id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
GHSA-93j6-jcjw-3rwp
Jenkins Sensedia API Platform Plugin vulnerability exposes unencrypted tokens in its global configuration file
Jenkins Sensedia Api Platform tools Plugin 1.0 stores the Sensedia API Manager integration token unencrypted in its global configuration file `com.sensedia.configuration.SensediaApiConfiguration.xml` on the Jenkins controller as part of its configuration.This token can be viewed by users with access to the Jenkins controller file system.Additionally, the global configuration form does not mask the token, increasing the potential for attackers to observe and capture it.As of publication of this advisory, there is no fix.
[]
null
4.3
null
null
null
CVE-2023-2152
SourceCodester Student Study Center Desk Management System index.php file inclusion
A vulnerability has been found in SourceCodester Student Study Center Desk Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file index.php. The manipulation of the argument page leads to file inclusion. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226273 was assigned to this vulnerability.
[ "cpe:2.3:a:student_study_center_desk_management_system_project:student_study_center_desk_management_system:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oretnom23:student_study_center_desk_management_system:1.0:*:*:*:*:*:*:*" ]
null
5.3
5.3
5
null
CVE-2023-40221
Socomec MOD3GP-SY-120K Code Injection
The absence of filters when loading some sections in the web application of the vulnerable device allows potential attackers to inject malicious code that will be interpreted when a legitimate user accesses the web section (MAIL SERVER) where the information is displayed. Injection can be done on parameter MAIL_RCV. When a legitimate user attempts to review NOTIFICATION/MAIL SERVER, the injected code will be executed.
[ "cpe:2.3:o:socomec:modulys_gp_firmware:01.12.10:*:*:*:*:*:*:*", "cpe:2.3:h:socomec:modulys_gp:-:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2019-0596
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0595, CVE-2019-0597, CVE-2019-0598, CVE-2019-0599, CVE-2019-0625.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
null
CVE-2015-5892
Siri in Apple iOS before 9 allows physically proximate attackers to bypass an intended client-side protection mechanism and obtain sensitive content-notification information by listening to a device in the lock-screen state.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
GHSA-gcpp-x4q3-5pfh
SAP Enterprise Portal - versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. This attack can be used to non-permanently deface or modify portal content. The execution of script content by a victim registered on the portal could compromise the confidentiality and integrity of victim?s web browser session.
[]
null
6.1
null
null
null
CVE-2024-23664
A URL redirection to untrusted site ('open redirect') in Fortinet FortiAuthenticator version 6.6.0, version 6.5.3 and below, version 6.4.9 and below may allow an attacker to to redirect users to an arbitrary website via a crafted URL.
[ "cpe:2.3:a:fortinet:fortiauthenticator:6.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiauthenticator:6.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiauthenticator:6.6.0:*:*:*:*:*:*:*" ]
null
5.8
null
null
null
GHSA-c52r-r6j6-x3c5
IBM Cloud Pak System 2.3.3.6, 2.3.36 iFix1, 2.3.3.6 iFix2, 2.3.3.7, 2.3.3.7 iFix1, and 2.3.4.0 could disclose sensitive information about the system that could aid in further attacks against the system.
[]
null
5.3
null
null
null
CVE-2022-44451
A use of uninitialized pointer vulnerability exists in the MSI format atom functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
[ "cpe:2.3:a:openbabel:open_babel:3.1.1:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
RHSA-2015:0720
Red Hat Security Advisory: Red Hat JBoss Fuse Service Works 6.0.0 security update
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix OpenJDK: XML parsing Denial of Service (JAXP, 8017298) JSF: XSS due to insufficient escaping of user-supplied content in outputText tags and EL expressions PicketBox/JBossSX: Unauthorized access to and modification of application server configuration and state by application Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs Tomcat/JBossWeb: Request smuggling via malicious content length header Tomcat/JBossWeb: XML parser hijack by malicious web application netty: DoS via memory exhaustion during data aggregation Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter Security: Invalid EJB caller role check implementation JAX-RS: Information disclosure via XML eXternal Entity (XXE) RESTEasy: XXE via parameter entities PicketLink: XXE via insecure DocumentBuilderFactory usage Validator: JSM bypass via ReflectionHelper CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix Framework: Directory traversal Framework: directory traversal flaw
[ "cpe:/a:redhat:jboss_fuse_service_works:6.0" ]
null
null
4.8
null
null
CVE-2016-0223
Cross-site scripting (XSS) vulnerability in the Webform Framework API in IBM Forms Server 4.0.x, 8.0.x, 8.1, and 8.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. IBM X-Force ID: 110006.
[ "cpe:2.3:a:ibm:forms_server:4.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:forms_server:8.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:forms_server:8.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:forms_server:8.1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:forms_server:8.2.0.0:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
CVE-2020-36048
Engine.IO before 4.0.0 allows attackers to cause a denial of service (resource consumption) via a POST request to the long polling transport.
[ "cpe:2.3:a:socket:engine.io:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
GHSA-gg68-xh96-g8xv
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Performance Schema). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[]
null
4.9
null
null
null
GHSA-736r-93pp-2mvh
Deserialization of Untrusted Data vulnerability in Nazmul Hasan Robin NHR Options Table Manager allows Object Injection. This issue affects NHR Options Table Manager: from n/a through 1.1.2.
[]
null
7.2
null
null
null
CVE-2023-23300
The `Toybox.Cryptography.Cipher.initialize` API method in CIQ API version 3.0.0 through 4.1.7 does not validate its parameters, which can result in buffer overflows when copying data. A malicious application could call the API method with specially crafted parameters and hijack the execution of the device's firmware.
[ "cpe:2.3:a:garmin:connect-iq:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2010-0215
ActiveCollab before 2.3.2 allows remote authenticated users to bypass intended access restrictions, and (1) delete an attachment or (2) subscribe to an object, via a crafted URL.
[ "cpe:2.3:a:activecollab:activecollab:*:*:*:*:*:*:*:*" ]
null
null
null
6
null
GHSA-h5v6-xmpc-c8mf
Cross-site scripting (XSS) vulnerability in display.php in Simple Machines Forum (SMF) 1.1 Final and earlier allows remote attackers to inject arbitrary web script or HTML via the contents of a file that is uploaded with the image parameter set, which can be interpreted as script by Internet Explorer's automatic type detection.
[]
null
null
null
null
null
CVE-2024-32636
A vulnerability has been identified in JT2Go (All versions < V2312.0005), Teamcenter Visualization V14.2 (All versions < V14.2.0.12), Teamcenter Visualization V14.3 (All versions < V14.3.0.10), Teamcenter Visualization V2312 (All versions < V2312.0005). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process.
[ "cpe:2.3:a:siemens:parasolid:35.1:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:parasolid:36.0:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:parasolid:36.1:*:*:*:*:*:*:*" ]
7.3
7.8
null
null
null
CVE-2024-1921
osuuu LightPicture Setup.php unrestricted upload
A vulnerability, which was classified as critical, was found in osuuu LightPicture up to 1.2.2. Affected is an unknown function of the file /app/controller/Setup.php. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-254856.
[ "cpe:2.3:a:osuuu:lightpicture:*:*:*:*:*:*:*:*" ]
null
4.7
4.7
5.8
null
GHSA-5rxw-3g54-w95p
Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Edge Memory Corruption Vulnerability," a different vulnerability than CVE-2016-0155 and CVE-2016-0157.
[]
null
null
7.5
null
null
CVE-2021-29862
IBM AIX 7.1, 7.2, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX kernel to cause a denial of service. IBM X-Force ID: 206086.
[ "cpe:2.3:a:ibm:vios:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:7.2:*:*:*:*:*:*:*" ]
null
null
6.2
null
null
CVE-2023-37600
Office Suite Premium Version v10.9.1.42602 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the id parameter at /api?path=profile.
[ "cpe:2.3:a:mobisystems:office_suite:10.9.1.42602:*:*:*:premium:iphone_os:*:*" ]
null
6.1
null
null
null
GHSA-v744-vp6m-fvh3
I-gear 3.5.7 and earlier does not properly process log entries in which a URL is longer than 255 characters, which allows an attacker to cause reporting errors.
[]
null
null
null
null
null
GHSA-vwqm-2h3p-mfwj
Passage Drive versions v1.4.0 to v1.5.1.0 and Passage Drive for Box version v1.0.0 contain an insufficient data verification vulnerability for interprocess communication. By running a malicious program, an arbitrary OS command may be executed with LocalSystem privilege of the Windows system where the product is running.
[]
null
7.8
null
null
null
ICSA-17-215-01
Schneider Electric Pro-face GP-Pro EX
An attacker is able to force the process to load an arbitrary DLL and execute arbitrary code in the context of the process.CVE-2017-9961 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is (AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:H).
[]
null
null
7.2
null
null
GHSA-4x47-rpv4-q68v
Unrestricted file upload vulnerability in admintools/editpage-2.php in Agoko CMS 0.4 and earlier allows remote attackers to inject and execute arbitrary PHP code via the filename and text parameters.
[]
null
null
null
null
null
CVE-2019-5181
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O-Check’ functionality of WAGO PFC 200 Firmware version 03.02.02(14). A specially crafted XML cache file written to a specific location on the device can cause a stack buffer overflow, resulting in code execution. An attacker can send a specially crafted packet to trigger the parsing of this cache file. The destination buffer sp+0x440 is overflowed with the call to sprintf() for any subnetmask values that are greater than 1024-len(‘/etc/config-tools/config_interfaces interface=X1 state=enabled subnet-mask=‘) in length. A subnetmask value of length 0x3d9 will cause the service to crash.
[ "cpe:2.3:o:wago:pfc200_firmware:03.02.02\\(14\\):*:*:*:*:*:*:*", "cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
null
CVE-2021-1015
In getMeidForSlot of PhoneInterfaceManager.java, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-186530496
[ "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*" ]
null
3.3
null
2.1
null
CVE-2016-10995
The Tevolution plugin before 2.3.0 for WordPress has arbitrary file upload via single_upload.php or single-upload.php.
[ "cpe:2.3:a:templatic:telvolution:*:*:*:*:*:wordpress:*:*" ]
null
9.8
null
7.5
null
CVE-2023-42754
Kernel: ipv4: null pointer dereference in ipv4_send_dest_unreach()
A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime", "cpe:/o:redhat:enterprise_linux:8::baseos", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/a:redhat:enterprise_linux:9::nfv", "cpe:/a:redhat:enterprise_linux:9::realtime", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos", "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:6", "cpe:/o:redhat:enterprise_linux:7", "cpe:/o:redhat:enterprise_linux:9" ]
null
5.5
null
null
null
GHSA-7qhq-gcwc-xffw
Integer signedness error in the vwr_read_rec_data_ethernet function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.2 allows user-assisted remote attackers to execute arbitrary code via a crafted packet-trace file that triggers a buffer overflow.
[]
null
null
null
null
null
GHSA-33gw-pvgj-248f
A vulnerability classified as problematic was found in codelyfe Stupid Simple CMS up to 1.2.4. Affected by this vulnerability is an unknown functionality of the file /file-manager/rename.php. The manipulation of the argument oldName leads to path traversal: '../filedir'. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-248689 was assigned to this vulnerability.
[]
null
4.3
null
null
null
CVE-2016-8650
The mpi_powm function in lib/mpi/mpi-pow.c in the Linux kernel through 4.8.11 does not ensure that memory is allocated for limb data, which allows local users to cause a denial of service (stack memory corruption and panic) via an add_key system call for an RSA key with a zero exponent.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
null
5.5
4.9
null
GHSA-xr8h-99r6-56hg
SQL injection vulnerability in index.php in My PHP Baseball Stats (MyPBS) allows remote attackers to execute arbitrary SQL commands via the seasonID parameter.
[]
null
null
null
null
null
CVE-2008-6607
Cross-site scripting (XSS) vulnerability in view.php in MatPo Link 1.2 Beta allows remote attackers to inject arbitrary web script or HTML via the thema parameter.
[ "cpe:2.3:a:matpo:matpo_link:1.2:beta:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2023-28052
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
[ "cpe:2.3:o:dell:alienware_area_51m_r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_area_51m_r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_area_51m_r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_area_51m_r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r11_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r11:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r12_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r12:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r13_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r13:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r15_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r15:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m15_r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m15_r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m15_r3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m15_r3:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m15_r4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m15_r4:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m15_r6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m15_r6:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m15_r7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m15_r7:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m16_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m16:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m17_r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m17_r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m17_r3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m17_r3:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m17_r4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m17_r4:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x14_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x14:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x15_r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x15_r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x15_r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x15_r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x17_r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x17_r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x17_r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x17_r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3900:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3901_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3901:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3910_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3910:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3911_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3911:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3980_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3980:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3988_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3988:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3990_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3990:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3991_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3991:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g15_5510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g15_5510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g15_5511_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g15_5511:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g15_5520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g15_5520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g15_5530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g15_5530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g16_7620_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g16_7620:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g3_15_3590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g3_15_3590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g3_3500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g3_3500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g3_3579_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g3_3579:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g3_3779_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g3_3779:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g5_15_5500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g5_15_5500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g5_15_5590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g5_15_5590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g5_5000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g5_5000:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g5_5090_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g5_5090:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g7_15_7500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g7_15_7500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g7_15_7590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g7_15_7590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g7_17_7700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g7_17_7700:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g7_17_7790_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g7_17_7790:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5820_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5820_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7820_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7820_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7920_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7920_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:embedded_box_pc_5000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:embedded_box_pc_5000:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_13_5330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_13_5330:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_14_5410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_14_5410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_14_5418_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_14_5418:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_14_5430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_14_5430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_14_7430_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_14_7430_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_14_plus_7420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_14_plus_7420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_15_3511_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_15_3511:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_15_5510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_15_5510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_15_5518_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_15_5518:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_16_5630_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_16_5630:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_16_7620_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_16_7620_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_16_7630_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_16_7630_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_16_plus_7620_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_16_plus_7620:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_24_5410_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_24_5410_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_24_5420_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_24_5420_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_24_5421_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_24_5421_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_27_7720_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_27_7720_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3020_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3020:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3020s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3020s:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3280_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3280:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3470:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3471_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3471:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3481_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3481:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3482_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3482:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3493_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3493:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3501:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3502_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3502:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3511_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3511:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3521_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3521:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3581_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3581:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3582_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3582:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3583_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3583:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3584_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3584:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3593_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3593:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3670_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3670:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3671_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3671:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3780_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3780:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3781_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3781:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3782_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3782:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3790_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3790:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3793_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3793:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3880_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3880:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3881_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3881:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3891_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3891:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3910_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3910:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5301_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5301:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5320:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5391_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5391:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5400_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5400_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5401_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5401:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5401_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5401_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5402_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5402:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5406_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5406_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5408_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5408:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5409_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5409:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5481_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5481_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5490_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5490_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5491_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5491_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5493_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5493:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5494_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5494:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5498_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5498:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5501:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5502_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5502:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5508_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5508:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5509_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5509:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5570_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5570:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5591_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5591_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5593_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5593:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5594_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5594:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5598_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5598:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5620_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5620:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5770_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5770:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7000:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7300_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7300_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7306_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7306_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7391_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7391:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7500_2-in-1_black_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7500_2-in-1_black:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7500_2-in-1_silver_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7500_2-in-1_silver:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7501:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7506_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7506_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7591_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7591:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7610_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7610:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7700_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7700_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7706_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7706_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7710_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7710:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7790_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7790:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7791_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7791:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5491_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5491_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_12_rugged_extreme_7214_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_12_rugged_extreme_7214:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_13_3380_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_13_3380:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_14_rugged_5414_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_14_rugged_5414:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3120_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3120:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3140_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3140:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3180_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3180:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3189_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3189:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3190_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3190:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3190_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3190_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3301_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3301:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3310_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3310_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3320:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3330:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3390_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3390_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5280_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5280:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5285_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5285_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5288_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5288:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5289_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5289:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5290_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5290:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5290_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5290_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5300_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5300_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5310_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5310_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5320:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5330:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5401_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5401:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5411_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5411:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5420_rugged_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5420_rugged:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5424_rugged_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5424_rugged:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5488_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5488:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5491_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5491:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5501:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5511_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5511:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5521_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5521:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5531_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5531:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5591_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5591:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7200_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7200_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7210_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7210_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7212_rugged_extreme_tablet_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7212_rugged_extreme_tablet:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7230_rugged_extreme_tablet_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7230_rugged_extreme_tablet:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7280_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7280:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7285_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7285_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7290_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7290:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7320_detachable_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7320_detachable:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7330:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7380_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7380:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7389_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7389:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7390_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7390:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7390_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7390_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7400_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7400_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7414_rugged_extreme_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7414_rugged_extreme:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7424_rugged_extreme_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7424_rugged_extreme:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9330:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_rugged_5430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_rugged_5430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_rugged_7220_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_rugged_7220:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_rugged_7220ex_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_rugged_7220ex:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_rugged_7330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_rugged_7330:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5421_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5421:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3000:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3000_thin_client_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3000_thin_client:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3050_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3050:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3050_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3050_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3060_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3060:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3070_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3070:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3080_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3080:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3090_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3090:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3090_ultra_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3090_ultra:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3280_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3280_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5000:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5050_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5050:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5060_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5060:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5070_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5070:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5080_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5080:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5090_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5090:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5250:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5260_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5260_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5270_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5270_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5480_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5480_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5490_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5490_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7000:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7000_oem_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7000_oem:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7050_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7050:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7060_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7060:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7070_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7070:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7070_ultra_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7070_ultra:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7071_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7071:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7080_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7080:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7090_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7090:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7090_ultra_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7090_ultra:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7450_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7450:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7460_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7460_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7470_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7470_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7480_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7480_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7490_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7490_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7760_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7760_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7770_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7770_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7780_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7780_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7410_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7410_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_small_form_factor_plus_7010_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_small_form_factor_plus_7010:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_tower_plus_7010_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_tower_plus_7010:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_xe3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_xe3:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3240_compact_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3240_compact:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3420_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3420_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3430_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3430_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3431_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3431_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3440_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3440:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3450_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3450:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3460_small_form_factor_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3460_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3540_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3540:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3541_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3541:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3550:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3551_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3551:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3560_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3560:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3561_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3561:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3570_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3570:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3571_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3571:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3620_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3620_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3630_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3630_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3640_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3640_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3650_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3650_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3660_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3660:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3930_rack_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3930_rack:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5470:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5530_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5530_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5540_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5540:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5550:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5560_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5560:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5570_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5570:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5720_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5720_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5750:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5760_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5760:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5770_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5770:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7540_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7540:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7560_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7560:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7670_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7670:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7710_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7710:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7720_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7720:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7730_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7730:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7740_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7740:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7760_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7760:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7770_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7770:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7865_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7865_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_16_5630_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_16_5630:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3020_sff_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3020_sff:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3020_t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3020_t:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3070_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3070:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3267_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3267:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3268_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3268:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3401_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3401:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3470:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3471_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3471:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3481_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3481:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3501:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3581_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3581:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3582_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3582:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3583_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3583:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3584_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3584:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3667_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3667:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3668_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3668:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3669_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3669:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3670_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3670:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3671_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3671:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3681_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3681:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3690_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3690:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3710_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3710:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3881_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3881:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3888_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3888:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3890_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3890:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3910_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3910:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5090_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5090:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5301_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5301:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5320:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5391_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5391:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5401_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5401:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5402_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5402:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5491_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5491:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5501:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5502_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5502:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5591_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5591:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5620_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5620:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5880_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5880:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5890_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5890:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_7500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_7500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_7510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_7510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_7590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_7590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_7620_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_7620:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:wyse_5070_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:wyse_5070:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:wyse_5470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:wyse_5470:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:wyse_5470_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:wyse_5470_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:wyse_7040_thin_client_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:wyse_7040_thin_client:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9305_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9305:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_7390_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_7390:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_7390_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_7390_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9310_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9310_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9315_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9315:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9315_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9315_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9320:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9380_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9380:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_15_7590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_15_7590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_15_9500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_15_9500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_15_9510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_15_9510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_15_9520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_15_9520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_15_9530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_15_9530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_15_9575_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_15_9575_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_17_9700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_17_9700:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_17_9710_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_17_9710:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_17_9720_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_17_9720:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_17_9730_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_17_9730:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_8940_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_8940:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_8950_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_8950:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_8960_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_8960:-:*:*:*:*:*:*:*" ]
null
5.1
null
null
null
CVE-2021-20044
A post-authentication remote command injection vulnerability in SonicWall SMA100 allows a remote authenticated attacker to execute OS system commands in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.
[ "cpe:2.3:o:sonicwall:sma_200_firmware:10.2.0.8-37sv:*:*:*:*:*:*:*", "cpe:2.3:o:sonicwall:sma_200_firmware:10.2.1.1-19sv:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:sma_200:-:*:*:*:*:*:*:*", "cpe:2.3:o:sonicwall:sma_210_firmware:10.2.0.8-37sv:*:*:*:*:*:*:*", "cpe:2.3:o:sonicwall:sma_210_firmware:10.2.1.1-19sv:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:sma_210:-:*:*:*:*:*:*:*", "cpe:2.3:o:sonicwall:sma_410_firmware:10.2.0.8-37sv:*:*:*:*:*:*:*", "cpe:2.3:o:sonicwall:sma_410_firmware:10.2.1.1-19sv:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:sma_410:-:*:*:*:*:*:*:*", "cpe:2.3:o:sonicwall:sma_400_firmware:10.2.0.8-37sv:*:*:*:*:*:*:*", "cpe:2.3:o:sonicwall:sma_400_firmware:10.2.1.1-19sv:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:sma_400:-:*:*:*:*:*:*:*", "cpe:2.3:o:sonicwall:sma_500v_firmware:10.2.0.8-37sv:*:*:*:*:*:*:*", "cpe:2.3:o:sonicwall:sma_500v_firmware:10.2.1.1-19sv:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:sma_500v:-:*:*:*:*:*:*:*" ]
null
8.8
null
9
null
GHSA-pw25-f75r-pm2r
Multiple cross-site scripting (XSS) vulnerabilities in pblguestbook.php in PBL Guestbook 1.31 allow remote attackers to inject arbitrary web script or HTML via javascript in the SRC attribute of IMG tags in the (1) name, (2) email, and (3) website parameter, which bypasses XSS protection mechanisms that check for SCRIPT tags but not IMG. NOTE: portions of this description's details are obtained from third party information.
[]
null
null
null
null
null
RHSA-2004:172
Red Hat Security Advisory: mc security update
security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
null
CVE-2020-1928
An information disclosure vulnerability was found in Apache NiFi 1.10.0. The sensitive parameter parser would log parsed values for debugging purposes. This would expose literal values entered in a sensitive property when no parameter was present.
[ "cpe:2.3:a:apache:nifi:1.10.0:*:*:*:*:*:*:*" ]
null
5.3
null
5
null
GHSA-3xfh-c7qq-jpr6
In UpdateLoadElement of ic.cc, there is a possible out-of-bounds write due to type confusion. This could lead to remote code execution in the proxy auto-config with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9 Android ID: A-117607414
[]
null
null
null
null
null
CVE-2025-8115
PHPGurukul Taxi Stand Management System new-autoortaxi-entry-form.php cross site scripting
A vulnerability has been found in PHPGurukul Taxi Stand Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/new-autoortaxi-entry-form.php. The manipulation of the argument registrationnumber/licensenumber leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
[]
5.1
3.5
3.5
4
null
GHSA-hgfm-c2w9-5xf5
HTTP File Server (HFS) before 2.2c tags HTTP request log entries with the username sent during HTTP Basic Authentication, regardless of whether authentication succeeded, which might make it more difficult for an administrator to determine who made a remote request.
[]
null
null
null
null
null
GHSA-jh7c-xh74-h76f
Salt has minion event bus authorization bypass vulnerability
Minion event bus authorization bypass. An attacker with access to a minion key can craft a message which may be able to execute a job on other minions (>= 3007.0).
[]
null
8.1
null
null
null
GHSA-3w7p-3w6w-7fpg
An issue in the communication protocol of Tormach xsTECH CNC Router, PathPilot Controller v2.9.6 allows attackers to cause a Denial of Service (DoS) via crafted commands.
[]
null
5.3
null
null
null
ICSA-20-175-01
Mitsubishi Electric MELSEC iQ-R, iQ-F, Q, L and FX Series CPU Modules (Update A)
There is a vulnerability due to cleartext communication between Mitsubishi Electric MELSEC iQ-R, iQ-F, Q, L, and FX series CPU modules, and GX Works3/GX Works2. There are risks of communication data eavesdropping/tampering, unauthorized operation, and denial-of-service (DoS) attacks from attackers. CVE-2020-5594 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).. --------- End Update A Part 1 of 2 ---------CVE-2020-5594 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
[]
null
null
10
null
null
CVE-2022-25331
Uncaught exceptions that can be generated in Trend Micro ServerProtection 6.0/5.8 Information Server could allow a remote attacker to crash the process.
[ "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:emc:*:*", "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:netware:*:*", "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:windows:*:*", "cpe:2.3:a:trendmicro:serverprotect_for_network_appliance_filer:5.8:*:*:*:*:*:*:*", "cpe:2.3:a:trendmicro:serverprotect_for_storage:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
RHSA-2018:2949
Red Hat Security Advisory: rh-nodejs8-nodejs security update
nodejs: HTTP parser allowed for spaces inside Content-Length header values nodejs: Inspector DNS rebinding vulnerability nodejs: denial of service (DoS) by causing a node server providing an http2 server to crash nodejs: Denial of Service by calling Buffer.fill() or Buffer.alloc() with specially crafted parameters nodejs: Out of bounds (OOB) write via UCS-2 encoding
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
8.1
null
null
CVE-2022-35754
Unified Write Filter Elevation of Privilege Vulnerability
Unified Write Filter Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_20h2:-:*:*:*:*:*:*:*" ]
null
6.7
null
null
null
GHSA-83j2-qhx2-p7jc
PrestaShop blockreassurance BO User can remove any file from server when adding a and deleting a block
ImpactWhen adding a block in blockreassurance module, a BO user can modify the http request and give the path of any file in the project instead of an image. When deleting the block from the BO, the file will be deleted.It is possible to make the website completely unavailable by removing index.php for example.Patchesv5.1.4WorkaroundsNo workaround availableReferences
[]
null
5.5
null
null
null
CVE-2023-47556
WordPress Device Theme Switcher Plugin <= 3.0.2 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in James Mehorter Device Theme Switcher.This issue affects Device Theme Switcher: from n/a through 3.0.2.
[ "cpe:2.3:a:jamesmehorter:device_theme_switcher:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
null
GHSA-vcvf-4v9h-qc3q
A vulnerability, which was classified as critical, was found in D-Link DIR-605L 2.13B01 BETA. This affects the function formSetEnableWizard of the file /goform/formSetEnableWizard. The manipulation of the argument curTime leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
8.7
8.8
null
null
null
GHSA-f6vc-5hqq-c3x2
Cross-Site Request Forgery (CSRF) vulnerability in Ref CheckBot allows Stored XSS.This issue affects CheckBot: from n/a through 1.05.
[]
null
7.1
null
null
null
GHSA-6g87-ff9q-v847
websockets is vulnerable to denial of service by memory exhaustion
The Python websockets library version 4 contains a CWE-409: Improper Handling of Highly Compressed Data (Data Amplification) vulnerability in Servers and clients, unless configured with compression=None that can result in Denial of Service by memory exhaustion. This attack appears to be exploitable via sending a specially crafted frame on an established connection. This vulnerability appears to have been fixed in version 5.0
[]
8.7
null
7.5
null
null
GHSA-x52j-3x33-rx5c
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8120, CVE-2018-8124, CVE-2018-8164.
[]
null
null
7
null
null
GHSA-5m98-v5jj-6cv6
xtreme1 <= v0.9.1 contains a Server-Side Request Forgery (SSRF) vulnerability in the /api/data/upload path. The vulnerability is triggered through the fileUrl parameter, which allows an attacker to make arbitrary requests to internal or external systems.
[]
null
6.1
null
null
null
CVE-2025-27211
An Improper Input Validation in EdgeMAX EdgeSwitch (Version 1.10.4 and earlier) could allow a Command Injection by a malicious actor with access to EdgeSwitch adjacent network.
[]
null
7.5
null
null
null
CVE-2008-3515
Multiple cross-site scripting (XSS) vulnerabilities in files generated by Adobe Presenter 6 and 7 before 7.0.1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving (1) viewer.swf and (2) loadflash.js, a different vulnerability than CVE-2008-3516.
[ "cpe:2.3:a:adobe:presenter:6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:presenter:7:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2008-3325
Cross-site request forgery (CSRF) vulnerability in Moodle 1.6.x before 1.6.7 and 1.7.x before 1.7.5 allows remote attackers to modify profile settings and gain privileges as other users via a link or IMG tag to the user edit profile page.
[ "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*" ]
null
null
null
6
null
GHSA-94hh-hxm2-ccw5
In PackageManager, there is a possible way to get information about installed packages ignoring limitations introduced in Android 11 due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-188913056
[]
null
5.5
null
null
null
GHSA-qmpq-mwc3-g6hf
The National Payments Corporation of India BHIM application 1.3 for Android relies on a four-digit passcode, which makes it easier for attackers to obtain access.
[]
null
null
7.5
null
null
GHSA-pxgj-545m-hqc6
The YouTube Embed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘instance’ parameter in all versions up to, and including, 10.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
GHSA-cfcp-527j-53hf
A vulnerability has been found in TOTOLINK A720R 4.1.5cu.374 and classified as critical. This vulnerability affects unknown code of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument topicurl with the input RebootSystem leads to missing authentication. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
5.3
null
null
null
CVE-2021-24484
Secure Copy Content Protection and Content Locking < 2.6.7 - Authenticated Blind SQL Injections
The get_reports() function in the Secure Copy Content Protection and Content Locking WordPress plugin before 2.6.7 did not use whitelist or validate the orderby parameter before using it in SQL statements passed to the get_results() DB calls, leading to SQL injection issues in the admin dashboard
[ "cpe:2.3:a:ays-pro:secure_copy_content_protection_and_content_locking:*:*:*:*:*:wordpress:*:*" ]
null
7.2
null
6.5
null
CVE-2019-11090
Cryptographic timing conditions in the subsystem for Intel(R) PTT before versions 11.8.70, 11.11.70, 11.22.70, 12.0.45, 13.0.0 and 14.0.10; Intel(R) TXE 3.1.70 and 4.0.20; Intel(R) SPS before versions SPS_E5_04.01.04.305.0, SPS_SoC-X_04.00.04.108.0, SPS_SoC-A_04.00.04.191.0, SPS_E3_04.01.04.086.0, SPS_E3_04.08.04.047.0 may allow an unauthenticated user to potentially enable information disclosure via network access.
[ "cpe:2.3:o:intel:platform_trust_technology_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_platform_services_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:intel:trusted_execution_engine_firmware:*:*:*:*:*:*:*:*" ]
null
5.9
null
4.3
null
GHSA-44jm-p9rx-ff96
A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.The `/action/import_e2c_json_file/` API is affected by command injection vulnerability.
[]
null
7.5
null
null
null
GHSA-fvmp-m2wj-xqp8
sudo 1.6.x before 1.6.9p21, when the runas_default option is used, does not properly set group memberships, which allows local users to gain privileges via a sudo command.
[]
null
null
null
null
null
CVE-2020-8715
Invalid pointer for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable denial of service via local access.
[ "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*", "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*", "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*", "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*", "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*", "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*", "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*", "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*", "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
null
CVE-2022-25760
Arbitrary Code Injection
All versions of package accesslog are vulnerable to Arbitrary Code Injection due to the usage of the Function constructor without input sanitization. If (attacker-controlled) user input is given to the format option of the package's exported constructor function, it is possible for an attacker to execute arbitrary JavaScript code on the host that this package is being run on.
[ "cpe:2.3:a:accesslog_project:accesslog:*:*:*:*:*:*:*:*" ]
null
7.1
null
null
null
GHSA-72mw-x5mh-hqfp
Inappropriate error handling in Tribe29 Checkmk <= 2.1.0p25, <= 2.0.0p34, <= 2.2.0b3 (beta), and all versions of Checkmk 1.6.0 causes the symmetric encryption of agent data to fail silently and transmit the data in plaintext in certain configurations.
[]
null
5.3
null
null
null
GHSA-f765-58h8-hwq6
The IKEv2 client and initiator implementations in Cisco IOS 15.5(3)M and IOS XE allow remote IKEv2 servers to cause a denial of service (device reload) via crafted IKEv2 packets, aka Bug ID CSCux97540.
[]
null
null
6.5
null
null
GHSA-vff3-5vfq-9m5f
The RPC component in Windows 2000, Windows NT 4.0, and Windows XP allows remote attackers to cause a denial of service (disabled RPC service) via a malformed packet to the RPC Endpoint Mapper at TCP port 135, which triggers a null pointer dereference.
[]
null
null
null
null
null
GHSA-9mrw-5cmq-64wh
Buffer overflow in VideoSpirit Pro 1.6.8.1 and possibly earlier versions, and VideoSpirit Lite 1.4.0.1 and possibly other versions, allows user-assisted remote attackers to execute arbitrary code via a VideoSpirit project (.visprj) file containing a valitem element with a long "name" attribute. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
null
CVE-2025-5207
SourceCodester Client Database Management System superadmin_update_profile.php sql injection
A vulnerability, which was classified as critical, has been found in SourceCodester Client Database Management System 1.0. Affected by this issue is some unknown functionality of the file /superadmin_update_profile.php. The manipulation of the argument nickname/email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
5.1
4.7
4.7
5.8
null
CVE-2018-1000416
A reflected cross-site scripting vulnerability exists in Jenkins Job Config History Plugin 2.18 and earlier in all Jelly files that shows arbitrary attacker-specified HTML in Jenkins to users with Job/Configure access.
[ "cpe:2.3:a:jobconfighistory_project:jobconfighistory:*:*:*:*:*:jenkins:*:*" ]
null
null
6.1
4.3
null
CVE-2018-20569
user/index.php in Ivan Cordoba Generic Content Management System (CMS) through 2018-04-28 allows SQL injection for authentication bypass.
[ "cpe:2.3:a:generic_content_management_system_project:generic_content_management_system:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
RHBA-2021:1503
Red Hat Bug Fix Advisory: samba bug fix update
samba: Netlogon elevation of privilege vulnerability (Zerologon) samba: Missing handle permissions check in SMB1/2/3 ChangeNotify samba: Unprivileged user can crash winbind
[ "cpe:/a:redhat:storage:3.5:samba:el8" ]
null
5
null
null
null
CVE-2025-30765
WordPress FlexStock <= 3.13.1 - SQL Injection Vulnerability
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPPOOL FlexStock allows Blind SQL Injection. This issue affects FlexStock: from n/a through 3.13.1.
[]
null
7.6
null
null
null
GHSA-5g7v-g3rg-569j
ASP Product Catalog 1.0 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing user credentials via a direct request for database/aspProductCatalog.mdb.
[]
null
null
null
null
null
RHSA-2013:0733
Red Hat Security Advisory: JBoss Enterprise Portal Platform 5.2.2 security update
Portal: Cross Site Request Forgery
[ "cpe:/a:redhat:jboss_enterprise_portal_platform:5.2.2" ]
null
null
null
null
null
CVE-2024-5729
Simple AL Slider <= 1.2.10 - Reflected XSS
The Simple AL Slider WordPress plugin through 1.2.10 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
[ "cpe:2.3:a:alexdtn:simple_al_slider:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
CVE-2022-32593
In vowe, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07138493; Issue ID: ALPS07138493.
[ "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*" ]
null
6.7
null
null
null
CVE-2009-3939
The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:virtualization:5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:5.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:aura_application_enablement_services:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:aura_application_enablement_services:5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:aura_communication_manager:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:aura_session_manager:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:aura_session_manager:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:aura_sip_enablement_services:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:aura_system_manager:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:aura_system_manager:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:aura_system_platform:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:voice_portal:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*" ]
null
7.1
null
6.6
null
GHSA-48vq-44vm-p326
All versions of Econolite EOS traffic control software are vulnerable to CWE-328: Use of Weak Hash, and use a weak hash algorithm for encrypting privileged user credentials. A configuration file that is accessible without authentication uses MD5 hashes for encrypting credentials, including those of administrators and technicians.
[]
null
5.3
null
null
null
RHSA-2025:3213
Red Hat Security Advisory: kernel security update
kernel: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array
[ "cpe:/o:redhat:rhel_aus:8.6::baseos", "cpe:/o:redhat:rhel_e4s:8.6::baseos", "cpe:/o:redhat:rhel_tus:8.6::baseos" ]
null
7
null
null
null
CVE-2005-1522
The imap4d server for GNU Mailutils 0.5 and 0.6, and other versions before 0.6.90, allows authenticated remote users to cause a denial of service (CPU consumption) via a large range value in the FETCH command.
[ "cpe:2.3:a:gnu:mailutils:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:mailutils:0.6:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2020-27245
An exploitable SQL injection vulnerability exists in ‘listImmoLabels.jsp’ page of OpenClinic GA 5.173.3 application. The immoBuyer parameter in the ‘listImmoLabels.jsp’ page is vulnerable to authenticated SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
[ "cpe:2.3:a:openclinic_ga_project:openclinic_ga:5.173.3:*:*:*:*:*:*:*" ]
null
null
6.4
null
null
CVE-2023-25433
libtiff 4.5.0 is vulnerable to Buffer Overflow via /libtiff/tools/tiffcrop.c:8499. Incorrect updating of buffer size after rotateImage() in tiffcrop cause heap-buffer-overflow and SEGV.
[ "cpe:2.3:a:libtiff:libtiff:4.5.0:-:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-fm8p-vqh4-8h4g
Cisco IOS 11.x and 12.0 with ATM support allows attackers to cause a denial of service via the undocumented Interim Local Management Interface (ILMI) SNMP community string.
[]
null
null
null
null
null
CVE-2022-37396
In JetBrains Rider before 2022.2 Trust and Open Project dialog could be bypassed, leading to local code execution
[ "cpe:2.3:a:jetbrains:rider:*:*:*:*:*:*:*:*" ]
null
4.1
null
null
null
GHSA-76p6-vjx7-f4xh
Vulnerability in the Oracle Email Center component of Oracle E-Business Suite (subcomponent: Message Display). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Email Center. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Email Center, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Email Center accessible data as well as unauthorized update, insert or delete access to some of Oracle Email Center accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
[]
null
null
null
null
null
GHSA-r6f5-wq5g-9rqq
Vulnerability in the Oracle Reports Developer product of Oracle Fusion Middleware (component: Security and Authentication). Supported versions that are affected are 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Reports Developer. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Reports Developer, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Reports Developer accessible data as well as unauthorized read access to a subset of Oracle Reports Developer accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[]
null
6.1
null
null
null
GHSA-5mpx-8jmm-f3h5
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
null
5.4
null
null
null
GHSA-xhrw-4447-w35f
The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.7, macOS Sequoia 15. Processing a maliciously crafted video file may lead to unexpected app termination.
[]
null
5.5
null
null
null
CVE-2013-5841
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.51, 8.52, and 8.53 allows remote attackers to affect confidentiality via unknown vectors related to Portal, a different vulnerability than CVE-2013-5794.
[ "cpe:2.3:a:oracle:peoplesoft_products:8.51:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_products:8.52:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_products:8.53:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2015-4260
Cross-site scripting (XSS) vulnerability in Cisco Hosted Collaboration Solution 10.6(1) allows remote attackers to inject arbitrary web script or HTML via a crafted value in a URL, aka Bug ID CSCuu14862.
[ "cpe:2.3:a:cisco:hosted_collaboration_solution:10.6\\(1\\)_base:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-j9gp-7x9x-fj2q
che3vinci c3/utils-1 1.0.131 was discovered to contain a prototype pollution via the function assign. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties.
[]
null
8.1
null
null
null
GHSA-8frc-4g87-v5h6
The WP Compress – Image Optimizer [All-In-One] plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 6.10.33 via the css parameter. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
[]
null
9.1
null
null
null
GHSA-5799-w2pr-v9hg
A vulnerability in the Border Gateway Protocol (BGP) Multicast VPN (MVPN) implementation of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an affected device to unexpectedly reload, resulting in a denial of service (DoS) condition. The vulnerability is due to incomplete input validation of a specific type of BGP MVPN update message. An attacker could exploit this vulnerability by sending this specific, valid BGP MVPN update message to a targeted device. A successful exploit could allow the attacker to cause one of the BGP-related routing applications to restart multiple times, leading to a system-level restart. Note: The Cisco implementation of BGP accepts incoming BGP traffic from only explicitly configured peers. To exploit this vulnerability, an attacker must send a specific BGP MVPN update message over an established TCP connection that appears to come from a trusted BGP peer. To do so, the attacker must obtain information about the BGP peers in the trusted network of the affected system.
[]
null
null
null
null
null
GHSA-3w8m-pw3c-4478
admin/header.php in Scripteen Free Image Hosting Script 2.3 allows remote attackers to bypass authentication and gain administrative access by setting the cookgid cookie value to 1, a different vector than CVE-2008-3211.
[]
null
null
null
null
null