id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
GHSA-mm3r-85wp-99j8
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-867, DIR-878, and DIR-882 routers with firmware 1.20B10_BETA. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP requests. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the router. Was ZDI-CAN-10835.
[]
null
8.8
null
null
null
GHSA-fcm9-4278-c4rv
TP-Link TL-WR840N devices allow remote attackers to cause a denial of service (networking outage) via fragmented packets, as demonstrated by an "nmap -f" command.
[]
null
null
7.5
null
null
CVE-2018-6123
A use after free in Blink in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
null
CVE-2008-1080
Opera before 9.26 allows user-assisted remote attackers to read arbitrary files by tricking a user into typing the characters of the target filename into a file input.
[ "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:1.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:2.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:2.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:2.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:2.10:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:2.10:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:2.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:3.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:3.00:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:3.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:3.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:3.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:3.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:3.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:3.61:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:3.62:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:3.62:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:4.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:4.00:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:4.00:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:4.00:beta4:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:4.00:beta5:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:4.00:beta6:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:4.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:4.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
GHSA-552j-r9hx-pgwr
The login method in LoginModule implementations in Apache Geronimo 2.0 does not throw FailedLoginException for failed logins, which allows remote attackers to bypass authentication requirements, deploy arbitrary modules, and gain administrative access by sending a blank username and password with the command line deployer in the deployment module.
[]
null
null
null
null
null
CVE-2018-0453
Cisco Firepower Management Center and Firepower System Software Sourcefire Tunnel Control Channel Command Execution Vulnerability
A vulnerability in the Sourcefire tunnel control channel protocol in Cisco Firepower System Software running on Cisco Firepower Threat Defense (FTD) sensors could allow an authenticated, local attacker to execute specific CLI commands with root privileges on the Cisco Firepower Management Center (FMC), or through Cisco FMC on other Firepower sensors and devices that are controlled by the same Cisco FMC. To send the commands, the attacker must have root privileges for at least one affected sensor or the Cisco FMC. The vulnerability exists because the affected software performs insufficient checks for certain CLI commands, if the commands are executed via a Sourcefire tunnel connection. An attacker could exploit this vulnerability by authenticating with root privileges to a Firepower sensor or Cisco FMC, and then sending specific CLI commands to the Cisco FMC or through the Cisco FMC to another Firepower sensor via the Sourcefire tunnel connection. A successful exploit could allow the attacker to modify device configurations or delete files on the device that is running Cisco FMC Software or on any Firepower device that is managed by Cisco FMC.
[ "cpe:2.3:a:cisco:firepower_threat_defense:5.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_threat_defense:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_threat_defense:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_threat_defense:6.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_threat_defense:6.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_threat_defense:6.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_threat_defense:6.2.2:*:*:*:*:*:*:*" ]
null
null
8.2
7.2
null
GHSA-3768-p22h-mhp7
An exploitable integer overflow vulnerability exists in the flattenIncrementally function in the xcf2png and xcf2pnm binaries of xcftools 1.0.7. An integer overflow can occur while calculating the row's allocation size, that could be exploited to corrupt memory and eventually execute arbitrary code. In order to trigger this vulnerability, a victim would need to open a specially crafted XCF file.
[]
null
8.8
null
null
null
CVE-2006-2099
Directory traversal vulnerability in UltraISO 8.0.0.1392 allows remote attackers to write arbitrary files via a .. (dot dot) in a filename in an ISO image.
[ "cpe:2.3:a:ezb_systems:ultraiso:8.0.0.1392:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-wmqx-7q2f-fcf6
Buffer Over-read at parse_rawml.c:1416 in GitHub repository bfabiszewski/libmobi prior to 0.11. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.
[]
null
7.1
null
null
null
GHSA-23c8-xvwp-63gj
WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.
[]
null
null
null
null
null
CVE-2021-35638
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*" ]
null
4.9
null
null
null
CVE-2021-3808
Potential security vulnerabilities have been identified in the BIOS (UEFI Firmware) for certain HP PC products, which might allow arbitrary code execution. HP is releasing firmware updates to mitigate these potential vulnerabilities.
[ "cpe:2.3:o:hp:elite_dragonfly_firmware:01.12.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_dragonfly:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_x2_1012_g2_firmware:1.41:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x2_1012_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_x2_1013_g3_firmware:01.19.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x2_1013_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_x2_g4_firmware:01.12.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x2_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_1040_g4_firmware:1.41:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_1040_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_1050_g1_firmware:01.19.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_1050_g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_725_g4_firmware:1.4:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_725_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_735_g5_firmware:01.20.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_735_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_735_g6_firmware:01.19.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_735_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_745_g4_firmware:1.4:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_745_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_745_g5_firmware:01.20.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_745_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_745_g6_firmware:01.19.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_745_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_755_g4_firmware:1.4:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_755_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_755_g5_firmware:01.20.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_755_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_820_g4_firmware:1.41:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_820_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_828_g4_firmware:1.41:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_828_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_830_g5_firmware:01.19.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_830_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_830_g6_firmware:01.12.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_830_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_836_g5_firmware:01.19.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_836_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_836_g6_firmware:01.12.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_836_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_g4_firmware:1.41:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_g5_firmware:01.19.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_g6_firmware:01.12.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840r_g4_firmware:01.19.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840r_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_846_g5_firmware:01.19.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_846_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_848_g4_firmware:1.41:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_848_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_850_g4_firmware:1.41:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_850_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_850_g5_firmware:01.19.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_850_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_850_g6_firmware:01.12.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_850_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1020_g2_firmware:1.41:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1020_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1030_g2_firmware:1.41:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1030_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1030_g3_firmware:01.19.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1030_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1030_g4_firmware:01.12.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1030_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1040_g5_firmware:01.19.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1040_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1040_g6_firmware:01.12.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1040_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_830_g5_firmware:01.19.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_830_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_830_g6_firmware:01.12.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_830_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:pro_x2_612_g2_firmware:1.41:*:*:*:*:*:*:*", "cpe:2.3:h:hp:pro_x2_612_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_11_ee_g2_firmware:1.55:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_11_ee_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_430_g4_firmware:1.41:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_430_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_430_g5_firmware:01.20.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_430_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_430_g6_firmware:01.19.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_430_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_440_g4_firmware:1.41:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_440_g5_firmware:01.20.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_440_g6_firmware:01.19.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_445_g6_firmware:01.19.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_445_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_445r_g6_firmware:01.19.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_445r_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_450_g4_firmware:1.41:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_450_g5_firmware:01.20.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_450_g6_firmware:01.19.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_455_g4_firmware:1.4:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_455_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_455_g5_firmware:01.20.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_455_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_455_g6_firmware:01.19.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_455_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_455r_g6_firmware:01.19.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_455r_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_470_g4_firmware:1.41:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_470_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_470_g5_firmware:01.20.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_470_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_640_g3_firmware:1.41:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_640_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_640_g4_firmware:01.20.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_640_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_640_g5_firmware:01.12.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_640_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_645_g3_firmware:1.4:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_645_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_645_g4_firmware:01.20.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_645_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_650_g3_firmware:1.41:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_650_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_650_g4_firmware:01.20.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_650_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_650_g5_firmware:01.12.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_650_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_655_g3_firmware:1.4:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_655_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_11_g2_ee_firmware:1.43:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_11_g2_ee:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_11_g3_ee_firmware:01.17.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_11_g3_ee:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_11_g4_ee_firmware:01.13.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_11_g4_ee:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_440_g1_firmware:01.19.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_440_g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_14u_g4_firmware:1.41:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_14u_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_14u_g5_firmware:01.19.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_14u_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_14u_g6_firmware:01.12.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_14u_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_15_g4_firmware:1.41:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_15_g5_firmware:01.19.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_15_g6_firmware:01.12.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_15u_g4_firmware:1.41:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15u_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_15u_g5_firmware:01.19.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15u_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_15u_g6_firmware:01.12.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15u_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_17_g4_firmware:1.41:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_17_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_17_g5_firmware:01.19.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_17_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_17_g6_firmware:01.12.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_17_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_studio_g4_firmware:1.41:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_studio_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_studio_g5_firmware:01.19.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_studio_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_studio_x360_g5_firmware:01.19.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_studio_x360_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_x2_g4_firmware:1.41:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_x2_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_13_g2_firmware:01.19.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_13_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_14_g2_firmware:01.19.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_14_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_15_g2_firmware:01.19.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_15_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_g1_firmware:01.20.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_x_13_g2_firmware:01.12.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_x_13_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp_z1_all-in-one_g3_firmware:1.31:*:*:*:*:*:*:*", "cpe:2.3:h:hp:hp_z1_all-in-one_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp_z1_entry_tower_g5_firmware:02.11.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:hp_z1_entry_tower_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp_z2_mini_g3_firmware:1.83:*:*:*:*:*:*:*", "cpe:2.3:h:hp:hp_z2_mini_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp_z2_mini_g4_firmware:01.08.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:hp_z2_mini_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp_z2_mini_g5_firmware:01.04.02:*:*:*:*:*:*:*", "cpe:2.3:h:hp:hp_z2_mini_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp_z2_small_form_factor_g4_firmware:01.08.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:hp_z2_small_form_factor_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp_z2_small_form_factor_g5_firmware:01.04.02:*:*:*:*:*:*:*", "cpe:2.3:h:hp:hp_z2_small_form_factor_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp_z2_tower_g4_firmware:01.08.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:hp_z2_tower_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp_z2_tower_g5_firmware:01.04.02:*:*:*:*:*:*:*", "cpe:2.3:h:hp:hp_z2_tower_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp_z238_microtower_firmware:1.83:*:*:*:*:*:*:*", "cpe:2.3:h:hp:hp_z238_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp_z240_small_form_factor_firmware:1.83:*:*:*:*:*:*:*", "cpe:2.3:h:hp:hp_z240_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp_z240_tower_firmware:1.83:*:*:*:*:*:*:*", "cpe:2.3:h:hp:hp_z240_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp_mt21_mobile_thin_client_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:hp_mt21_mobile_thin_client:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp_mt31_mobile_thin_client_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:hp_mt31_mobile_thin_client:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp_mt44_mobile_thin_client_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:hp_mt44_mobile_thin_client:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp_mt45_mobile_thin_client_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:hp_mt45_mobile_thin_client:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_slice_firmware:2.55:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_slice:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_slice_g2_firmware:2.55:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_slice_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_705_g3_desktop_mini_pc_firmware:2.38:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_705_g3_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_705_g3_microtower_pc_firmware:2.38:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_705_g3_microtower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_705_g3_small_form_factor_pc_firmware:2.38:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_705_g3_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_705_g4_desktop_mini_pc_firmware:02.17.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_705_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_705_g4_microtower_pc_firmware:02.17.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_705_g4_microtower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_705_g4_small_form_factor_pc_firmware:02.12.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_705_g4_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_705_g4_workstation_firmware:02.17.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_705_g4_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_705_g5_desktop_mini_pc_firmware:02.11.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_705_g5_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_705_g5_small_form_factor_pc_firmware:02.11.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_705_g5_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_35w_g3_desktop_mini_pc_firmware:2.4:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_35w_g3_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_35w_g4_desktop_mini_pc_firmware:02.18.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_35w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_65w_g3_desktop_mini_pc_firmware:2.4:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_65w_g3_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_65w_g4_desktop_mini_pc_firmware:02.18.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_65w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_95w_g4_desktop_mini_pc_firmware:02.18.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_95w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g3_small_form_factor_pc_firmware:2.4:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g3_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g3_tower_pc_firmware:2.4:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g3_tower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g4_small_form_factor_pc_firmware:02.17.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g4_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g4_tower_pc_firmware:02.17.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g4_tower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g4_workstation_firmware:02.17.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g4_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g5_desktop_mini_pc_firmware:02.11.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g5_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g5_small_form_factor_pc_firmware:02.11.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g5_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g5_tower_pc_firmware:02.11.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g5_tower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_880_g3_tower_pc_firmware:2.4:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_880_g3_tower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_880_g4_tower_pc_firmware:02.17.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_880_g4_tower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_880_g5_tower_pc_firmware:02.11.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_880_g5_tower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_1000_g1_23.8-in_all-in-one_business_pc_firmware:2.4:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_1000_g1_23.8-in_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_1000_g2_23.8-in_all-in-one_business_pc_firmware:02.18.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_1000_g2_23.8-in_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g3_23.8_non-touch_all-in-one_business_pc_firmware:2.4:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g3_23.8_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g4_23.8-in_all-in-one_business_pc_firmware:02.18.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g4_23.8-in_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g5_23.8-in_all-in-one_firmware:2.11.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g5_23.8-in_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g3_desktop_mini_pc_firmware:2.4:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g3_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g4_desktop_mini_pc_firmware:02.18.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g4_microtower_pc_firmware:2.4:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g4_microtower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g4_small_form_factor_pc_firmware:2.4:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g4_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g5_desktop_mini_pc_firmware:02.11.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g5_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g5_microtower_pc_firmware:02.17.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g5_microtower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g5_small_form_factor_pc_firmware:2.17:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g5_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g6_microtower_pc_firmware:02.11.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g6_microtower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g6_small_form_factor_pc_firmware:02.11.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g6_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_405_g4_desktop_mini_pc_firmware:02.17.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_405_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_405_g4_small_form_factor_pc_firmware:02.12.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_405_g4_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_480_g4_microtower_pc_firmware:2.4:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_480_g4_microtower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_480_g5_microtower_pc_firmware:02.17.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_480_g5_microtower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_480_g6_microtower_pc_firmware:02.11.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_480_g6_microtower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g3_desktop_mini_pc_firmware:2.4:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g3_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g3_microtower_pc_firmware:2.4:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g3_microtower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g3_small_form_factor_pc_firmware:2.4:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g3_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g4_desktop_mini_pc_firmware:02.18.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g4_microtower_pc_firmware:02.17.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g4_microtower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g4_small_form_factor_pc_firmware:02.18.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g4_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g5_desktop_mini_pc_firmware:02.11.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g5_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g5_microtower_pc_firmware:02.11.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g5_microtower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g5_small_form_factor_pc_firmware:02.11.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g5_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_680_g3_microtower_pc_firmware:2.4:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_680_g3_microtower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_680_g4_microtower_pc_firmware:02.17.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_680_g4_microtower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g3_20-inch_non-touch_all-in-one_pc_firmware:2.4:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g3_20-inch_non-touch_all-in-one_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g3_20-inch_touch_all-in-one_pc_firmware:2.4:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g3_20-inch_touch_all-in-one_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g4_20-inch_non-touch_all-in-one_business_pc_firmware:02.17.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g4_20-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g4_23.8-inch_non-touch_all-in-one_business_pc_firmware:02.17.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g4_23.8-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g5_20-inch_all-in-one_business_pc_firmware:02.11.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g5_20-inch_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g5_23.8-inch_all-in-one_business_pc_firmware:02.11.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g5_23.8-inch_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_440_g4_23.8-inch_non-touch_all-in-one_business_pc_firmware:02.17.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_440_g4_23.8-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_440_g5_23.8-in_all-in-one_business_pc_firmware:02.11.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_440_g5_23.8-in_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_480_g3_20-inch_non-touch_all-in_one_pc_firmware:2.4:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_480_g3_20-inch_non-touch_all-in_one_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_600_g3_21.5-inch_non-touch_all-in-one_pc_firmware:2.4:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_600_g3_21.5-inch_non-touch_all-in-one_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_600_g4_21.5-inch_touch_all-in-one_business_pc_firmware:02.17.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_600_g4_21.5-inch_touch_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_600_g5_21.5-in_all-in-one_business_pc_firmware:02.11.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_600_g5_21.5-in_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:engage_flex_pro_retail_system_firmware:02.17.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:engage_flex_pro_retail_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:engage_flex_pro-c_retail_system_firmware:02.17.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:engage_flex_pro-c_retail_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:engage_go_10_mobile_system_firmware:01.08.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:engage_go_10_mobile_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:engage_go_mobile_system_firmware:01.19.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:engage_go_mobile_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:engage_one_aio_system_firmware:02.40.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:engage_one_aio_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:mp9_g4_retail_system_firmware:02.17.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:mp9_g4_retail_system:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
CVE-2002-0059
The decompression algorithm in zlib 1.1.3 and earlier, as used in many different utilities and packages, causes inflateEnd to release certain memory more than once (a "double free"), which may allow local and remote attackers to execute arbitrary code via a block of malformed compression data.
[ "cpe:2.3:a:zlib:zlib:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
CVE-2008-2645
Multiple PHP remote file inclusion vulnerabilities in Brim (formerly Booby) 1.0.1 allow remote attackers to execute arbitrary PHP code via a URL in the renderer parameter to template.tpl.php in (1) barrel/, (2) barry/, (3) mylook/, (4) oerdec/, (5) penguin/, (6) sidebar/, (7) slashdot/, and (8) text-only/ in templates/. NOTE: this can also be leveraged to include and execute arbitrary local files via directory traversal sequences.
[ "cpe:2.3:a:brim-project:brim:1.0.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-rgx2-hj64-5vc5
Buffer overflow in the UGameEngine::UpdateConnectingMessage function in the Unreal engine 1, 2, and 2.5, as used in multiple games including Unreal Tournament 2004, Unreal tournament 2003, Postal 2, Raven Shield, and SWAT4, when downloads are enabled, allows remote attackers to execute arbitrary code via a long LEVEL field in a WELCOME response to a download request.
[]
null
null
null
null
null
CVE-2005-3533
Buffer overflow in OSH before 1.7-15 allows local users to execute arbitrary code via a long current working directory and filename.
[ "cpe:2.3:a:osh:osh:*:*:*:*:*:*:*:*" ]
null
null
null
7.2
null
CVE-2015-4994
Buffer overflow in IBM Domino 8.5.1 through 8.5.3 before 8.5.3 FP6 IF10 and 9.x before 9.0.1 FP4 IF3 allows remote attackers to execute arbitrary code or cause a denial of service (SMTP daemon crash) via a crafted GIF image, aka SPRs KLYH9ZDKRE and KLYH9ZTLEZ, a different vulnerability than CVE-2015-5040.
[ "cpe:2.3:a:ibm:domino:8.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2017-12864
In opencv/modules/imgcodecs/src/grfmt_pxm.cpp, function ReadNumber did not checkout the input length, which lead to integer overflow. If the image is from remote, may lead to remote code execution or denial of service. This affects Opencv 3.3 and earlier.
[ "cpe:2.3:a:opencv:opencv:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
null
CVE-2017-15201
In Kanboard before 1.0.47, by altering form data, an authenticated user can edit tags of a private project of another user.
[ "cpe:2.3:a:kanboard:kanboard:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.22:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.23:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.24:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.25:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.26:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.27:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.28:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.29:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.30:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.31:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.31:beta0:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.31:beta1:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.32:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.32:beta0:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.32:beta1:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.33:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.34:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.35:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.36:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.37:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.38:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.39:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.40:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.41:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.42:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.43:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.44:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.45:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.46:*:*:*:*:*:*:*" ]
null
null
4.3
4
null
GHSA-hg82-r34f-j85v
Cross-site scripting (XSS) vulnerability in Edgewall Software Trac 0.9.4 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors related to a "wiki macro."
[]
null
null
null
null
null
GHSA-fh4p-65g7-4cxw
Cross-site request forgery (CSRF) vulnerability in gpEasy CMS 1.6.2, 1.6.1, and earlier allows remote attackers to hijack the authentication of administrators for requests that create new administrative users via an Admin_Users action to index.php. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
null
GHSA-w65v-2jvx-6697
Wade Graphic Design FANTSY has a vulnerability of insufficient authorization check. An unauthenticated remote user can exploit this vulnerability by modifying URL parameters to gain administrator privileges to perform arbitrary system operation or disrupt service.
[]
null
9.8
null
null
null
GHSA-wrm3-h327-j8wh
An issue has been discovered in GitLab EE affecting all versions starting from 11.6 before 16.3.6, all versions starting from 16.4 before 16.4.2, all versions starting from 16.5 before 16.5.1. It was possible for an unauthorised project or group member to read the CI/CD variables using the custom project templates.
[]
null
6.5
null
null
null
GHSA-xj3c-66q4-9h7r
IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 159647.
[]
null
5.4
null
null
null
CVE-2019-19029
Cloud Native Computing Foundation Harbor prior to 1.8.6 and 1.9.3 allows SQL Injection via user-groups in the VMware Harbor Container Registry for the Pivotal Platform.
[ "cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal:vmware_harbor_registry:-:*:*:*:*:*:*:*" ]
null
7.2
null
6.5
null
GHSA-mv53-r5xv-29p2
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
null
5.4
null
null
null
GHSA-jg9g-2m55-m7hp
An issue was discovered on ROADCAM X3 devices. It has a uniform default credential set that cannot be modified by users, making it easy for attackers to gain unauthorized access to multiple devices.
[]
null
9.8
null
null
null
GHSA-6v8f-m2cr-8qwp
Unspecified vulnerability in HP Business Process Monitor 9.13.1 patch 1 and 9.22 patch 1 allows remote attackers to execute arbitrary code and obtain sensitive information via unknown vectors.
[]
null
null
null
null
null
CVE-2025-0431
Enterprise Protection Backslash URL Rewrite Bypass
Enterprise Protection contains a vulnerability in URL rewriting that allows an unauthenticated remote attacker to send an email which bypasses URL protections impacting the integrity of recipient's email. This occurs due to improper filtering of backslashes within URLs and affects all versions of 8.21, 8.20 and 8.18 prior to 8.21.0 patch 5115, 8.20.6 patch 5114 and 8.18.6 patch 5113 respectively.
[]
null
5.8
null
null
null
CVE-2001-1023
Xcache 2.1 allows remote attackers to determine the absolute path of web server documents by requesting a URL that is not cached by Xcache, which returns the full pathname in the Content-PageName header.
[ "cpe:2.3:a:xcache_technologies:xcache:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:xcache_technologies:xcache:2.1:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-75mg-7wpw-49q3
The GeoDirectory Business Directory WordPress plugin before 2.1.1.3 was vulnerable to Authenticated Stored Cross-Site Scripting (XSS).
[]
null
null
null
null
null
CVE-2007-0342
WebCore in Apple WebKit build 18794 allows remote attackers to cause a denial of service (null dereference and application crash) via a TD element with a large number in the ROWSPAN attribute, as demonstrated by a crash of OmniWeb 5.5.3 on Mac OS X 10.4.8, a different vulnerability than CVE-2006-2019.
[ "cpe:2.3:a:apple:safari:2.0.4_419.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:webkit:build_18794:*:*:*:*:*:*:*", "cpe:2.3:a:omnigroup:omniweb:5.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*" ]
null
7.5
null
4.3
null
CVE-2021-32471
Insufficient input validation in the Marvin Minsky 1967 implementation of the Universal Turing Machine allows program users to execute arbitrary code via crafted data. For example, a tape head may have an unexpected location after the processing of input composed of As and Bs (instead of 0s and 1s). NOTE: the discoverer states "this vulnerability has no real-world implications."
[ "cpe:2.3:a:mit:universal_turing_machine:-:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
null
CVE-2019-8769
An issue existed in the drawing of web page elements. The issue was addressed with improved logic. This issue is fixed in iOS 13.1 and iPadOS 13.1, macOS Catalina 10.15. Visiting a maliciously crafted website may reveal browsing history.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
4.3
null
4.3
null
CVE-2024-10422
SourceCodester Attendance and Payroll System overtime_add.php sql injection
A vulnerability, which was classified as critical, has been found in SourceCodester Attendance and Payroll System 1.0. This issue affects some unknown processing of the file /admin/overtime_add.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:nurhodelta17:attendance_and_payroll_system:1.0:*:*:*:*:*:*:*" ]
5.3
6.3
6.3
6.5
null
CVE-2018-5276
In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e018. NOTE: the vendor reported that they "have not been able to reproduce the issue on any Windows operating system version (32-bit or 64-bit).
[ "cpe:2.3:a:malwarebytes:malwarebytes:3.3.1.2183:*:*:*:premium:*:*:*" ]
null
null
7.8
6.1
null
GHSA-rchx-q8j2-p9fp
The License Logging Server (llssrv.exe) in Microsoft Windows 2000 SP4 allows remote attackers to execute arbitrary code via an RPC message containing a string without a null terminator, which triggers a heap-based buffer overflow in the LlsrLicenseRequestW method, aka "License Logging Server Heap Overflow Vulnerability."
[]
null
null
null
null
null
GHSA-3r6p-fq38-2gpr
Softaculous Webuzo contains an authentication bypass vulnerability through the password reset functionality. Remote, anonymous attackers can exploit this vulnerability to gain full server access as the root user.
[]
null
9.8
null
null
null
GHSA-5fgq-c32c-5mcc
Cross-site scripting vulnerability in demonstration scripts for vqServer allows remote attackers to execute arbitrary script via a link that contains the script in arguments to demo scripts such as respond.pl.
[]
null
null
null
null
null
CVE-2022-0335
A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. The "delete badge alignment" functionality did not include the necessary token check to prevent a CSRF risk.
[ "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
null
GHSA-3fj3-2v72-xm29
The ASUS Vivobaby application before 1.1.09 for Android has Missing SSL Certificate Validation.
[]
null
null
9.1
null
null
GHSA-vg83-7v95-762v
Ulearn version a5a7ca20de859051ea0470542844980a66dfc05d allows an attacker with administrator permissions to obtain remote code execution on the server through the image upload functionality. This occurs because the application does not validate that the uploaded image is actually an image.
[]
null
7.2
null
null
null
CVE-2024-37626
A command injection issue in TOTOLINK A6000R V1.0.1-B20201211.2000 firmware allows a remote attacker to execute arbitrary code via the iface parameter in the vif_enable function.
[ "cpe:2.3:o:totolink:a6000r_firmware:1.0.1-b20201211.2000:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2014-9360
XML external entity (XXE) vulnerability in Scalix Web Access 11.4.6.12377 and 12.2.0.14697 allows remote attackers to read arbitrary files and trigger requests to intranet servers via a crafted request.
[ "cpe:2.3:a:scalix:web_access:11.4.6.12377:*:*:*:*:*:*:*", "cpe:2.3:a:scalix:web_access:12.2.0.14697:*:*:*:*:*:*:*" ]
null
null
null
6.4
null
GHSA-w5j7-j9wm-9x8q
Cross-site scripting (XSS) vulnerability in edit-post.php in the Flexible Custom Post Type plugin before 0.1.7 for WordPress allows remote attackers to inject arbitrary web script or HTML via the id parameter.
[]
null
null
null
null
null
RHSA-2018:1457
Red Hat Security Advisory: dhcp security update
dhcp: Command injection vulnerability in the DHCP client NetworkManager integration script
[ "cpe:/o:redhat:rhel_aus:7.2::server", "cpe:/o:redhat:rhel_e4s:7.2::server", "cpe:/o:redhat:rhel_tus:7.2::server" ]
null
null
7.5
null
null
CVE-2018-2384
Under certain conditions a malicious user provoking a Null Pointer dereference can prevent legitimate users from accessing the SAP Internet Graphics Server, 7.20, 7.20EXT, 7.45, 7.49, 7.53, and its services.
[ "cpe:2.3:a:sap:internet_graphics_server:7.20:*:*:*:*:*:*:*", "cpe:2.3:a:sap:internet_graphics_server:7.20ext:*:*:*:*:*:*:*", "cpe:2.3:a:sap:internet_graphics_server:7.45:*:*:*:*:*:*:*", "cpe:2.3:a:sap:internet_graphics_server:7.49:*:*:*:*:*:*:*", "cpe:2.3:a:sap:internet_graphics_server:7.53:*:*:*:*:*:*:*" ]
null
null
6.5
4
null
CVE-2022-44198
Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow via parameter openvpn_push1.
[ "cpe:2.3:o:netgear:r7000p_firmware:1.3.1.64:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2018-19340
Guriddo Form PHP 5.3 has XSS via the demos/jqform/defaultnodb/default.php OrderID, ShipName, ShipAddress, ShipCity, ShipPostalCode, ShipCountry, Freight, or details parameter.
[ "cpe:2.3:a:guriddo:form_php:5.3:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
GHSA-x3j8-8pm3-5gwm
Buffer overflow in McSubMgr ActiveX control (mcsubmgr.dll) in McAfee Security Center 6.0.23 for Internet Security Suite 2006, Wireless Home Network Security, Personal Firewall Plus, VirusScan, Privacy Service, SpamKiller, AntiSpyware, and QuickClean allows remote user-assisted attackers to execute arbitrary commands via long string parameters, which are later used in vsprintf.
[]
null
null
null
null
null
CVE-2005-3399
Multiple interpretation error in CAT-QuickHeal 8.0 allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug."
[ "cpe:2.3:a:cat:quick_heal:8.0:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2007-0860
Multiple PHP remote file inclusion vulnerabilities in local Calendar System 1.1 allow remote attackers to execute arbitrary PHP code via a URL in the (1) TEMPLATE_DIR parameter to (a) showinvoices.php, (b) showmonth.php, (c) showevents.php, (d) retrieveinvoice.php, (e) modifyitem.php, and (f) lookup_userid.php; or the LIBDIR parameter to (g) editevent.php, (h) resetpassword.php, (i) signup.php, showmonth.php, (j) showday.php, showevents.php, and lookup_userid.php. NOTE: this issue has been disputed by a third party, who states that the associated variables are set in config.php before use
[ "cpe:2.3:a:laboratory_for_optical_and_computational_instrumentation:local_calendar_system:1.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-g4rc-px2p-4hv3
Off-by-one overflow in the CVS PreservePermissions of rcs.c for CVSD before 1.11.2 allows local users to execute arbitrary code.
[]
null
null
null
null
null
GHSA-h24c-pmg9-qp24
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Sandor Kovacs Simple Sticky Footer allows Stored XSS. This issue affects Simple Sticky Footer : from n/a through 1.3.5.
[]
null
5.9
null
null
null
CVE-2022-4216
The Chained Quiz plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'facebook_appid' parameter in versions up to, and including, 1.3.2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrative privileges to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[ "cpe:2.3:a:kibokolabs:chained_quiz:*:*:*:*:*:wordpress:*:*" ]
null
5.5
null
null
null
CVE-2020-4567
IBM Tivoli Key Lifecycle Manager 3.0.1 and 4.0 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials. IBM X-Force ID: 184156.
[ "cpe:2.3:a:ibm:security_key_lifecycle_manager:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_key_lifecycle_manager:4.0:*:*:*:*:*:*:*" ]
null
null
8.6
null
null
GHSA-g64r-v5c7-qvh2
ZXMP M721 has an information leak vulnerability. Since the serial port authentication on the ZBOOT interface is not effective although it is enabled, an attacker could use this vulnerability to log in to the device to obtain sensitive information.
[]
null
7.5
null
null
null
CVE-2007-2409
Cross-domain vulnerability in WebCore on Apple Mac OS X 10.3.9 and 10.4.10 allows remote attackers to obtain sensitive information via a popup window, which is able to read the current URL of the parent window.
[ "cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:apple:webcore:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-w8jq-x49j-99g5
The BackWPup plugin for WordPress is vulnerable to Directory Traversal in versions up to, and including, 4.0.1 via the job-specific backup folder. This allows authenticated attackers to store backups in arbitrary folders on the server provided they can be written to by the server. Additionally, default settings will place an index.php and a .htaccess file into the chosen directory (unless already present) when the first backup job is run that are intended to prevent directory listing and file access. This means that an attacker could set the backup directory to the root of another site in a shared environment and thus disable that site.
[]
null
6.8
null
null
null
CVE-2015-3886
libinfinity before 0.6.6-1 does not validate expired SSL certificates, which allows remote attackers to have unspecified impact via unknown vectors.
[ "cpe:2.3:a:libinfinity_project:libinfinity:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
CVE-2020-14931
A stack-based buffer overflow in DMitry (Deepmagic Information Gathering Tool) 1.3a might allow remote WHOIS servers to execute arbitrary code via a long line in a response that is mishandled by nic_format_buff.
[ "cpe:2.3:a:dmitry_project:dmitry:1.3a:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
CVE-2025-49658
Windows Transport Driver Interface (TDI) Translation Driver Information Disclosure Vulnerability
Out-of-bounds read in Windows TDX.sys allows an authorized attacker to disclose information locally.
[]
null
5.5
null
null
null
cisco-sa-20190220-firpwr-dos
Cisco Firepower 9000 Series Firepower 2-Port 100G Double-Width Network Module Queue Wedge Denial of Service Vulnerability
A vulnerability in field-programmable gate array (FPGA) ingress buffer management for the Cisco Firepower 9000 Series with the Cisco Firepower 2-port 100G double-width network module (PID: FPR9K-DNM-2X100G) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. Manual intervention may be required before a device will resume normal operations. The vulnerability is due to a logic error in the FPGA related to the processing of different types of input packets. An attacker could exploit this vulnerability by being on the adjacent subnet and sending a crafted sequence of input packets to a specific interface on an affected device. A successful exploit could allow the attacker to cause a queue wedge condition on the interface. When a wedge occurs, the affected device will stop processing any additional packets that are received on the wedged interface. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-firpwr-dos ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-firpwr-dos"]
[]
null
null
6.1
null
null
GHSA-5xqv-jx9j-wg8h
A vulnerability was found in PHPGurukul Art Gallery Management System 1.1. It has been classified as critical. Affected is an unknown function of the file /admin/edit-art-medium-detail.php. The manipulation of the argument editid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
2.1
6.3
null
null
null
CVE-2022-34819
A vulnerability has been identified in SIMATIC CP 1242-7 V2 (All versions < V3.3.46), SIMATIC CP 1243-1 (All versions < V3.3.46), SIMATIC CP 1243-7 LTE EU (All versions < V3.3.46), SIMATIC CP 1243-7 LTE US (All versions < V3.3.46), SIMATIC CP 1243-8 IRC (All versions < V3.3.46), SIMATIC CP 1542SP-1 IRC (All versions >= V2.0 < V2.2.28), SIMATIC CP 1543-1 (All versions < V3.0.22), SIMATIC CP 1543SP-1 (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1543SP-1 ISEC (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (All versions >= V2.0 < V2.2.28), SIPLUS NET CP 1242-7 V2 (All versions < V3.3.46), SIPLUS NET CP 1543-1 (All versions < V3.0.22), SIPLUS S7-1200 CP 1243-1 (All versions < V3.3.46), SIPLUS S7-1200 CP 1243-1 RAIL (All versions < V3.3.46). The application lacks proper validation of user-supplied data when parsing specific messages. This could result in a heap-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of device.
[ "cpe:2.3:o:siemens:simatic_cp_1242-7_v2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cp_1242-7_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_cp_1243-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cp_1243-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_cp_1243-7_lte_eu_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cp_1243-7_lte_eu:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_cp_1243-7_lte_us_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cp_1243-7_lte_us:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_cp_1243-8_irc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cp_1243-8_irc:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_cp_1542sp-1_irc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cp_1542sp-1_irc:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_cp_1543-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cp_1543-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_cp_1543sp-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cp_1543sp-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:siplus_et_200sp_cp_1542sp-1_irc_tx_rail_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:siplus_et_200sp_cp_1542sp-1_irc_tx_rail:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:siplus_et_200sp_cp_1543sp-1_isec_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:siplus_et_200sp_cp_1543sp-1_isec:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:siplus_et_200sp_cp_1543sp-1_isec_tx_rail_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:siplus_et_200sp_cp_1543sp-1_isec_tx_rail:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:siplus_net_cp_1242-7_v2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:siplus_net_cp_1242-7_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:siplus_net_cp_1543-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:siplus_net_cp_1543-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:siplus_s7-1200_cp_1243-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:siplus_s7-1200_cp_1243-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:siplus_s7-1200_cp_1243-1_rail_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:siplus_s7-1200_cp_1243-1_rail:-:*:*:*:*:*:*:*" ]
null
10
null
null
null
GHSA-r9wr-68hr-qxpc
Multiple buffer overflow vulnerabilities exist in the qos.cgi qos_settings() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A buffer overflow vulnerability exists in the `sel_mode` POST parameter.
[]
null
9.1
null
null
null
CVE-2023-50069
WireMock with GUI versions 3.2.0.0 through 3.0.4.0 are vulnerable to stored cross-site scripting (SXSS) through the recording feature. An attacker can host a malicious payload and perform a test mapping pointing to the attacker's file, and the result will render on the Matched page in the Body area, resulting in the execution of the payload. This occurs because the response body is not validated or sanitized.
[ "cpe:2.3:a:wiremock:wiremock:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
GHSA-p9f4-jgqr-645x
Memory leak in the Sockets Direct Protocol (SDP) driver in Sun Solaris 10, and OpenSolaris snv_57 through snv_94, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors.
[]
null
null
null
null
null
GHSA-pp3p-ch6p-j7fr
HDF5 Library through 1.14.3 has a heap-based buffer over-read in H5VM_memcpyvv in H5VM.c (called from H5D__compact_readvv in H5Dcompact.c).
[]
null
8.8
null
null
null
GHSA-87c5-8w5v-p43f
H3C GR3200 MiniGR1B0V100R014 was discovered to contain a command injection vulnerability via the param parameter at DelL2tpLNSList.
[]
null
7.8
null
null
null
CVE-2006-1206
Matt Johnston Dropbear SSH server 0.47 and earlier, as used in embedded Linux devices and on general-purpose operating systems, allows remote attackers to cause a denial of service (connection slot exhaustion) via a large number of connection attempts that exceeds the MAX_UNAUTH_CLIENTS defined value of 30.
[ "cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:*:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2023-25519
NVIDIA ConnectX Host Firmware for the BlueField Data Processing Unit contains a vulnerability where a restricted host may cause an incorrect user management error. A successful exploit of this vulnerability may lead to escalation of privileges. 
[ "cpe:2.3:h:nvidia:bluefield_2_ga:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:bluefield_3_ga:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:bluefield_1:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:bluefield_2_lts:-:*:*:*:*:*:*:*", "cpe:2.3:o:nvidia:bluefield_1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:nvidia:bluefield_2_lts_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:nvidia:bluefield_2_ga_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:nvidia:bluefield_3_ga_firmware:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-cjqp-wrm4-w3h3
Tor before 0.1.1.20 allows remote attackers to identify hidden services via a malicious Tor server that attempts a large number of accesses of the hidden service, which eventually causes a circuit to be built through the malicious server.
[]
null
null
null
null
null
CVE-2007-5625
Cross-site scripting (XSS) vulnerability in filename.asp in ASP Site Search SearchSimon Lite 1.0 allows remote attackers to inject arbitrary web script or HTML via the QUERY parameter.
[ "cpe:2.3:a:simongibson:asp_site_search_searchsimon_lite:1.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2022-47487
In thermal service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service local denial of service with no additional execution privileges.
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-fm5v-c286-fp3w
Some ZTE products have CSRF vulnerability. Because some pages lack CSRF random value verification, attackers could perform illegal authorization operations by constructing messages.This affects: ZXHN H168N V3.5.0_EG1T5_TE, V2.5.5, ZXHN H108N V2.5.5_BTMT1
[]
null
6.5
null
null
null
CVE-2019-10408
A cross-site request forgery vulnerability in Jenkins Project Inheritance Plugin 2.0.0 and earlier allowed attackers to trigger project generation from templates.
[ "cpe:2.3:a:jenkins:project_inheritance:*:*:*:*:*:jenkins:*:*" ]
null
4.3
null
4.3
null
GHSA-56rc-gpxm-rv3v
Cross-site scripting (XSS) vulnerability in File Sharing Notify Toast in Synology Drive before 1.0.2-10275 allows remote authenticated users to inject arbitrary web script or HTML via the malicious file name.
[]
null
null
5.4
null
null
GHSA-wcmp-q6x5-gv25
SQL injection vulnerability in index.php in Ovidentia 6.6.5 allows remote attackers to execute arbitrary SQL commands via the item parameter in a contact modify action.
[]
null
null
null
null
null
GHSA-9q34-p9w7-3f57
The Best WordPress Gallery Plugin – FooGallery plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.4.26. This makes it possible for authenticated attackers, with contributor level or higher to read the contents of arbitrary folders on the server, which can contain sensitive information such as folder structure.
[]
null
7.7
null
null
null
CVE-2025-47780
cli_permissions.conf: deny option does not work for disallowing shell commands
Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk, trying to disallow shell commands to be run via the Asterisk command line interface (CLI) by configuring `cli_permissions.conf` (e.g. with the config line `deny=!*`) does not work which could lead to a security risk. If an administrator running an Asterisk instance relies on the `cli_permissions.conf` file to work and expects it to deny all attempts to execute shell commands, then this could lead to a security vulnerability. Versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk fix the issue.
[]
4.8
null
null
null
null
GHSA-7h6h-gqjm-2r96
The IATA (ata) driver in FreeBSD 6.0 and 8.0, when read access to /dev is available, allows local users to cause a denial of service (kernel panic) via a certain IOCTL request with a large count, which triggers a malloc call with a large value.
[]
null
null
null
null
null
CVE-1999-1031
counter.exe 2.70 allows a remote attacker to cause a denial of service (hang) via a long argument.
[ "cpe:2.3:a:behold_software:web_page_counter:2.7:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-g9cc-xw8r-hj44
Stack-based buffer overflow in Foxit Reader 3.0 before Build 1506, including 1120 and 1301, allows remote attackers to execute arbitrary code via a long (1) relative path or (2) absolute path in the filename argument in an action, as demonstrated by the "Open/Execute a file" action.
[]
null
null
null
null
null
RHSA-2024:2731
Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (python-django) security update
Django: denial-of-service in ``intcomma`` template filter
[ "cpe:/a:redhat:openstack:17.1::el9" ]
null
7.5
null
null
null
CVE-2008-4974
rrdedit in netmrg 0.20 allows local users to overwrite arbitrary files via a symlink attack on (1) /tmp/*.xml and (2) /tmp/*.backup temporary files.
[ "cpe:2.3:a:netmrg:netmrg:0.20:*:*:*:*:*:*:*" ]
null
null
null
6.9
null
GHSA-4339-x2hw-2985
Backup Manager 0.5.8a creates temporary files insecurely, which allows local users to conduct unauthorized file operations when a user is burning a CDR.
[]
null
null
null
null
null
CVE-2024-12422
Import Eventbrite Events <= 1.7.4 - Reflected Cross-Site Scripting
The Import Eventbrite Events plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'page' parameter in all versions up to, and including, 1.7.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
null
6.1
null
null
null
CVE-2008-1024
Apple Safari before 3.1.1, when running on Windows XP or Vista, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a file download with a crafted file name, which triggers memory corruption.
[ "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2024-3800
XSS in S@M CMS
Sites managed in S@M CMS (Concept Intermedia) might be vulnerable to Reflected XSS via including scripts in requested file names.  Only a part of observed services is vulnerable, but since vendor has not investigated the root problem, it is hard to determine when the issue appears.
[ "cpe:2.3:a:conceptintermedia:s\\@m_cms:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
CVE-2022-4774
Bit Form < 1.9 - RCE via Unauthenticated Arbitrary File Upload
The Bit Form WordPress plugin before 1.9 does not validate the file types uploaded via it's file upload form field, allowing unauthenticated users to upload arbitrary files types such as PHP or HTML files to the server, leading to Remote Code Execution.
[ "cpe:2.3:a:bitapps:bit_form:*:*:*:*:*:wordpress:*:*" ]
null
9.8
null
null
null
CVE-2018-14292
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF documents. By manipulating a document's elements, an attacker can cause a pointer to be reused after it has been freed. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-6232.
[ "cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
RHSA-2021:4839
Red Hat Security Advisory: mailman:2.1 security update
mailman: CSRF token derived from admin password allows offline brute-force attack mailman: CSRF token bypass allows to perform CSRF attacks and account takeover
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
8
null
null
null
CVE-2020-6875
A ZTE product is impacted by the improper access control vulnerability. Due to lack of an authentication protection mechanism in the program, attackers could use this vulnerability to gain access right through brute-force attacks. This affects: <ZXONE 19700 SNPE><ZXONE8700V1.40R2B13_SNPE>
[ "cpe:2.3:o:zte:zxone_19700_snpe_firmware:zxone8700v1.40r2b13_snpe:*:*:*:*:*:*:*", "cpe:2.3:h:zte:zxone_19700_snpe:-:*:*:*:*:*:*:*" ]
null
9.8
null
5
null
GHSA-pxcv-8qw9-hg5h
An issue was discovered in Joomla! before 3.9.6. The debug views of com_users do not properly escape user supplied data, which leads to a potential XSS attack vector.
[]
null
null
null
null
null
GHSA-8hmm-58xr-mxjc
The Add Subtitle WordPress plugin through 1.1.0 does not sanitise or escape the sub-title field (available only with classic editor) when output in the page, which could allow users with a role as low as contributor to perform Cross-Site Scripting attacks
[]
null
5.4
null
null
null
GHSA-jfv5-v5gm-jvgm
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository hamza417/inure prior to build92.
[]
null
null
7.9
null
null
GHSA-qvh7-2qrg-6v75
CertificatePinner.java in OkHttp 3.x through 3.12.0 allows man-in-the-middle attackers to bypass certificate pinning by changing SSLContext and the boolean values while hooking the application.
[]
null
null
5.9
null
null
GHSA-jxh4-j45j-4gp9
The decode_choice function in net/netfilter/nf_conntrack_h323_asn1.c in the Linux kernel before 2.6.20.15, 2.6.21.x before 2.6.21.6, and before 2.6.22 allows remote attackers to cause a denial of service (crash) via an encoded, out-of-range index value for a choice field, which triggers a NULL pointer dereference.
[]
null
null
null
null
null
GHSA-4c87-gg2q-fc6m
Malicious Package in rc-calendar-jhorst
Version 8.4.3 of `rc-calendar-jhorst` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`RecommendationIf version 8.4.3 of this module is found installed you will want to replace it with a version before or after 8.4.3. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.Users may consider downgrading to version 8.4.2
[]
null
null
null
null
null