Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
CVE-2022-22600
The issue was addressed with improved permissions logic. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, macOS Monterey 12.3, watchOS 8.5. A malicious application may be able to bypass certain Privacy preferences.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
CVE-2022-26375
WordPress AB Press Optimizer plugin <= 1.1.1 - Auth. Stored Cross-Site Scripting (XSS) vulnerability
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Mammothology AB Press Optimizer plugin <= 1.1.1 on WordPress.
[ "cpe:2.3:a:abpressoptimizer:ab_press_optimizer:*:*:*:*:*:wordpress:*:*" ]
GHSA-f2hm-6r67-2w7v
Cross-site scripting (XSS) vulnerability in Ortro before 1.3.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
CVE-2024-10734
Project Worlds Life Insurance Management System editPayment.php sql injection
A vulnerability was found in Project Worlds Life Insurance Management System 1.0. It has been classified as critical. This affects an unknown part of the file /editPayment.php. The manipulation of the argument recipt_no leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:projectworlds:life_insurance_management_system:1.0:*:*:*:*:*:*:*" ]
GHSA-ww87-ccm2-r7w7
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15535.
[]
CVE-2022-36924
Local Privilege Escalation in Zoom Rooms Installer for Windows
The Zoom Rooms Installer for Windows prior to 5.12.6 contains a local privilege escalation vulnerability. A local low-privileged user could exploit this vulnerability during the install process to escalate their privileges to the SYSTEM user.
[ "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*" ]
CVE-2024-54356
WordPress Online Booking & Scheduling Calendar for WordPress by vcita plugin <= 4.5 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in vCita.com Online Booking & Scheduling Calendar for WordPress by vcita allows Cross Site Request Forgery.This issue affects Online Booking & Scheduling Calendar for WordPress by vcita: from n/a through 4.5.
[]
CVE-2012-0156
DirectWrite in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly render Unicode characters, which allows remote attackers to cause a denial of service (application hang) via a (1) instant message or (2) web site, aka "DirectWrite Application Denial of Service Vulnerability."
[ "cpe:2.3:o:microsoft:windows_7:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:*:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*" ]
GHSA-3wmf-6xrp-7qch
Web sessions in the management interface in Palo Alto Networks PAN-OS software do not expire in certain situations, making it susceptible to unauthorized access.
[]
CVE-2024-45696
D-Link WiFi router - Hidden Functionality
Certain models of D-Link wireless routers contain hidden functionality. By sending specific packets to the web service, the attacker can forcibly enable the telnet service and log in using hard-coded credentials. The telnet service enabled through this method can only be accessed from within the same local network as the device.
[ "cpe:2.3:o:dlink:covr-x1870_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-x4860_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:covr-x1870:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-x4860_firmware:1.00:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-x4860_firmware:1.04:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-x4860:a1:*:*:*:*:*:*:*" ]
CVE-2025-28094
shopxo v6.4.0 has a ssrf/xss vulnerability in multiple places.
[]
CVE-2014-9045
The FTP backend in user_external in ownCloud Server before 5.0.18 and 6.x before 6.0.6 allows remote attackers to bypass intended authentication requirements via a crafted password.
[ "cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.14:a:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:6.0.5:*:*:*:*:*:*:*" ]
GHSA-v8gr-gp4p-fpww
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected is 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data as well as unauthorized read access to a subset of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).
[]
CVE-2006-4354
PHP remote file inclusion vulnerability in e/class/CheckLevel.php in Phome Empire CMS 3.7 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the check_path parameter.
[ "cpe:2.3:a:phome_empire:phome_empire_cms:3.7:*:*:*:*:*:*:*" ]
CVE-2022-30686
AEM Reflected XSS Arbitrary code execution
Adobe Experience Manager versions 6.5.13.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. Exploitation of this issue requires low-privilege access to AEM.
[ "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager:-:*:*:*:cloud_service:*:*:*" ]
GHSA-9397-457v-6qhp
A vulnerability classified as problematic was found in PHPGurukul Credit Card Application Management System 1.0. This vulnerability affects unknown code of the file /admin/new-ccapplication.php. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
CVE-2016-9413
The Admin control panel in MyBB (aka MyBulletinBoard) before 1.8.7 and MyBB Merge System before 1.8.7 allows remote attackers to conduct clickjacking attacks via unspecified vectors.
[ "cpe:2.3:a:mybb:merge_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:*:*:*:*:*:*:*:*" ]
CVE-2025-3604
Flynax Bridge <= 2.2.0 - Unauthenticated Privilege Escalation via Account Takeover
The Flynax Bridge plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 2.2.0. This is due to the plugin not properly validating a user's identity prior to updating their details like email. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.
[]
GHSA-fcxw-jr7h-j53p
Mule Enterprise Management Console (MMC) does not properly restrict access to handler/securityService.rpc, which allows remote authenticated users to gain administrator privileges and execute arbitrary code via a crafted request that adds a new user. NOTE: this issue was originally reported for ESB Runtime 3.5.1, but it originates in MMC.
[]
GHSA-c37p-qfh4-9v45
Logical defects in code implementation in some products. Successful exploitation of this vulnerability may affect the availability of some features.
[]
CVE-2020-23042
Dropouts Technologies LLP Super Backup v2.0.5 was discovered to contain a cross-site scripting (XSS) vulnerability in the path parameter of the `list` and `download` module. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted GET request.
[ "cpe:2.3:a:dropouts:super_backup:2.0.5:*:*:*:*:ipados:*:*", "cpe:2.3:a:dropouts:super_backup:2.0.5:*:*:*:*:iphone_os:*:*" ]
CVE-2016-2242
Exponent CMS 2.x before 2.3.7 Patch 3 allows remote attackers to execute arbitrary code via the sc parameter to install/index.php.
[ "cpe:2.3:a:exponentcms:exponent_cms:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.0.4:p3:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.0.5:p1:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.0.6:p2:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.0.8:p2:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.0.9:p5:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.1.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.1.4:p11:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.2.0:p5:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.2.2:p2:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.2.3:p14:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.3.0:p4:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.3.1:p4:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.3.2:p2:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.3.3:p1:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.3.4:p1:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.3.5:p2:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:exponentcms:exponent_cms:2.3.8:*:*:*:*:*:*:*" ]
CVE-2023-35989
An integer overflow vulnerability exists in the LXT2 zlib block allocation functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability.
[ "cpe:2.3:a:tonybybell:gtkwave:3.3.115:*:*:*:*:*:*:*" ]
CVE-2017-0391
A denial of service vulnerability in decoder/ihevcd_decode.c in libhevc in Mediaserver could enable a remote attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1. Android ID: A-32322258.
[ "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*" ]
GHSA-vhxx-2mfr-ffpp
Multiple cross-site scripting (XSS) vulnerabilities in the Kunena component before 3.0.6 for Joomla! allow remote attackers to inject arbitrary web script or HTML via the (1) index value of an array parameter or the filename parameter in the Content-Disposition header to the (2) file or (3) profile image upload functionality.
[]
GHSA-cj34-qf96-c4gj
NVIDIA SHIELD TV, all versions prior to 8.2.2, contains a vulnerability in the implementation of the RPMB command status, in which an attacker can write to the Write Protect Configuration Block, which may lead to denial of service or escalation of privileges.
[]
CVE-2021-30183
Cleartext storage of sensitive information in multiple versions of Octopus Server where in certain situations when running import or export processes, the password used to encrypt and decrypt sensitive values would be written to the logs in plaintext.
[ "cpe:2.3:a:octopus:server:*:*:*:*:*:*:*:*" ]
GHSA-jmrg-wp7g-g3wc
In various firmware versions of Lenovo System x, the integrated management module II (IMM2)'s first failure data capture (FFDC) includes the web server's private key in the generated log file for support.
[]
GHSA-r2j7-cpgf-7qq3
A Cross Site Scripting (XSS) vulnerability exists in FUEL-CMS 1.5.1 in the Assets page via an SVG file.
[]
GHSA-rp5c-q9p5-vm9v
FFmpeg 0.5.x, as used in MPlayer and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed VC-1 file.
[]
GHSA-52jp-38ff-h36v
GasGauge in Apple watchOS before 2 allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5919.
[]
CVE-2022-45796
SHARP Multifunction Printer - Command Injection
Command injection vulnerability in nw_interface.html in SHARP multifunction printers (MFPs)'s Digital Full-color Multifunctional System 202 or earlier, 120 or earlier, 600 or earlier, 121 or earlier, 500 or earlier, 402 or earlier, 790 or earlier, and Digital Multifunctional System (Monochrome) 200 or earlier, 211 or earlier, 102 or earlier, 453 or earlier, 400 or earlier, 202 or earlier, 602 or earlier, 500 or earlier, 401 or earlier allows remote attackers to execute arbitrary commands via unspecified vectors.
[ "cpe:2.3:o:sharp:bp-30c25_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-30c25:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-30c25t:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-30c25y:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-30c25z:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m28_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-30m28:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m28t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-30m28t:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-30m31:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m31t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-30m31t:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m35_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-30m35:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m35t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-30m35t:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50c26:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50c31:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50c36:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50c45:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50c55:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c65_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50c65:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50m26:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50m31:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50m36:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50m45:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m50_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50m50:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50m55:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-55c26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-55c26:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-60c31:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-60c36:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-60c45:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70c31:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70c36:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70c45:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70c55:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c65_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70c65:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70m31:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70m36:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70m45:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70m55:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m65_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70m65:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m75_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70m75:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m90_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70m90:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-2630n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-2630n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-2651_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-2651:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3050n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3050n_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3050v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3050v_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3051:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3060n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3060n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3060v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3060v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3061_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3061:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3061s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3061s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3070n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3070n_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3070v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3070v_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3071:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3071s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3550n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3550n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3550v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3550v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3551:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3560n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3560n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3560v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3560v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3561_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3561:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3561s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3561s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3570n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3570n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3570v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3570v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3571:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3571s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3571s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4050n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4050v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4051:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4060n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4060n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4060v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4060v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4061_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4061:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4061s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4061s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4070n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4070n_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4070v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4070v_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4071:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4071s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-5050n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-5050v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-5051:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-5070n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-5070v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-5071:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-5071s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6050n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6050v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6051:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6070n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6070n_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6070v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6070v_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6071:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6071s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6580n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6580n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-7081_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-7081:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-7090n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-7090n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-7580n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-7580n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-8081_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-8081:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-8090n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-8090n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b355w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b355w:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b355wt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b355wt:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b355wz_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b355wz:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b356w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b356w:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b356wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b356wh:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b376w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b376w:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b376wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b376wh:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b455w:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455wt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b455wt:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455wz_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b455wz:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b456w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b456w:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b456wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b456wh:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b476w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b476w:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b476wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b476wh:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c303_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c303:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c303w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c303w:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c303wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c303wh:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c304:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c304w:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c304wh:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m1056_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m1056:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m1206_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m1206:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m2630:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2630_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m2630_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2651_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m2651:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3050:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3050_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3050_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3051:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3070:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3070_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3071:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3071s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3550:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3551:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3570:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3571:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3571s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3571s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m4050:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m4051:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m4070:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m4070_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m4071:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m4071s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m5050:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m5051:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m5070:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m5071:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m5071s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m6050:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m6051:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m6070:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m6070_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m6071:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m6071s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m6570:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m7570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m7570:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m905_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m905:-:*:*:*:*:*:*:*" ]
GHSA-qffj-xvw3-9g6g
SQL Injection vulnerability in Talend ESB Runtime 7.3.1-R2022-09-RT thru 8.0.1-R2022-10-RT when using the provisioning service.
[]
CVE-2008-6998
Stack-based buffer overflow in chrome/common/gfx/url_elider.cc in Google Chrome 0.2.149.27 and other versions before 0.2.149.29 might allow user-assisted remote attackers to execute arbitrary code via a link target (href attribute) with a large number of path elements, which triggers the overflow when the status bar is updated after the user hovers over the link.
[ "cpe:2.3:a:google:chrome:0.2.149.27:*:*:*:*:*:*:*" ]
GHSA-c5f2-m637-877p
IBM WebSphere Application Server 5.0.2 (or any earlier cumulative fix) and 5.1.1 (or any earlier cumulative fix) allows EJB access on Solaris systems via a crafted LTPA token.
[]
CVE-2011-4106
TimThumb (timthumb.php) before 2.0 does not validate the entire source with the domain white list, which allows remote attackers to upload and execute arbitrary code via a URL containing a white-listed domain in the src parameter, then accessing it via a direct request to the file in the cache directory, as exploited in the wild in August 2011.
[ "cpe:2.3:a:binarymoon:timthumb:*:*:*:*:*:*:*:*" ]
GHSA-6h2m-p8m3-57fx
Cross-site scripting (XSS) vulnerability in the mobile-browser subsystem in Cisco WebEx Meeting Center allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCul36228.
[]
CVE-2021-26569
Race Condition within a Thread vulnerability in iscsi_snapshot_comm_core in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to execute arbitrary code via crafted web requests.
[ "cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*" ]
CVE-2013-5221
The mobile-upload feature in Esri ArcGIS for Server 10.1 through 10.2 allows remote authenticated users to upload .exe files by leveraging (1) publisher or (2) administrator privileges.
[ "cpe:2.3:a:esri:arcgis_server:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:esri:arcgis_server:10.2:*:*:*:*:*:*:*" ]
GHSA-qqjx-v7vc-77w8
SecureCRT before 8.7.2 allows remote attackers to execute arbitrary code via an Integer Overflow and a Buffer Overflow because a banner can trigger a line number to CSI functions that exceeds INT_MAX.
[]
GHSA-cp2m-j67p-96qc
The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.6, macOS Sequoia 15.5, macOS Sonoma 14.7.6. An app may be able to bypass ASLR.
[]
GHSA-264r-p5m9-6v8c
This issue was addressed by adding an additional prompt for user consent. This issue is fixed in macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, macOS Sonoma 14.6. A shortcut may be able to bypass Internet permission requirements.
[]
CVE-2013-5830
Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
[ "cpe:2.3:a:oracle:jdk:1.5.0:-:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update10:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update11:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update12:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update13:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update14:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update15:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update16:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update17:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update18:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update19:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update20:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update21:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update22:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update23:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update24:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update25:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update26:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update27:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update28:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update29:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update30:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update33:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update34:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update35:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update36:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update38:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update39:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update4:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update40:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update41:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update45:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update51:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update6:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update7:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update8:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update9:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:-:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update10:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update11:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update12:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update13:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update14:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update15:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update16:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update17:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update18:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update19:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update20:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update21:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update32_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update32_b32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update33_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update33_b32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update33_b33:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update34_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update34_b32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update35:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update35_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update35_b32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update37:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update37_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update37_b32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update38:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update38_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update39:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update4:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update41:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update43:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update43_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update45:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update51:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update51_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update51_b32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update6:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update60:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update7:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update8:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update9:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:-:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update10_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update11_b32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update15:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update17:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update17_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update17_b32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update21:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update21_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update25:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update25_b33:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update25_b34:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update25_b35:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update40:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:-:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update10:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update11:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update12:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update13:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update14:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update15:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update16:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update17:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update18:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update19:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update20:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update21:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update22:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update23:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update24:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update25:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update26:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update27:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update28:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update29:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update30:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update33:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update34:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update35:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update36:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update38:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update39:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update4:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update40:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update41:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update45:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update51:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update6:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update7:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update8:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update9:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:-:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update10:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update11:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update12:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update13:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update14:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update15:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update16:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update17:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update18:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update19:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update20:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update21:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update35:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update37:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update38:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update39:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update4:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update41:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update43:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update45:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update51:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update6:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update60:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update7:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update8:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update9:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update10_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update11_b32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update17_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update17_b32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update21:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update21_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update25:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update25_b33:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update25_b34:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update25_b35:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update40:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update7_b32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update9_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update9_b32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jrockit:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*" ]
CVE-2022-48820
phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable()
In the Linux kernel, the following vulnerability has been resolved: phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable() This error path needs to decrement "usbphyc->n_pll_cons.counter" before returning.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*" ]
CVE-2022-37928
Insufficient Verification of Data Authenticity vulnerability in Hewlett Packard Enterprise HPE Nimble Storage Hybrid Flash Arrays and Nimble Storage Secondary Flash Arrays.
[ "cpe:2.3:o:hpe:sf100_firmware:*:*:*:*:ltsr:*:*:*", "cpe:2.3:o:hpe:sf100_firmware:5.3.0.0:*:*:*:-:*:*:*", "cpe:2.3:h:hpe:sf100:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:sf300_firmware:*:*:*:*:ltsr:*:*:*", "cpe:2.3:o:hpe:sf300_firmware:5.3.0.0:*:*:*:-:*:*:*", "cpe:2.3:h:hpe:sf300:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:hf60c_firmware:*:*:*:*:ltsr:*:*:*", "cpe:2.3:o:hpe:hf60c_firmware:5.3.0.0:*:*:*:-:*:*:*", "cpe:2.3:h:hpe:hf60c:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:hf40c_firmware:*:*:*:*:ltsr:*:*:*", "cpe:2.3:o:hpe:hf40c_firmware:5.3.0.0:*:*:*:-:*:*:*", "cpe:2.3:h:hpe:hf40c:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:hf20_firmware:*:*:*:*:ltsr:*:*:*", "cpe:2.3:o:hpe:hf20_firmware:5.3.0.0:*:*:*:-:*:*:*", "cpe:2.3:h:hpe:hf20:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:hf40_firmware:*:*:*:*:ltsr:*:*:*", "cpe:2.3:o:hpe:hf40_firmware:5.3.0.0:*:*:*:-:*:*:*", "cpe:2.3:h:hpe:hf40:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:hf60_firmware:*:*:*:*:ltsr:*:*:*", "cpe:2.3:o:hpe:hf60_firmware:5.3.0.0:*:*:*:-:*:*:*", "cpe:2.3:h:hpe:hf60:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:hf20h_firmware:*:*:*:*:ltsr:*:*:*", "cpe:2.3:o:hpe:hf20h_firmware:5.3.0.0:*:*:*:-:*:*:*", "cpe:2.3:h:hpe:hf20h:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:hf20c_firmware:*:*:*:*:ltsr:*:*:*", "cpe:2.3:o:hpe:hf20c_firmware:5.3.0.0:*:*:*:-:*:*:*", "cpe:2.3:h:hpe:hf20c:-:*:*:*:*:*:*:*" ]
CVE-2021-21946
Two heap-based buffer overflow vulnerabilities exists in the JPEG-JFIF lossless Huffman image parser functionality of Accusoft ImageGear 19.10. A specially-crafted file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger these vulnerabilities.This heap-based buffer overflow takes place when the `SOF3` precision is lower than 9.
[ "cpe:2.3:a:accusoft:imagegear:19.10:*:*:*:*:*:*:*" ]
CVE-2023-42278
hutool v5.8.21 was discovered to contain a buffer overflow via the component JSONUtil.parse().
[ "cpe:2.3:a:hutool:hutool:5.8.21:*:*:*:*:*:*:*" ]
GHSA-c5c2-62v4-q5vq
Adobe Audition version 24.0 (and earlier) and 23.6.1 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
CVE-2013-0927
Google Chrome OS before 26.0.1410.57 relies on a Pango pango-utils.c read_config implementation that loads the contents of the .pangorc file in the user's home directory, and the file referenced by the PANGO_RC_FILE environment variable, which allows attackers to bypass intended access restrictions via crafted configuration data.
[ "cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.5:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.6:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.7:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.8:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.9:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.10:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.11:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.12:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.14:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.15:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.16:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.17:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.18:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.19:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.20:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.21:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.22:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.23:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.24:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.25:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.26:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.27:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.28:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.29:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.30:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.31:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.32:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.33:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.34:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.35:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.36:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.37:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.38:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.39:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.40:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.41:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.42:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.43:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.44:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.45:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.46:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.47:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.48:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.49:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.50:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.51:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.52:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.54:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:26.0.1410.55:*:*:*:*:*:*:*" ]
CVE-2020-28334
Barco wePresent WiPG-1600W devices use Hard-coded Credentials (issue 2 of 2). Affected Version(s): 2.5.1.8, 2.5.0.25, 2.5.0.24, 2.4.1.19. The Barco wePresent WiPG-1600W device has a hardcoded root password hash included in the firmware image. Exploiting CVE-2020-28329, CVE-2020-28330 and CVE-2020-28331 could potentially be used in a simple and automated exploit chain to go from unauthenticated remote attacker to root shell.
[ "cpe:2.3:o:barco:wepresent_wipg-1600w_firmware:2.4.1.19:*:*:*:*:*:*:*", "cpe:2.3:o:barco:wepresent_wipg-1600w_firmware:2.5.0.24:*:*:*:*:*:*:*", "cpe:2.3:o:barco:wepresent_wipg-1600w_firmware:2.5.0.25:*:*:*:*:*:*:*", "cpe:2.3:o:barco:wepresent_wipg-1600w_firmware:2.5.1.8:*:*:*:*:*:*:*", "cpe:2.3:h:barco:wepresent_wipg-1600w:-:*:*:*:*:*:*:*" ]
GHSA-2gx8-cvf4-pwjh
A vulnerability has been identified in LOGO! Soft Comfort (All versions). The software insecurely loads libraries which makes it vulnerable to DLL hijacking. Successful exploitation by a local attacker could lead to a takeover of the system where the software is installed.
[]
CVE-2022-37769
libjpeg commit 281daa9 was discovered to contain a segmentation fault via HuffmanDecoder::Get at huffmandecoder.hpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted file.
[ "cpe:2.3:a:jpeg:libjpeg:-:*:*:*:*:*:*:*" ]
GHSA-cv8w-w978-3xww
A user with permission to log on to the machine hosting the AXIS Device Manager client could under certain conditions extract a memory dump from the built-in Windows Task Manager application. The memory dump may potentially contain credentials of connected Axis devices.
[]
GHSA-q9m6-5269-jg29
The Grapevine update process in Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) 1.0 allows remote authenticated users to execute arbitrary commands as root via a crafted upgrade parameter, aka Bug ID CSCux15507.
[]
GHSA-22xv-75pc-484w
TWiki allows arbitrary shell command execution via the Include function
[]
CVE-2012-0528
Unspecified vulnerability in the Enterprise Manager Base Platform component in Oracle Database Server 10.2.0.3, 10.2.0.4, 10.2.0.5, and 11.1.0.7, and Oracle Enterprise Manager Grid Control, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Security Framework.
[ "cpe:2.3:a:oracle:database_server:10.2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:10.2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:10.2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:enterprise_manager_grid_control:*:*:*:*:*:*:*:*" ]
GHSA-j5fj-6hcw-p5pm
Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters). The supported version that is affected is 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data as well as unauthorized read access to a subset of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).
[]
GHSA-2fm9-5hwg-96ch
A vulnerability has been found in Chengdu Flash Flood Disaster Monitoring and Warning System 2.0 and classified as critical. This vulnerability affects unknown code of the file /App_Resource/UEditor/server/upload.aspx. The manipulation of the argument file leads to unrestricted upload. The exploit has been disclosed to the public and may be used. VDB-235066 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
GHSA-qpgc-3j29-9h54
Biscom Secure File Transfer versions 5.0.0.0 trough 5.1.1024 are vulnerable to post-authentication persistent cross-site scripting (XSS) in the "Name" and "Description" fields of a Workspace, as well as the "Description" field of a File Details pane of a file stored in a Workspace. This issue has been resolved in version 5.1.1025.
[]
GHSA-f5gp-267j-g6xq
Cisco AsyncOS 9.7.0-125 on Email Security Appliance (ESA) devices allows remote attackers to bypass intended spam filtering via crafted executable content in a ZIP archive, aka Bug ID CSCuy39210.
[]
CVE-2006-3669
Mercury Messenger, possibly 1.7.1.1 and other versions, when running on a multi-user Mac OS X platform, stores chat logs with world-readable permissions within the /Users directory, which allows local users to read the chat logs from other users.
[ "cpe:2.3:a:mercury_messenger:mercury_messenger:*:*:*:*:*:*:*:*" ]
GHSA-8f32-635r-wf8j
The Synergy Systems & Solutions PLC & RTU system has a vulnerability in HUSKY RTU 6049-E70 firmware versions 5.0 and prior. Specially crafted malicious packets could cause disconnection of active authentic connections or reboot of device. This is a different issue than CVE-2019-16879 and CVE-2019-20046.
[]
CVE-2024-5819
Gutenberg Blocks with AI by Kadence WP – Page Builder Features <= 3.2.45 - Authenticated (Contributor+) Stored DOM-Based Cross-Site Scripting via HTML Data Attributes
The Gutenberg Blocks with AI by Kadence WP – Page Builder Features plugin for WordPress is vulnerable to DOM-based Stored Cross-Site Scripting via HTML data attributes in all versions up to, and including, 3.2.45 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
CVE-2024-22247
VMware SD-WAN Edge contains a missing authentication and protection mechanism vulnerability. A malicious actor with physical access to the SD-WAN Edge appliance during activation can potentially exploit this vulnerability to access the BIOS configuration. In addition, the malicious actor may be able to exploit the default boot priority configured.
[ "cpe:2.3:a:vmware:sd-wan_edge:4.5.x:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:sd-wan_edge:5.x:*:*:*:*:*:*:*" ]
GHSA-26r7-84w5-c8mf
irfanView 4.56 contains an error processing parsing files of type .pcx. Which leads to out-of-bounds writing at i_view32+0xdb60.
[]
GHSA-3wr3-v78q-x45g
A partial authentication bypass vulnerability exists on Realtek RTL8812AR 1.21WW, RTL8196D 1.0.0, RTL8192ER 2.10, and RTL8881AN 1.09 devices. The vulnerability allows sending an unencrypted data frame to a WPA2-protected WLAN router where the packet is routed through the network. If successful, a response is sent back as an encrypted frame, which would allow an attacker to discern information or potentially modify data.
[]
GHSA-r2vg-jc2p-mvwr
Vulnerability of the permission to access device SNs being improperly managed.Successful exploitation of this vulnerability may affect service confidentiality.
[]
GHSA-r5r2-9rjq-m9cw
IBM Security Identity Governance Virtual Appliance 5.2 through 5.2.3.2 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 127396.
[]
GHSA-qjhg-7vx8-5438
Multiple buffer overflows in the SupportSoft (1) SmartIssue (tgctlsi.dll) and (2) ScriptRunner (tgctlsr.dll) ActiveX controls, as used by Symantec Automated Support Assistant and Norton AntiVirus, Internet Security, and System Works 2006, allows remote attackers to execute arbitrary code via a crafted HTML message.
[]
CVE-2024-0700
The Simple Tweet plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Tweet this text value in all versions up to, and including, 1.4.0.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
CVE-2022-1640
Use after free in Sharing in Google Chrome prior to 101.0.4951.64 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
CVE-2015-8319
Heap-based buffer overflow in the HIFI driver in Huawei P8 smartphones with software GRA-TL00 before GRA-TL00C01B230, GRA-CL00 before GRA-CL00C92B230, GRA-CL10 before GRA-CL10C92B230, GRA-UL00 before GRA-UL00C00B230, and GRA-UL10 before GRA-UL10C00B230, and Mate S smartphones with software CRR-TL00 before CRR-TL00C01B160SP01, CRR-UL00 before CRR-UL00C00B160, and CRR-CL00 before CRR-CL00C92B161 allows attackers to cause a denial of service (system crash) or gain privileges via a crafted application, a different vulnerability than CVE-2015-8318.
[ "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:mate_s_firmware:crr-cl00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:mate_s_firmware:crr-tl00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:mate_s_firmware:crr-ul00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:p8_firmware:gra-cl00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:p8_firmware:gra-cl10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:p8_firmware:gra-tl00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:p8_firmware:gra-ul00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:p8_firmware:gra-ul10:*:*:*:*:*:*:*" ]
GHSA-qqq7-3g9m-8wxg
ImageMagick 7.0.6-6 has a memory leak in ReadMATImage in coders/mat.c.
[]
CVE-2017-0009
Microsoft Internet Explorer 9 through 11 allow remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Microsoft Browser Memory Corruption Vulnerability." This vulnerability is different from those described in CVE-2017-0011, CVE-2017-0017, CVE-2017-0065, and CVE-2017-0068.
[ "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*" ]
CVE-2014-6215
Cross-site scripting (XSS) vulnerability in IBM WebSphere Portal 6.1.0 through 6.1.0.6 CF27, 6.1.5 through 6.1.5.3 CF27, 7.0.0 before 7.0.0.2 CF29, 8.0.0 through 8.0.0.1 CF14, and 8.5.0 before CF03 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
[ "cpe:2.3:a:ibm:websphere_portal:6.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.1.0.6:cf27:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.1:14:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.5.0:*:*:*:*:*:*:*" ]
CVE-2020-14572
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*" ]
GHSA-2873-7qvm-44c9
Vulnerability in the MICROS Relate CRM Software product of Oracle Retail Applications (component: Internal Operations). Supported versions that are affected are 7.1.0, 15.0.0, 16.0.0, 17.0.0, and 18.0.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise MICROS Relate CRM Software. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MICROS Relate CRM Software accessible data. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
[]
CVE-2024-47962
Stack-based Buffer Overflow vulnerability in Delta Electronics CNCSoft-G2
Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can manipulate an insider to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process.
[ "cpe:2.3:a:delta_electronics:cncsoft-g2:2.1.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:deltaww:cncsoft-g2:2.1.0.10:*:*:*:*:*:*:*" ]
GHSA-f4fx-9fx2-ww9h
Acrobat Reader versions 20.005.30574, 24.002.20736 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
CVE-2024-20478
Cisco Application Policy Infrastructure Controller App Privilege Escalation Vulnerability
A vulnerability in the software upgrade component of Cisco Application Policy Infrastructure Controller (APIC) and Cisco&nbsp;Cloud Network Controller, formerly Cisco Cloud APIC, could allow an authenticated, remote attacker with Administrator-level privileges to install a modified software image, leading to arbitrary code injection on an affected system. This vulnerability is due to insufficient signature validation of software images. An attacker could exploit this vulnerability by installing a modified software image. A successful exploit could allow the attacker to execute arbitrary code on the affected system and elevate their privileges to root. Note: Administrators should always validate the hash of any upgrade image before uploading it to Cisco APIC and Cisco Cloud Network Controller.
[ "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(8d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(1o\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(2h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(2i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(1k\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(1k\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.1\\(2m\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(1m\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(5e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2m\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(41d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(1o\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(1m\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(2j\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(4r\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(3j\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(3f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(2f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(4m\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(2k\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.1\\(1i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(1p\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.1\\(2p\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3s\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(3c\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(4e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1k\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(4f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.1\\(3h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(4d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(1n\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(1m\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(1r\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.1\\(2e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(2e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3j\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3n\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(1l\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(2e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(3r\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.0\\(2k\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.1\\(3g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(1h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(1o\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(3p\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(3e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(3s\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(2g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1l\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(9f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3l\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(2g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(3c\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(7k\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\\(2h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(9b\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\\(2k\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.1\\(2t\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(2h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3j\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.1\\(2k\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.3\\(1f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(3h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.0\\(1i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2u\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1l\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(3d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(4l\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.3\\(1i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.1\\(2q\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(4e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.1\\(1i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(2m\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.0\\(2h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(2q\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.3\\(1l\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\\(1h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.0\\(2n\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(5f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(1h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(1l\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2o\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(1i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\\(1j\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.1\\(1h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(2l\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(2h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(2g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.0\\(1k\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.1\\(2g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(1q\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(1j\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(1r\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(2f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(6i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\\(1g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\\(2j\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\\(2i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(2o\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(4q\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.3\\(1o\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(2j\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(1d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(2n\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(3t\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3n\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(4g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2x\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(5d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.1\\(2o\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(2i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.1\\(2f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\\(2f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3q\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1j\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(2f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.3\\(1e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(1s\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.1\\(2v\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2w\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(4i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.1\\(2u\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(4f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.0\\(2m\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(1k\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(2o\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3r\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(2i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(2c\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\\(1i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2s\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(7f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(3m\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3o\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.1\\(2s\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(2l\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1j\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.3\\(1p\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.1\\(4a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(1n\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(1n\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(4p\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.1\\(3j\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(9h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(1k\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4k\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(1l\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(2e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4o\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4p\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(2h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(5k\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(5l\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(5n\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(1h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(2e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(3e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(10e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6l\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(4c\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6o\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(1g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7l\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(10f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7q\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(3f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(3e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(3g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7r\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7s\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7t\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(5d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(10g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(5c\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(1g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7u\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(5e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(6e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(1j\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(6g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(7f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7v\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(7g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(2h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7w\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(6h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(2j\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(3d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(3e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(1d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(4c\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(5h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2b\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(3g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(5j\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2c\\):*:*:*:*:*:*:*" ]
CVE-2023-26817
codefever before 2023.2.7-commit-b1c2e7f was discovered to contain a remote code execution (RCE) vulnerability via the component /controllers/api/user.php.
[ "cpe:2.3:a:pgyer:codefever:*:*:*:*:*:*:*:*" ]
GHSA-crv5-fgrq-p364
The IKEv2 implementation in Cisco IOS, when AES-GCM or AES-GMAC is used, allows remote attackers to bypass certain IPsec anti-replay features via IPsec tunnel traffic, aka Bug ID CSCuj47795.
[]
GHSA-633w-9qcg-g8vx
An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. DMA attacks on the FvbServicesRuntimeDxe shared buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges. This attack can be mitigated using IOMMU protection for the ACPI runtime memory used for the command buffer. This attack can be mitigated by copying the firmware block services data to SMRAM before checking it.
[]
GHSA-63gm-r62c-qj2f
OTFCC v0.10.4 was discovered to contain a segmentation violation via /release-x64/otfccdump+0x6babea.
[]
GHSA-w5w3-73cq-jm68
Unauth. Reflected Cross-site Scripting (XSS) vulnerability in Magic Post Thumbnail plugin <= 4.1.10 versions.
[]
GHSA-68mx-grwp-c8mv
Cross-site scripting (XSS) vulnerability in the Diocese of Portsmouth Resources Database (pd_resources) extension 0.1.1 and earlier for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
GHSA-fgf6-p7j4-p25h
In notification management of the service manager, there is a possible permissions bypass. This could lead to local escalation of privilege by preventing user notification, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112434609
[]
GHSA-6mqv-9qvr-xhfq
From the VSPC management agent machine, under condition that the management agent is authorized on the server, it is possible to remove arbitrary files on the VSPC server machine.
[]
GHSA-v9pc-cxpw-3jr5
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
[]
GHSA-j6q6-97rg-2x8h
A vulnerability in the Open Systems Gateway initiative (OSGi) interface of Cisco Policy Suite before 18.1.0 could allow an unauthenticated, remote attacker to directly connect to the OSGi interface. The vulnerability is due to a lack of authentication. An attacker could exploit this vulnerability by directly connecting to the OSGi interface. An exploit could allow the attacker to access or change any files that are accessible by the OSGi process. Cisco Bug IDs: CSCvh18017.
[]
GHSA-rpmg-pqrf-89p5
An attacker could send an HTTP request to an Open5GS endpoint and retrieve the information stored on the device due to the lack of Authentication.
[]
CVE-2006-1483
Blazix Web Server before 1.2.6, when running on Windows, allows remote attackers to obtain the source code of JSP files via (1) . (dot), (2) space, and (3) slash characters in the extension of a URL.
[ "cpe:2.3:a:desiderata_software:blazix_web_server:*:*:windows:*:*:*:*:*" ]
CVE-2019-5805
Use-after-free in PDFium in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:backports:sle-15:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*" ]
GHSA-vh5f-hgf9-rcwq
Unspecified vulnerability in the Java SE and JavaFX components in Oracle Java SE 7u40 and earlier and JavaFX 2.2.40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2013-5777.
[]
CVE-2020-11914
The Treck TCP/IP stack before 6.0.1.66 has an ARP Out-of-bounds Read.
[ "cpe:2.3:a:treck:tcp\\/ip:*:*:*:*:*:*:*:*" ]
CVE-2020-15609
This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_dashboard.php. When parsing the service_stop parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9726.
[ "cpe:2.3:a:centos-webpanel:centos_web_panel:17.0.9.8.923:*:*:*:*:*:*:*" ]
GHSA-m55q-7qj6-v5m6
Cross-Site Request Forgery (CSRF) vulnerability in GalleryPlugins Video Contest WordPress plugin <= 3.2 versions.
[]
CVE-2022-22593
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Security Update 2022-001 Catalina, macOS Monterey 12.2, macOS Big Sur 11.6.3. A malicious application may be able to execute arbitrary code with kernel privileges.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
GHSA-gfqr-2cch-p32h
Improper privilege assignment vulnerability in the installer McAfee Application and Change Control (MACC) prior to 8.3.2 allows local administrators to change or update the configuration settings via a carefully constructed MSI configured to mimic the genuine installer. This version adds further controls for installation/uninstallation of software.
[]
CVE-2005-3048
Directory traversal vulnerability in index.php in PhpMyFaq 1.5.1 allows remote attackers to read arbitrary files or include arbitrary PHP files via a .. (dot dot) in the LANGCODE parameter, which also allows direct code injection via the User Agent field in a request packet, which can be activated by using LANGCODE to reference the user tracking data file.
[ "cpe:2.3:a:phpmyfaq:phpmyfaq:1.5.1:*:*:*:*:*:*:*" ]