Page Builder Features <= 3.2.45 - Authenticated (Contributor+) Stored DOM-Based Cross-Site Scripting via HTML Data Attributes | The Gutenberg Blocks with AI by Kadence WP – Page Builder Features plugin for WordPress is vulnerable to DOM-based Stored Cross-Site Scripting via HTML data attributes in all versions up to, and including, 3.2.45 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
CVE-2024-22247 | VMware SD-WAN Edge contains a missing authentication and protection mechanism vulnerability.
A malicious actor with physical access to the SD-WAN Edge appliance
during activation can potentially exploit this vulnerability to access
the BIOS configuration. In addition, the malicious actor may be able to
exploit the default boot priority configured.
| [
"cpe:2.3:a:vmware:sd-wan_edge:4.5.x:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:sd-wan_edge:5.x:*:*:*:*:*:*:*"
] |
|
GHSA-26r7-84w5-c8mf | irfanView 4.56 contains an error processing parsing files of type .pcx. Which leads to out-of-bounds writing at i_view32+0xdb60. | [] |
|
GHSA-3wr3-v78q-x45g | A partial authentication bypass vulnerability exists on Realtek RTL8812AR 1.21WW, RTL8196D 1.0.0, RTL8192ER 2.10, and RTL8881AN 1.09 devices. The vulnerability allows sending an unencrypted data frame to a WPA2-protected WLAN router where the packet is routed through the network. If successful, a response is sent back as an encrypted frame, which would allow an attacker to discern information or potentially modify data. | [] |
|
GHSA-r2vg-jc2p-mvwr | Vulnerability of the permission to access device SNs being improperly managed.Successful exploitation of this vulnerability may affect service confidentiality. | [] |
|
GHSA-r5r2-9rjq-m9cw | IBM Security Identity Governance Virtual Appliance 5.2 through 5.2.3.2 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 127396. | [] |
|
GHSA-qjhg-7vx8-5438 | Multiple buffer overflows in the SupportSoft (1) SmartIssue (tgctlsi.dll) and (2) ScriptRunner (tgctlsr.dll) ActiveX controls, as used by Symantec Automated Support Assistant and Norton AntiVirus, Internet Security, and System Works 2006, allows remote attackers to execute arbitrary code via a crafted HTML message. | [] |
|
CVE-2024-0700 | The Simple Tweet plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Tweet this text value in all versions up to, and including, 1.4.0.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
CVE-2022-1640 | Use after free in Sharing in Google Chrome prior to 101.0.4951.64 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
CVE-2015-8319 | Heap-based buffer overflow in the HIFI driver in Huawei P8 smartphones with software GRA-TL00 before GRA-TL00C01B230, GRA-CL00 before GRA-CL00C92B230, GRA-CL10 before GRA-CL10C92B230, GRA-UL00 before GRA-UL00C00B230, and GRA-UL10 before GRA-UL10C00B230, and Mate S smartphones with software CRR-TL00 before CRR-TL00C01B160SP01, CRR-UL00 before CRR-UL00C00B160, and CRR-CL00 before CRR-CL00C92B161 allows attackers to cause a denial of service (system crash) or gain privileges via a crafted application, a different vulnerability than CVE-2015-8318. | [
"cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:mate_s_firmware:crr-cl00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:mate_s_firmware:crr-tl00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:mate_s_firmware:crr-ul00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:p8_firmware:gra-cl00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:p8_firmware:gra-cl10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:p8_firmware:gra-tl00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:p8_firmware:gra-ul00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:p8_firmware:gra-ul10:*:*:*:*:*:*:*"
] |
|
GHSA-qqq7-3g9m-8wxg | ImageMagick 7.0.6-6 has a memory leak in ReadMATImage in coders/mat.c. | [] |
|
CVE-2017-0009 | Microsoft Internet Explorer 9 through 11 allow remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Microsoft Browser Memory Corruption Vulnerability." This vulnerability is different from those described in CVE-2017-0011, CVE-2017-0017, CVE-2017-0065, and CVE-2017-0068. | [
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*"
] |
|
CVE-2014-6215 | Cross-site scripting (XSS) vulnerability in IBM WebSphere Portal 6.1.0 through 6.1.0.6 CF27, 6.1.5 through 6.1.5.3 CF27, 7.0.0 before 7.0.0.2 CF29, 8.0.0 through 8.0.0.1 CF14, and 8.5.0 before CF03 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL. | [
"cpe:2.3:a:ibm:websphere_portal:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.6:cf27:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.1:14:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.5.0:*:*:*:*:*:*:*"
] |
|
CVE-2020-14572 | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*"
] |
|
GHSA-2873-7qvm-44c9 | Vulnerability in the MICROS Relate CRM Software product of Oracle Retail Applications (component: Internal Operations). Supported versions that are affected are 7.1.0, 15.0.0, 16.0.0, 17.0.0, and 18.0.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise MICROS Relate CRM Software. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MICROS Relate CRM Software accessible data. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N). | [] |
|
CVE-2024-47962 | Stack-based Buffer Overflow vulnerability in Delta Electronics CNCSoft-G2 | Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can manipulate an insider to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process. | [
"cpe:2.3:a:delta_electronics:cncsoft-g2:2.1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:deltaww:cncsoft-g2:2.1.0.10:*:*:*:*:*:*:*"
] |
GHSA-f4fx-9fx2-ww9h | Acrobat Reader versions 20.005.30574, 24.002.20736 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] |
|
CVE-2024-20478 | Cisco Application Policy Infrastructure Controller App Privilege Escalation Vulnerability | A vulnerability in the software upgrade component of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Network Controller, formerly Cisco Cloud APIC, could allow an authenticated, remote attacker with Administrator-level privileges to install a modified software image, leading to arbitrary code injection on an affected system.
This vulnerability is due to insufficient signature validation of software images. An attacker could exploit this vulnerability by installing a modified software image. A successful exploit could allow the attacker to execute arbitrary code on the affected system and elevate their privileges to root.
Note: Administrators should always validate the hash of any upgrade image before uploading it to Cisco APIC and Cisco Cloud Network Controller. | [
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(8d\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(1o\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(2h\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(2i\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(1k\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(1k\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.1\\(2m\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(1m\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(5e\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2m\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(41d\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(1o\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(1m\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(2j\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(4r\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(3j\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(3f\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(2f\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(4m\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(2k\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.1\\(1i\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(1p\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.1\\(2p\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3s\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(3c\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(4e\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1k\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(4f\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.1\\(3h\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(4d\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(1n\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(1m\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(1r\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.1\\(2e\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(2e\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3j\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3n\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(1l\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(2e\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(3r\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.0\\(2k\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.1\\(3g\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(1h\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(1o\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(3p\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(3e\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(3s\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(2g\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1l\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(9f\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3l\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(2g\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(3c\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(7k\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\\(2h\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(9b\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\\(2k\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.1\\(2t\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(2h\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3j\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.1\\(2k\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.3\\(1f\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(3h\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.0\\(1i\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2u\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1l\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(3d\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(4l\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.3\\(1i\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.1\\(2q\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(4e\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1i\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.1\\(1i\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(2m\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.0\\(2h\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(2q\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.3\\(1l\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\\(1h\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.0\\(2n\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(5f\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(1h\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(1l\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1i\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2o\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(1i\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\\(1j\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.1\\(1h\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(2l\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(2h\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(2g\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.0\\(1k\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1g\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.1\\(2g\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(1q\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(1j\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2g\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(1r\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(2f\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(6i\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\\(1g\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\\(2j\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\\(2i\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(2o\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(4q\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.3\\(1o\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3i\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(2j\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(1d\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(2n\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(3t\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3n\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(4g\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2x\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(5d\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.1\\(2o\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(2i\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.1\\(2f\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\\(2f\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3q\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1j\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(2f\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.3\\(1e\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(1s\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.1\\(2v\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2w\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(4i\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.1\\(2u\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(4f\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.0\\(2m\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(1k\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(2o\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3r\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(2i\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(2c\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\\(1i\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2s\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(7f\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(3m\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3o\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.1\\(2s\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(2l\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1j\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.3\\(1p\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.1\\(4a\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(1n\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(1n\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(4p\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.1\\(3j\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4i\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(9h\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(1k\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4k\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(1l\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(2e\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4o\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4p\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(2h\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(5k\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(5l\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(5n\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(1h\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6d\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(2e\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6g\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6h\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(3e\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(10e\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6l\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7f\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(4c\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6o\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(1g\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2e\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7l\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(10f\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2f\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2g\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7q\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2h\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(3f\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(3e\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(3g\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7r\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7s\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4d\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4e\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7t\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(5d\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(10g\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(5c\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(1g\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7u\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(5e\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4f\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(6e\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(1j\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(6g\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(7f\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7v\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(7g\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(2h\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7w\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(6h\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4h\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8d\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(2j\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8e\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(3d\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(3e\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8f\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8g\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(1d\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8h\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(4c\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2a\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8i\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(5h\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2b\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(3g\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(5j\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2c\\):*:*:*:*:*:*:*"
] |
CVE-2023-26817 | codefever before 2023.2.7-commit-b1c2e7f was discovered to contain a remote code execution (RCE) vulnerability via the component /controllers/api/user.php. | [
"cpe:2.3:a:pgyer:codefever:*:*:*:*:*:*:*:*"
] |
|
GHSA-crv5-fgrq-p364 | The IKEv2 implementation in Cisco IOS, when AES-GCM or AES-GMAC is used, allows remote attackers to bypass certain IPsec anti-replay features via IPsec tunnel traffic, aka Bug ID CSCuj47795. | [] |
|
GHSA-633w-9qcg-g8vx | An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. DMA attacks on the FvbServicesRuntimeDxe shared buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges. This attack can be mitigated using IOMMU protection for the ACPI runtime memory used for the command buffer. This attack can be mitigated by copying the firmware block services data to SMRAM before checking it. | [] |
|
GHSA-63gm-r62c-qj2f | OTFCC v0.10.4 was discovered to contain a segmentation violation via /release-x64/otfccdump+0x6babea. | [] |
|
GHSA-w5w3-73cq-jm68 | Unauth. Reflected Cross-site Scripting (XSS) vulnerability in Magic Post Thumbnail plugin <= 4.1.10 versions. | [] |
|
GHSA-68mx-grwp-c8mv | Cross-site scripting (XSS) vulnerability in the Diocese of Portsmouth Resources Database (pd_resources) extension 0.1.1 and earlier for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
GHSA-fgf6-p7j4-p25h | In notification management of the service manager, there is a possible permissions bypass. This could lead to local escalation of privilege by preventing user notification, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112434609 | [] |
|
GHSA-6mqv-9qvr-xhfq | From the VSPC management agent machine, under condition that the management agent is authorized on the server, it is possible to remove arbitrary files on the VSPC server machine. | [] |
|
GHSA-v9pc-cxpw-3jr5 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | [] |
|
GHSA-j6q6-97rg-2x8h | A vulnerability in the Open Systems Gateway initiative (OSGi) interface of Cisco Policy Suite before 18.1.0 could allow an unauthenticated, remote attacker to directly connect to the OSGi interface. The vulnerability is due to a lack of authentication. An attacker could exploit this vulnerability by directly connecting to the OSGi interface. An exploit could allow the attacker to access or change any files that are accessible by the OSGi process. Cisco Bug IDs: CSCvh18017. | [] |
|
GHSA-rpmg-pqrf-89p5 | An attacker could send an HTTP request to an Open5GS endpoint and retrieve the information stored on the device due to the lack of Authentication. | [] |
|
CVE-2006-1483 | Blazix Web Server before 1.2.6, when running on Windows, allows remote attackers to obtain the source code of JSP files via (1) . (dot), (2) space, and (3) slash characters in the extension of a URL. | [
"cpe:2.3:a:desiderata_software:blazix_web_server:*:*:windows:*:*:*:*:*"
] |
|
CVE-2019-5805 | Use-after-free in PDFium in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:backports:sle-15:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"
] |
|
GHSA-vh5f-hgf9-rcwq | Unspecified vulnerability in the Java SE and JavaFX components in Oracle Java SE 7u40 and earlier and JavaFX 2.2.40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2013-5777. | [] |
|
CVE-2020-11914 | The Treck TCP/IP stack before 6.0.1.66 has an ARP Out-of-bounds Read. | [
"cpe:2.3:a:treck:tcp\\/ip:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-15609 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_dashboard.php. When parsing the service_stop parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9726. | [
"cpe:2.3:a:centos-webpanel:centos_web_panel:17.0.9.8.923:*:*:*:*:*:*:*"
] |
|
GHSA-m55q-7qj6-v5m6 | Cross-Site Request Forgery (CSRF) vulnerability in GalleryPlugins Video Contest WordPress plugin <= 3.2 versions. | [] |
|
CVE-2022-22593 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Security Update 2022-001 Catalina, macOS Monterey 12.2, macOS Big Sur 11.6.3. A malicious application may be able to execute arbitrary code with kernel privileges. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
GHSA-gfqr-2cch-p32h | Improper privilege assignment vulnerability in the installer McAfee Application and Change Control (MACC) prior to 8.3.2 allows local administrators to change or update the configuration settings via a carefully constructed MSI configured to mimic the genuine installer. This version adds further controls for installation/uninstallation of software. | [] |
|
CVE-2005-3048 | Directory traversal vulnerability in index.php in PhpMyFaq 1.5.1 allows remote attackers to read arbitrary files or include arbitrary PHP files via a .. (dot dot) in the LANGCODE parameter, which also allows direct code injection via the User Agent field in a request packet, which can be activated by using LANGCODE to reference the user tracking data file. | [
"cpe:2.3:a:phpmyfaq:phpmyfaq:1.5.1:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.