id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-mm3r-85wp-99j8
|
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-867, DIR-878, and DIR-882 routers with firmware 1.20B10_BETA. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP requests. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the router. Was ZDI-CAN-10835.
|
[] | null | 8.8 | null | null | null |
|
GHSA-fcm9-4278-c4rv
|
TP-Link TL-WR840N devices allow remote attackers to cause a denial of service (networking outage) via fragmented packets, as demonstrated by an "nmap -f" command.
|
[] | null | null | 7.5 | null | null |
|
CVE-2018-6123
|
A use after free in Blink in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
CVE-2008-1080
|
Opera before 9.26 allows user-assisted remote attackers to read arbitrary files by tricking a user into typing the characters of the target filename into a file input.
|
[
"cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:1.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:2.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:2.10:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:2.10:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:2.10:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.00:beta:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.21:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.61:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.62:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.62:beta:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.00:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.00:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.00:beta4:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.00:beta5:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.00:beta6:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-552j-r9hx-pgwr
|
The login method in LoginModule implementations in Apache Geronimo 2.0 does not throw FailedLoginException for failed logins, which allows remote attackers to bypass authentication requirements, deploy arbitrary modules, and gain administrative access by sending a blank username and password with the command line deployer in the deployment module.
|
[] | null | null | null | null | null |
|
CVE-2018-0453
|
Cisco Firepower Management Center and Firepower System Software Sourcefire Tunnel Control Channel Command Execution Vulnerability
|
A vulnerability in the Sourcefire tunnel control channel protocol in Cisco Firepower System Software running on Cisco Firepower Threat Defense (FTD) sensors could allow an authenticated, local attacker to execute specific CLI commands with root privileges on the Cisco Firepower Management Center (FMC), or through Cisco FMC on other Firepower sensors and devices that are controlled by the same Cisco FMC. To send the commands, the attacker must have root privileges for at least one affected sensor or the Cisco FMC. The vulnerability exists because the affected software performs insufficient checks for certain CLI commands, if the commands are executed via a Sourcefire tunnel connection. An attacker could exploit this vulnerability by authenticating with root privileges to a Firepower sensor or Cisco FMC, and then sending specific CLI commands to the Cisco FMC or through the Cisco FMC to another Firepower sensor via the Sourcefire tunnel connection. A successful exploit could allow the attacker to modify device configurations or delete files on the device that is running Cisco FMC Software or on any Firepower device that is managed by Cisco FMC.
|
[
"cpe:2.3:a:cisco:firepower_threat_defense:5.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firepower_threat_defense:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firepower_threat_defense:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firepower_threat_defense:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firepower_threat_defense:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firepower_threat_defense:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firepower_threat_defense:6.2.2:*:*:*:*:*:*:*"
] | null | null | 8.2 | 7.2 | null |
GHSA-3768-p22h-mhp7
|
An exploitable integer overflow vulnerability exists in the flattenIncrementally function in the xcf2png and xcf2pnm binaries of xcftools 1.0.7. An integer overflow can occur while calculating the row's allocation size, that could be exploited to corrupt memory and eventually execute arbitrary code. In order to trigger this vulnerability, a victim would need to open a specially crafted XCF file.
|
[] | null | 8.8 | null | null | null |
|
CVE-2006-2099
|
Directory traversal vulnerability in UltraISO 8.0.0.1392 allows remote attackers to write arbitrary files via a .. (dot dot) in a filename in an ISO image.
|
[
"cpe:2.3:a:ezb_systems:ultraiso:8.0.0.1392:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-wmqx-7q2f-fcf6
|
Buffer Over-read at parse_rawml.c:1416 in GitHub repository bfabiszewski/libmobi prior to 0.11. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.
|
[] | null | 7.1 | null | null | null |
|
GHSA-23c8-xvwp-63gj
|
WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.
|
[] | null | null | null | null | null |
|
CVE-2021-35638
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
] | null | 4.9 | null | null | null |
|
CVE-2021-3808
|
Potential security vulnerabilities have been identified in the BIOS (UEFI Firmware) for certain HP PC products, which might allow arbitrary code execution. HP is releasing firmware updates to mitigate these potential vulnerabilities.
|
[
"cpe:2.3:o:hp:elite_dragonfly_firmware:01.12.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_dragonfly:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x2_1012_g2_firmware:1.41:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x2_1012_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x2_1013_g3_firmware:01.19.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x2_1013_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x2_g4_firmware:01.12.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x2_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_1040_g4_firmware:1.41:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_1040_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_1050_g1_firmware:01.19.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_1050_g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_725_g4_firmware:1.4:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_725_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_735_g5_firmware:01.20.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_735_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_735_g6_firmware:01.19.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_735_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_745_g4_firmware:1.4:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_745_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_745_g5_firmware:01.20.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_745_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_745_g6_firmware:01.19.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_745_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_755_g4_firmware:1.4:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_755_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_755_g5_firmware:01.20.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_755_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_820_g4_firmware:1.41:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_820_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_828_g4_firmware:1.41:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_828_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_830_g5_firmware:01.19.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_830_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_830_g6_firmware:01.12.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_830_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_836_g5_firmware:01.19.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_836_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_836_g6_firmware:01.12.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_836_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g4_firmware:1.41:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g5_firmware:01.19.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g6_firmware:01.12.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840r_g4_firmware:01.19.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840r_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_846_g5_firmware:01.19.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_846_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_848_g4_firmware:1.41:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_848_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_850_g4_firmware:1.41:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_850_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_850_g5_firmware:01.19.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_850_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_850_g6_firmware:01.12.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_850_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1020_g2_firmware:1.41:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1020_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1030_g2_firmware:1.41:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1030_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1030_g3_firmware:01.19.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1030_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1030_g4_firmware:01.12.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1030_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1040_g5_firmware:01.19.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1040_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1040_g6_firmware:01.12.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1040_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_830_g5_firmware:01.19.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_830_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_830_g6_firmware:01.12.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_830_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_x2_612_g2_firmware:1.41:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_x2_612_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_11_ee_g2_firmware:1.55:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_11_ee_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_430_g4_firmware:1.41:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_430_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_430_g5_firmware:01.20.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_430_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_430_g6_firmware:01.19.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_430_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g4_firmware:1.41:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g5_firmware:01.20.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g6_firmware:01.19.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_445_g6_firmware:01.19.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_445_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_445r_g6_firmware:01.19.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_445r_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g4_firmware:1.41:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g5_firmware:01.20.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g6_firmware:01.19.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_455_g4_firmware:1.4:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_455_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_455_g5_firmware:01.20.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_455_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_455_g6_firmware:01.19.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_455_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_455r_g6_firmware:01.19.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_455r_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_470_g4_firmware:1.41:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_470_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_470_g5_firmware:01.20.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_470_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_640_g3_firmware:1.41:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_640_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_640_g4_firmware:01.20.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_640_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_640_g5_firmware:01.12.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_640_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_645_g3_firmware:1.4:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_645_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_645_g4_firmware:01.20.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_645_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_650_g3_firmware:1.41:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_650_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_650_g4_firmware:01.20.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_650_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_650_g5_firmware:01.12.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_650_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_655_g3_firmware:1.4:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_655_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_11_g2_ee_firmware:1.43:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_11_g2_ee:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_11_g3_ee_firmware:01.17.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_11_g3_ee:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_11_g4_ee_firmware:01.13.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_11_g4_ee:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_440_g1_firmware:01.19.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_440_g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_14u_g4_firmware:1.41:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_14u_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_14u_g5_firmware:01.19.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_14u_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_14u_g6_firmware:01.12.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_14u_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15_g4_firmware:1.41:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15_g5_firmware:01.19.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15_g6_firmware:01.12.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15u_g4_firmware:1.41:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15u_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15u_g5_firmware:01.19.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15u_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15u_g6_firmware:01.12.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15u_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_17_g4_firmware:1.41:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_17_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_17_g5_firmware:01.19.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_17_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_17_g6_firmware:01.12.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_17_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_studio_g4_firmware:1.41:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_studio_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_studio_g5_firmware:01.19.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_studio_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_studio_x360_g5_firmware:01.19.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_studio_x360_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_x2_g4_firmware:1.41:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_x2_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_13_g2_firmware:01.19.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_13_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_14_g2_firmware:01.19.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_14_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_15_g2_firmware:01.19.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_15_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_g1_firmware:01.20.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_x_13_g2_firmware:01.12.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_x_13_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp_z1_all-in-one_g3_firmware:1.31:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:hp_z1_all-in-one_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp_z1_entry_tower_g5_firmware:02.11.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:hp_z1_entry_tower_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp_z2_mini_g3_firmware:1.83:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:hp_z2_mini_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp_z2_mini_g4_firmware:01.08.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:hp_z2_mini_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp_z2_mini_g5_firmware:01.04.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:hp_z2_mini_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp_z2_small_form_factor_g4_firmware:01.08.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:hp_z2_small_form_factor_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp_z2_small_form_factor_g5_firmware:01.04.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:hp_z2_small_form_factor_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp_z2_tower_g4_firmware:01.08.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:hp_z2_tower_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp_z2_tower_g5_firmware:01.04.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:hp_z2_tower_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp_z238_microtower_firmware:1.83:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:hp_z238_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp_z240_small_form_factor_firmware:1.83:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:hp_z240_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp_z240_tower_firmware:1.83:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:hp_z240_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp_mt21_mobile_thin_client_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:hp_mt21_mobile_thin_client:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp_mt31_mobile_thin_client_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:hp_mt31_mobile_thin_client:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp_mt44_mobile_thin_client_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:hp_mt44_mobile_thin_client:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp_mt45_mobile_thin_client_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:hp_mt45_mobile_thin_client:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_slice_firmware:2.55:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_slice:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_slice_g2_firmware:2.55:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_slice_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_705_g3_desktop_mini_pc_firmware:2.38:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_705_g3_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_705_g3_microtower_pc_firmware:2.38:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_705_g3_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_705_g3_small_form_factor_pc_firmware:2.38:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_705_g3_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_705_g4_desktop_mini_pc_firmware:02.17.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_705_g4_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_705_g4_microtower_pc_firmware:02.17.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_705_g4_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_705_g4_small_form_factor_pc_firmware:02.12.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_705_g4_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_705_g4_workstation_firmware:02.17.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_705_g4_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_705_g5_desktop_mini_pc_firmware:02.11.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_705_g5_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_705_g5_small_form_factor_pc_firmware:02.11.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_705_g5_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_35w_g3_desktop_mini_pc_firmware:2.4:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_35w_g3_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_35w_g4_desktop_mini_pc_firmware:02.18.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_35w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_65w_g3_desktop_mini_pc_firmware:2.4:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_65w_g3_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_65w_g4_desktop_mini_pc_firmware:02.18.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_65w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_95w_g4_desktop_mini_pc_firmware:02.18.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_95w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g3_small_form_factor_pc_firmware:2.4:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g3_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g3_tower_pc_firmware:2.4:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g3_tower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g4_small_form_factor_pc_firmware:02.17.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g4_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g4_tower_pc_firmware:02.17.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g4_tower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g4_workstation_firmware:02.17.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g4_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g5_desktop_mini_pc_firmware:02.11.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g5_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g5_small_form_factor_pc_firmware:02.11.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g5_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g5_tower_pc_firmware:02.11.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g5_tower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_880_g3_tower_pc_firmware:2.4:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_880_g3_tower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_880_g4_tower_pc_firmware:02.17.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_880_g4_tower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_880_g5_tower_pc_firmware:02.11.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_880_g5_tower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g1_23.8-in_all-in-one_business_pc_firmware:2.4:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g1_23.8-in_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g2_23.8-in_all-in-one_business_pc_firmware:02.18.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g2_23.8-in_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g3_23.8_non-touch_all-in-one_business_pc_firmware:2.4:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g3_23.8_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g4_23.8-in_all-in-one_business_pc_firmware:02.18.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g4_23.8-in_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g5_23.8-in_all-in-one_firmware:2.11.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g5_23.8-in_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g3_desktop_mini_pc_firmware:2.4:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g3_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g4_desktop_mini_pc_firmware:02.18.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g4_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g4_microtower_pc_firmware:2.4:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g4_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g4_small_form_factor_pc_firmware:2.4:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g4_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g5_desktop_mini_pc_firmware:02.11.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g5_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g5_microtower_pc_firmware:02.17.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g5_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g5_small_form_factor_pc_firmware:2.17:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g5_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g6_microtower_pc_firmware:02.11.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g6_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g6_small_form_factor_pc_firmware:02.11.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g6_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_405_g4_desktop_mini_pc_firmware:02.17.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_405_g4_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_405_g4_small_form_factor_pc_firmware:02.12.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_405_g4_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_480_g4_microtower_pc_firmware:2.4:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_480_g4_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_480_g5_microtower_pc_firmware:02.17.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_480_g5_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_480_g6_microtower_pc_firmware:02.11.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_480_g6_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g3_desktop_mini_pc_firmware:2.4:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g3_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g3_microtower_pc_firmware:2.4:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g3_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g3_small_form_factor_pc_firmware:2.4:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g3_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g4_desktop_mini_pc_firmware:02.18.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g4_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g4_microtower_pc_firmware:02.17.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g4_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g4_small_form_factor_pc_firmware:02.18.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g4_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g5_desktop_mini_pc_firmware:02.11.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g5_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g5_microtower_pc_firmware:02.11.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g5_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g5_small_form_factor_pc_firmware:02.11.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g5_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_680_g3_microtower_pc_firmware:2.4:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_680_g3_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_680_g4_microtower_pc_firmware:02.17.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_680_g4_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g3_20-inch_non-touch_all-in-one_pc_firmware:2.4:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g3_20-inch_non-touch_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g3_20-inch_touch_all-in-one_pc_firmware:2.4:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g3_20-inch_touch_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g4_20-inch_non-touch_all-in-one_business_pc_firmware:02.17.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g4_20-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g4_23.8-inch_non-touch_all-in-one_business_pc_firmware:02.17.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g4_23.8-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g5_20-inch_all-in-one_business_pc_firmware:02.11.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g5_20-inch_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g5_23.8-inch_all-in-one_business_pc_firmware:02.11.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g5_23.8-inch_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_440_g4_23.8-inch_non-touch_all-in-one_business_pc_firmware:02.17.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_440_g4_23.8-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_440_g5_23.8-in_all-in-one_business_pc_firmware:02.11.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_440_g5_23.8-in_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_480_g3_20-inch_non-touch_all-in_one_pc_firmware:2.4:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_480_g3_20-inch_non-touch_all-in_one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_600_g3_21.5-inch_non-touch_all-in-one_pc_firmware:2.4:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_600_g3_21.5-inch_non-touch_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_600_g4_21.5-inch_touch_all-in-one_business_pc_firmware:02.17.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_600_g4_21.5-inch_touch_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_600_g5_21.5-in_all-in-one_business_pc_firmware:02.11.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_600_g5_21.5-in_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_flex_pro_retail_system_firmware:02.17.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_flex_pro_retail_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_flex_pro-c_retail_system_firmware:02.17.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_flex_pro-c_retail_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_go_10_mobile_system_firmware:01.08.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_go_10_mobile_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_go_mobile_system_firmware:01.19.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_go_mobile_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_one_aio_system_firmware:02.40.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_one_aio_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mp9_g4_retail_system_firmware:02.17.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mp9_g4_retail_system:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
CVE-2002-0059
|
The decompression algorithm in zlib 1.1.3 and earlier, as used in many different utilities and packages, causes inflateEnd to release certain memory more than once (a "double free"), which may allow local and remote attackers to execute arbitrary code via a block of malformed compression data.
|
[
"cpe:2.3:a:zlib:zlib:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2008-2645
|
Multiple PHP remote file inclusion vulnerabilities in Brim (formerly Booby) 1.0.1 allow remote attackers to execute arbitrary PHP code via a URL in the renderer parameter to template.tpl.php in (1) barrel/, (2) barry/, (3) mylook/, (4) oerdec/, (5) penguin/, (6) sidebar/, (7) slashdot/, and (8) text-only/ in templates/. NOTE: this can also be leveraged to include and execute arbitrary local files via directory traversal sequences.
|
[
"cpe:2.3:a:brim-project:brim:1.0.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-rgx2-hj64-5vc5
|
Buffer overflow in the UGameEngine::UpdateConnectingMessage function in the Unreal engine 1, 2, and 2.5, as used in multiple games including Unreal Tournament 2004, Unreal tournament 2003, Postal 2, Raven Shield, and SWAT4, when downloads are enabled, allows remote attackers to execute arbitrary code via a long LEVEL field in a WELCOME response to a download request.
|
[] | null | null | null | null | null |
|
CVE-2005-3533
|
Buffer overflow in OSH before 1.7-15 allows local users to execute arbitrary code via a long current working directory and filename.
|
[
"cpe:2.3:a:osh:osh:*:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2015-4994
|
Buffer overflow in IBM Domino 8.5.1 through 8.5.3 before 8.5.3 FP6 IF10 and 9.x before 9.0.1 FP4 IF3 allows remote attackers to execute arbitrary code or cause a denial of service (SMTP daemon crash) via a crafted GIF image, aka SPRs KLYH9ZDKRE and KLYH9ZTLEZ, a different vulnerability than CVE-2015-5040.
|
[
"cpe:2.3:a:ibm:domino:8.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:9.0.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2017-12864
|
In opencv/modules/imgcodecs/src/grfmt_pxm.cpp, function ReadNumber did not checkout the input length, which lead to integer overflow. If the image is from remote, may lead to remote code execution or denial of service. This affects Opencv 3.3 and earlier.
|
[
"cpe:2.3:a:opencv:opencv:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
CVE-2017-15201
|
In Kanboard before 1.0.47, by altering form data, an authenticated user can edit tags of a private project of another user.
|
[
"cpe:2.3:a:kanboard:kanboard:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.31:beta0:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.31:beta1:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.32:beta0:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.32:beta1:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.34:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.36:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.37:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.38:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.39:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.40:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.41:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.42:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.43:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.44:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.45:*:*:*:*:*:*:*",
"cpe:2.3:a:kanboard:kanboard:1.0.46:*:*:*:*:*:*:*"
] | null | null | 4.3 | 4 | null |
|
GHSA-hg82-r34f-j85v
|
Cross-site scripting (XSS) vulnerability in Edgewall Software Trac 0.9.4 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors related to a "wiki macro."
|
[] | null | null | null | null | null |
|
GHSA-fh4p-65g7-4cxw
|
Cross-site request forgery (CSRF) vulnerability in gpEasy CMS 1.6.2, 1.6.1, and earlier allows remote attackers to hijack the authentication of administrators for requests that create new administrative users via an Admin_Users action to index.php. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
GHSA-w65v-2jvx-6697
|
Wade Graphic Design FANTSY has a vulnerability of insufficient authorization check. An unauthenticated remote user can exploit this vulnerability by modifying URL parameters to gain administrator privileges to perform arbitrary system operation or disrupt service.
|
[] | null | 9.8 | null | null | null |
|
GHSA-wrm3-h327-j8wh
|
An issue has been discovered in GitLab EE affecting all versions starting from 11.6 before 16.3.6, all versions starting from 16.4 before 16.4.2, all versions starting from 16.5 before 16.5.1. It was possible for an unauthorised project or group member to read the CI/CD variables using the custom project templates.
|
[] | null | 6.5 | null | null | null |
|
GHSA-xj3c-66q4-9h7r
|
IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 159647.
|
[] | null | 5.4 | null | null | null |
|
CVE-2019-19029
|
Cloud Native Computing Foundation Harbor prior to 1.8.6 and 1.9.3 allows SQL Injection via user-groups in the VMware Harbor Container Registry for the Pivotal Platform.
|
[
"cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:pivotal:vmware_harbor_registry:-:*:*:*:*:*:*:*"
] | null | 7.2 | null | 6.5 | null |
|
GHSA-mv53-r5xv-29p2
|
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[] | null | 5.4 | null | null | null |
|
GHSA-jg9g-2m55-m7hp
|
An issue was discovered on ROADCAM X3 devices. It has a uniform default credential set that cannot be modified by users, making it easy for attackers to gain unauthorized access to multiple devices.
|
[] | null | 9.8 | null | null | null |
|
GHSA-6v8f-m2cr-8qwp
|
Unspecified vulnerability in HP Business Process Monitor 9.13.1 patch 1 and 9.22 patch 1 allows remote attackers to execute arbitrary code and obtain sensitive information via unknown vectors.
|
[] | null | null | null | null | null |
|
CVE-2025-0431
|
Enterprise Protection Backslash URL Rewrite Bypass
|
Enterprise Protection contains a vulnerability in URL rewriting that allows an unauthenticated remote attacker to send an email which bypasses URL protections impacting the integrity of recipient's email. This occurs due to improper filtering of backslashes within URLs and affects all versions of 8.21, 8.20 and 8.18 prior to 8.21.0 patch 5115, 8.20.6 patch 5114 and 8.18.6 patch 5113 respectively.
|
[] | null | 5.8 | null | null | null |
CVE-2001-1023
|
Xcache 2.1 allows remote attackers to determine the absolute path of web server documents by requesting a URL that is not cached by Xcache, which returns the full pathname in the Content-PageName header.
|
[
"cpe:2.3:a:xcache_technologies:xcache:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xcache_technologies:xcache:2.1:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-75mg-7wpw-49q3
|
The GeoDirectory Business Directory WordPress plugin before 2.1.1.3 was vulnerable to Authenticated Stored Cross-Site Scripting (XSS).
|
[] | null | null | null | null | null |
|
CVE-2007-0342
|
WebCore in Apple WebKit build 18794 allows remote attackers to cause a denial of service (null dereference and application crash) via a TD element with a large number in the ROWSPAN attribute, as demonstrated by a crash of OmniWeb 5.5.3 on Mac OS X 10.4.8, a different vulnerability than CVE-2006-2019.
|
[
"cpe:2.3:a:apple:safari:2.0.4_419.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:webkit:build_18794:*:*:*:*:*:*:*",
"cpe:2.3:a:omnigroup:omniweb:5.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*"
] | null | 7.5 | null | 4.3 | null |
|
CVE-2021-32471
|
Insufficient input validation in the Marvin Minsky 1967 implementation of the Universal Turing Machine allows program users to execute arbitrary code via crafted data. For example, a tape head may have an unexpected location after the processing of input composed of As and Bs (instead of 0s and 1s). NOTE: the discoverer states "this vulnerability has no real-world implications."
|
[
"cpe:2.3:a:mit:universal_turing_machine:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 | null |
|
CVE-2019-8769
|
An issue existed in the drawing of web page elements. The issue was addressed with improved logic. This issue is fixed in iOS 13.1 and iPadOS 13.1, macOS Catalina 10.15. Visiting a maliciously crafted website may reveal browsing history.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4.3 | null |
|
CVE-2024-10422
|
SourceCodester Attendance and Payroll System overtime_add.php sql injection
|
A vulnerability, which was classified as critical, has been found in SourceCodester Attendance and Payroll System 1.0. This issue affects some unknown processing of the file /admin/overtime_add.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:nurhodelta17:attendance_and_payroll_system:1.0:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 | null |
CVE-2018-5276
|
In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e018. NOTE: the vendor reported that they "have not been able to reproduce the issue on any Windows operating system version (32-bit or 64-bit).
|
[
"cpe:2.3:a:malwarebytes:malwarebytes:3.3.1.2183:*:*:*:premium:*:*:*"
] | null | null | 7.8 | 6.1 | null |
|
GHSA-rchx-q8j2-p9fp
|
The License Logging Server (llssrv.exe) in Microsoft Windows 2000 SP4 allows remote attackers to execute arbitrary code via an RPC message containing a string without a null terminator, which triggers a heap-based buffer overflow in the LlsrLicenseRequestW method, aka "License Logging Server Heap Overflow Vulnerability."
|
[] | null | null | null | null | null |
|
GHSA-3r6p-fq38-2gpr
|
Softaculous Webuzo contains an authentication bypass vulnerability through the password reset functionality. Remote, anonymous attackers can exploit this vulnerability to gain full server access as the root user.
|
[] | null | 9.8 | null | null | null |
|
GHSA-5fgq-c32c-5mcc
|
Cross-site scripting vulnerability in demonstration scripts for vqServer allows remote attackers to execute arbitrary script via a link that contains the script in arguments to demo scripts such as respond.pl.
|
[] | null | null | null | null | null |
|
CVE-2022-0335
|
A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. The "delete badge alignment" functionality did not include the necessary token check to prevent a CSRF risk.
|
[
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
GHSA-3fj3-2v72-xm29
|
The ASUS Vivobaby application before 1.1.09 for Android has Missing SSL Certificate Validation.
|
[] | null | null | 9.1 | null | null |
|
GHSA-vg83-7v95-762v
|
Ulearn version a5a7ca20de859051ea0470542844980a66dfc05d allows an attacker with administrator permissions to obtain remote code execution on the server through the image upload functionality. This occurs because the application does not validate that the uploaded image is actually an image.
|
[] | null | 7.2 | null | null | null |
|
CVE-2024-37626
|
A command injection issue in TOTOLINK A6000R V1.0.1-B20201211.2000 firmware allows a remote attacker to execute arbitrary code via the iface parameter in the vif_enable function.
|
[
"cpe:2.3:o:totolink:a6000r_firmware:1.0.1-b20201211.2000:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2014-9360
|
XML external entity (XXE) vulnerability in Scalix Web Access 11.4.6.12377 and 12.2.0.14697 allows remote attackers to read arbitrary files and trigger requests to intranet servers via a crafted request.
|
[
"cpe:2.3:a:scalix:web_access:11.4.6.12377:*:*:*:*:*:*:*",
"cpe:2.3:a:scalix:web_access:12.2.0.14697:*:*:*:*:*:*:*"
] | null | null | null | 6.4 | null |
|
GHSA-w5j7-j9wm-9x8q
|
Cross-site scripting (XSS) vulnerability in edit-post.php in the Flexible Custom Post Type plugin before 0.1.7 for WordPress allows remote attackers to inject arbitrary web script or HTML via the id parameter.
|
[] | null | null | null | null | null |
|
RHSA-2018:1457
|
Red Hat Security Advisory: dhcp security update
|
dhcp: Command injection vulnerability in the DHCP client NetworkManager integration script
|
[
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | 7.5 | null | null |
CVE-2018-2384
|
Under certain conditions a malicious user provoking a Null Pointer dereference can prevent legitimate users from accessing the SAP Internet Graphics Server, 7.20, 7.20EXT, 7.45, 7.49, 7.53, and its services.
|
[
"cpe:2.3:a:sap:internet_graphics_server:7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:internet_graphics_server:7.20ext:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:internet_graphics_server:7.45:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:internet_graphics_server:7.49:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:internet_graphics_server:7.53:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4 | null |
|
CVE-2022-44198
|
Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow via parameter openvpn_push1.
|
[
"cpe:2.3:o:netgear:r7000p_firmware:1.3.1.64:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2018-19340
|
Guriddo Form PHP 5.3 has XSS via the demos/jqform/defaultnodb/default.php OrderID, ShipName, ShipAddress, ShipCity, ShipPostalCode, ShipCountry, Freight, or details parameter.
|
[
"cpe:2.3:a:guriddo:form_php:5.3:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-x3j8-8pm3-5gwm
|
Buffer overflow in McSubMgr ActiveX control (mcsubmgr.dll) in McAfee Security Center 6.0.23 for Internet Security Suite 2006, Wireless Home Network Security, Personal Firewall Plus, VirusScan, Privacy Service, SpamKiller, AntiSpyware, and QuickClean allows remote user-assisted attackers to execute arbitrary commands via long string parameters, which are later used in vsprintf.
|
[] | null | null | null | null | null |
|
CVE-2005-3399
|
Multiple interpretation error in CAT-QuickHeal 8.0 allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug."
|
[
"cpe:2.3:a:cat:quick_heal:8.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2007-0860
|
Multiple PHP remote file inclusion vulnerabilities in local Calendar System 1.1 allow remote attackers to execute arbitrary PHP code via a URL in the (1) TEMPLATE_DIR parameter to (a) showinvoices.php, (b) showmonth.php, (c) showevents.php, (d) retrieveinvoice.php, (e) modifyitem.php, and (f) lookup_userid.php; or the LIBDIR parameter to (g) editevent.php, (h) resetpassword.php, (i) signup.php, showmonth.php, (j) showday.php, showevents.php, and lookup_userid.php. NOTE: this issue has been disputed by a third party, who states that the associated variables are set in config.php before use
|
[
"cpe:2.3:a:laboratory_for_optical_and_computational_instrumentation:local_calendar_system:1.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-g4rc-px2p-4hv3
|
Off-by-one overflow in the CVS PreservePermissions of rcs.c for CVSD before 1.11.2 allows local users to execute arbitrary code.
|
[] | null | null | null | null | null |
|
GHSA-h24c-pmg9-qp24
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Sandor Kovacs Simple Sticky Footer allows Stored XSS. This issue affects Simple Sticky Footer : from n/a through 1.3.5.
|
[] | null | 5.9 | null | null | null |
|
CVE-2022-4216
|
The Chained Quiz plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'facebook_appid' parameter in versions up to, and including, 1.3.2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrative privileges to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[
"cpe:2.3:a:kibokolabs:chained_quiz:*:*:*:*:*:wordpress:*:*"
] | null | 5.5 | null | null | null |
|
CVE-2020-4567
|
IBM Tivoli Key Lifecycle Manager 3.0.1 and 4.0 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials. IBM X-Force ID: 184156.
|
[
"cpe:2.3:a:ibm:security_key_lifecycle_manager:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_key_lifecycle_manager:4.0:*:*:*:*:*:*:*"
] | null | null | 8.6 | null | null |
|
GHSA-g64r-v5c7-qvh2
|
ZXMP M721 has an information leak vulnerability. Since the serial port authentication on the ZBOOT interface is not effective although it is enabled, an attacker could use this vulnerability to log in to the device to obtain sensitive information.
|
[] | null | 7.5 | null | null | null |
|
CVE-2007-2409
|
Cross-domain vulnerability in WebCore on Apple Mac OS X 10.3.9 and 10.4.10 allows remote attackers to obtain sensitive information via a popup window, which is able to read the current URL of the parent window.
|
[
"cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:webcore:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-w8jq-x49j-99g5
|
The BackWPup plugin for WordPress is vulnerable to Directory Traversal in versions up to, and including, 4.0.1 via the job-specific backup folder. This allows authenticated attackers to store backups in arbitrary folders on the server provided they can be written to by the server. Additionally, default settings will place an index.php and a .htaccess file into the chosen directory (unless already present) when the first backup job is run that are intended to prevent directory listing and file access. This means that an attacker could set the backup directory to the root of another site in a shared environment and thus disable that site.
|
[] | null | 6.8 | null | null | null |
|
CVE-2015-3886
|
libinfinity before 0.6.6-1 does not validate expired SSL certificates, which allows remote attackers to have unspecified impact via unknown vectors.
|
[
"cpe:2.3:a:libinfinity_project:libinfinity:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
CVE-2020-14931
|
A stack-based buffer overflow in DMitry (Deepmagic Information Gathering Tool) 1.3a might allow remote WHOIS servers to execute arbitrary code via a long line in a response that is mishandled by nic_format_buff.
|
[
"cpe:2.3:a:dmitry_project:dmitry:1.3a:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2025-49658
|
Windows Transport Driver Interface (TDI) Translation Driver Information Disclosure Vulnerability
|
Out-of-bounds read in Windows TDX.sys allows an authorized attacker to disclose information locally.
|
[] | null | 5.5 | null | null | null |
cisco-sa-20190220-firpwr-dos
|
Cisco Firepower 9000 Series Firepower 2-Port 100G Double-Width Network Module Queue Wedge Denial of Service Vulnerability
|
A vulnerability in field-programmable gate array (FPGA) ingress buffer management for the Cisco Firepower 9000 Series with the Cisco Firepower 2-port 100G double-width network module (PID: FPR9K-DNM-2X100G) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. Manual intervention may be required before a device will resume normal operations.
The vulnerability is due to a logic error in the FPGA related to the processing of different types of input packets. An attacker could exploit this vulnerability by being on the adjacent subnet and sending a crafted sequence of input packets to a specific interface on an affected device. A successful exploit could allow the attacker to cause a queue wedge condition on the interface. When a wedge occurs, the affected device will stop processing any additional packets that are received on the wedged interface.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-firpwr-dos ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-firpwr-dos"]
|
[] | null | null | 6.1 | null | null |
GHSA-5xqv-jx9j-wg8h
|
A vulnerability was found in PHPGurukul Art Gallery Management System 1.1. It has been classified as critical. Affected is an unknown function of the file /admin/edit-art-medium-detail.php. The manipulation of the argument editid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 2.1 | 6.3 | null | null | null |
|
CVE-2022-34819
|
A vulnerability has been identified in SIMATIC CP 1242-7 V2 (All versions < V3.3.46), SIMATIC CP 1243-1 (All versions < V3.3.46), SIMATIC CP 1243-7 LTE EU (All versions < V3.3.46), SIMATIC CP 1243-7 LTE US (All versions < V3.3.46), SIMATIC CP 1243-8 IRC (All versions < V3.3.46), SIMATIC CP 1542SP-1 IRC (All versions >= V2.0 < V2.2.28), SIMATIC CP 1543-1 (All versions < V3.0.22), SIMATIC CP 1543SP-1 (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1543SP-1 ISEC (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (All versions >= V2.0 < V2.2.28), SIPLUS NET CP 1242-7 V2 (All versions < V3.3.46), SIPLUS NET CP 1543-1 (All versions < V3.0.22), SIPLUS S7-1200 CP 1243-1 (All versions < V3.3.46), SIPLUS S7-1200 CP 1243-1 RAIL (All versions < V3.3.46). The application lacks proper validation of user-supplied data when parsing specific messages. This could result in a heap-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of device.
|
[
"cpe:2.3:o:siemens:simatic_cp_1242-7_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_cp_1242-7_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_cp_1243-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_cp_1243-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_cp_1243-7_lte_eu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_cp_1243-7_lte_eu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_cp_1243-7_lte_us_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_cp_1243-7_lte_us:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_cp_1243-8_irc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_cp_1243-8_irc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_cp_1542sp-1_irc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_cp_1542sp-1_irc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_cp_1543-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_cp_1543-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_cp_1543sp-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_cp_1543sp-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_et_200sp_cp_1542sp-1_irc_tx_rail_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_et_200sp_cp_1542sp-1_irc_tx_rail:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_et_200sp_cp_1543sp-1_isec_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_et_200sp_cp_1543sp-1_isec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_et_200sp_cp_1543sp-1_isec_tx_rail_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_et_200sp_cp_1543sp-1_isec_tx_rail:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_net_cp_1242-7_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_net_cp_1242-7_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_net_cp_1543-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_net_cp_1543-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_s7-1200_cp_1243-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_s7-1200_cp_1243-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_s7-1200_cp_1243-1_rail_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_s7-1200_cp_1243-1_rail:-:*:*:*:*:*:*:*"
] | null | 10 | null | null | null |
|
GHSA-r9wr-68hr-qxpc
|
Multiple buffer overflow vulnerabilities exist in the qos.cgi qos_settings() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A buffer overflow vulnerability exists in the `sel_mode` POST parameter.
|
[] | null | 9.1 | null | null | null |
|
CVE-2023-50069
|
WireMock with GUI versions 3.2.0.0 through 3.0.4.0 are vulnerable to stored cross-site scripting (SXSS) through the recording feature. An attacker can host a malicious payload and perform a test mapping pointing to the attacker's file, and the result will render on the Matched page in the Body area, resulting in the execution of the payload. This occurs because the response body is not validated or sanitized.
|
[
"cpe:2.3:a:wiremock:wiremock:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
GHSA-p9f4-jgqr-645x
|
Memory leak in the Sockets Direct Protocol (SDP) driver in Sun Solaris 10, and OpenSolaris snv_57 through snv_94, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-pp3p-ch6p-j7fr
|
HDF5 Library through 1.14.3 has a heap-based buffer over-read in H5VM_memcpyvv in H5VM.c (called from H5D__compact_readvv in H5Dcompact.c).
|
[] | null | 8.8 | null | null | null |
|
GHSA-87c5-8w5v-p43f
|
H3C GR3200 MiniGR1B0V100R014 was discovered to contain a command injection vulnerability via the param parameter at DelL2tpLNSList.
|
[] | null | 7.8 | null | null | null |
|
CVE-2006-1206
|
Matt Johnston Dropbear SSH server 0.47 and earlier, as used in embedded Linux devices and on general-purpose operating systems, allows remote attackers to cause a denial of service (connection slot exhaustion) via a large number of connection attempts that exceeds the MAX_UNAUTH_CLIENTS defined value of 30.
|
[
"cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2023-25519
|
NVIDIA ConnectX Host Firmware for the BlueField Data Processing Unit contains a vulnerability where a restricted host may cause an incorrect user management error. A successful exploit of this vulnerability may lead to escalation of privileges.
|
[
"cpe:2.3:h:nvidia:bluefield_2_ga:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:bluefield_3_ga:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:bluefield_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:bluefield_2_lts:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nvidia:bluefield_1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:nvidia:bluefield_2_lts_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:nvidia:bluefield_2_ga_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:nvidia:bluefield_3_ga_firmware:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
GHSA-cjqp-wrm4-w3h3
|
Tor before 0.1.1.20 allows remote attackers to identify hidden services via a malicious Tor server that attempts a large number of accesses of the hidden service, which eventually causes a circuit to be built through the malicious server.
|
[] | null | null | null | null | null |
|
CVE-2007-5625
|
Cross-site scripting (XSS) vulnerability in filename.asp in ASP Site Search SearchSimon Lite 1.0 allows remote attackers to inject arbitrary web script or HTML via the QUERY parameter.
|
[
"cpe:2.3:a:simongibson:asp_site_search_searchsimon_lite:1.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2022-47487
|
In thermal service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service local denial of service with no additional execution privileges.
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
GHSA-fm5v-c286-fp3w
|
Some ZTE products have CSRF vulnerability. Because some pages lack CSRF random value verification, attackers could perform illegal authorization operations by constructing messages.This affects: ZXHN H168N V3.5.0_EG1T5_TE, V2.5.5, ZXHN H108N V2.5.5_BTMT1
|
[] | null | 6.5 | null | null | null |
|
CVE-2019-10408
|
A cross-site request forgery vulnerability in Jenkins Project Inheritance Plugin 2.0.0 and earlier allowed attackers to trigger project generation from templates.
|
[
"cpe:2.3:a:jenkins:project_inheritance:*:*:*:*:*:jenkins:*:*"
] | null | 4.3 | null | 4.3 | null |
|
GHSA-56rc-gpxm-rv3v
|
Cross-site scripting (XSS) vulnerability in File Sharing Notify Toast in Synology Drive before 1.0.2-10275 allows remote authenticated users to inject arbitrary web script or HTML via the malicious file name.
|
[] | null | null | 5.4 | null | null |
|
GHSA-wcmp-q6x5-gv25
|
SQL injection vulnerability in index.php in Ovidentia 6.6.5 allows remote attackers to execute arbitrary SQL commands via the item parameter in a contact modify action.
|
[] | null | null | null | null | null |
|
GHSA-9q34-p9w7-3f57
|
The Best WordPress Gallery Plugin – FooGallery plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.4.26. This makes it possible for authenticated attackers, with contributor level or higher to read the contents of arbitrary folders on the server, which can contain sensitive information such as folder structure.
|
[] | null | 7.7 | null | null | null |
|
CVE-2025-47780
|
cli_permissions.conf: deny option does not work for disallowing shell commands
|
Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk, trying to disallow shell commands to be run via the Asterisk command line interface (CLI) by configuring `cli_permissions.conf` (e.g. with the config line `deny=!*`) does not work which could lead to a security risk. If an administrator running an Asterisk instance relies on the `cli_permissions.conf` file to work and expects it to deny all attempts to execute shell commands, then this could lead to a security vulnerability. Versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk fix the issue.
|
[] | 4.8 | null | null | null | null |
GHSA-7h6h-gqjm-2r96
|
The IATA (ata) driver in FreeBSD 6.0 and 8.0, when read access to /dev is available, allows local users to cause a denial of service (kernel panic) via a certain IOCTL request with a large count, which triggers a malloc call with a large value.
|
[] | null | null | null | null | null |
|
CVE-1999-1031
|
counter.exe 2.70 allows a remote attacker to cause a denial of service (hang) via a long argument.
|
[
"cpe:2.3:a:behold_software:web_page_counter:2.7:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-g9cc-xw8r-hj44
|
Stack-based buffer overflow in Foxit Reader 3.0 before Build 1506, including 1120 and 1301, allows remote attackers to execute arbitrary code via a long (1) relative path or (2) absolute path in the filename argument in an action, as demonstrated by the "Open/Execute a file" action.
|
[] | null | null | null | null | null |
|
RHSA-2024:2731
|
Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (python-django) security update
|
Django: denial-of-service in ``intcomma`` template filter
|
[
"cpe:/a:redhat:openstack:17.1::el9"
] | null | 7.5 | null | null | null |
CVE-2008-4974
|
rrdedit in netmrg 0.20 allows local users to overwrite arbitrary files via a symlink attack on (1) /tmp/*.xml and (2) /tmp/*.backup temporary files.
|
[
"cpe:2.3:a:netmrg:netmrg:0.20:*:*:*:*:*:*:*"
] | null | null | null | 6.9 | null |
|
GHSA-4339-x2hw-2985
|
Backup Manager 0.5.8a creates temporary files insecurely, which allows local users to conduct unauthorized file operations when a user is burning a CDR.
|
[] | null | null | null | null | null |
|
CVE-2024-12422
|
Import Eventbrite Events <= 1.7.4 - Reflected Cross-Site Scripting
|
The Import Eventbrite Events plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'page' parameter in all versions up to, and including, 1.7.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[] | null | 6.1 | null | null | null |
CVE-2008-1024
|
Apple Safari before 3.1.1, when running on Windows XP or Vista, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a file download with a crafted file name, which triggers memory corruption.
|
[
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2024-3800
|
XSS in S@M CMS
|
Sites managed in S@M CMS (Concept Intermedia) might be vulnerable to Reflected XSS via including scripts in requested file names.
Only a part of observed services is vulnerable, but since vendor has not investigated the root problem, it is hard to determine when the issue appears.
|
[
"cpe:2.3:a:conceptintermedia:s\\@m_cms:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
CVE-2022-4774
|
Bit Form < 1.9 - RCE via Unauthenticated Arbitrary File Upload
|
The Bit Form WordPress plugin before 1.9 does not validate the file types uploaded via it's file upload form field, allowing unauthenticated users to upload arbitrary files types such as PHP or HTML files to the server, leading to Remote Code Execution.
|
[
"cpe:2.3:a:bitapps:bit_form:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | null | null |
CVE-2018-14292
|
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF documents. By manipulating a document's elements, an attacker can cause a pointer to be reused after it has been freed. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-6232.
|
[
"cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
RHSA-2021:4839
|
Red Hat Security Advisory: mailman:2.1 security update
|
mailman: CSRF token derived from admin password allows offline brute-force attack mailman: CSRF token bypass allows to perform CSRF attacks and account takeover
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8 | null | null | null |
CVE-2020-6875
|
A ZTE product is impacted by the improper access control vulnerability. Due to lack of an authentication protection mechanism in the program, attackers could use this vulnerability to gain access right through brute-force attacks. This affects: <ZXONE 19700 SNPE><ZXONE8700V1.40R2B13_SNPE>
|
[
"cpe:2.3:o:zte:zxone_19700_snpe_firmware:zxone8700v1.40r2b13_snpe:*:*:*:*:*:*:*",
"cpe:2.3:h:zte:zxone_19700_snpe:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 5 | null |
|
GHSA-pxcv-8qw9-hg5h
|
An issue was discovered in Joomla! before 3.9.6. The debug views of com_users do not properly escape user supplied data, which leads to a potential XSS attack vector.
|
[] | null | null | null | null | null |
|
GHSA-8hmm-58xr-mxjc
|
The Add Subtitle WordPress plugin through 1.1.0 does not sanitise or escape the sub-title field (available only with classic editor) when output in the page, which could allow users with a role as low as contributor to perform Cross-Site Scripting attacks
|
[] | null | 5.4 | null | null | null |
|
GHSA-jfv5-v5gm-jvgm
|
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository hamza417/inure prior to build92.
|
[] | null | null | 7.9 | null | null |
|
GHSA-qvh7-2qrg-6v75
|
CertificatePinner.java in OkHttp 3.x through 3.12.0 allows man-in-the-middle attackers to bypass certificate pinning by changing SSLContext and the boolean values while hooking the application.
|
[] | null | null | 5.9 | null | null |
|
GHSA-jxh4-j45j-4gp9
|
The decode_choice function in net/netfilter/nf_conntrack_h323_asn1.c in the Linux kernel before 2.6.20.15, 2.6.21.x before 2.6.21.6, and before 2.6.22 allows remote attackers to cause a denial of service (crash) via an encoded, out-of-range index value for a choice field, which triggers a NULL pointer dereference.
|
[] | null | null | null | null | null |
|
GHSA-4c87-gg2q-fc6m
|
Malicious Package in rc-calendar-jhorst
|
Version 8.4.3 of `rc-calendar-jhorst` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`RecommendationIf version 8.4.3 of this module is found installed you will want to replace it with a version before or after 8.4.3. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.Users may consider downgrading to version 8.4.2
|
[] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.