id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
listlengths
0
5.42k
GHSA-rm8m-fp2p-77cc
A spoofing vulnerability exists in Azure DevOps Server when it improperly handles requests to authorize applications, resulting in a cross-site request forgery, aka 'Azure DevOps Server Spoofing Vulnerability'.
[]
CVE-2013-4939
Cross-site scripting (XSS) vulnerability in io.swf in the IO Utility component in Yahoo! YUI 3.0.0 through 3.9.1, as used in Moodle through 2.1.10, 2.2.x before 2.2.11, 2.3.x before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.1, and other products, allows remote attackers to inject arbitrary web script or HTML via a crafted string in a URL.
[ "cpe:2.3:a:moodle:moodle:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:yahoo:yui:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:yahoo:yui:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:yahoo:yui:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:yahoo:yui:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:yahoo:yui:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:yahoo:yui:3.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:yahoo:yui:3.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:yahoo:yui:3.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:yahoo:yui:3.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:yahoo:yui:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:yahoo:yui:3.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:yahoo:yui:3.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:yahoo:yui:3.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:yahoo:yui:3.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:yahoo:yui:3.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:yahoo:yui:3.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:yahoo:yui:3.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:yahoo:yui:3.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:yahoo:yui:3.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:yahoo:yui:3.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:yahoo:yui:3.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:yahoo:yui:3.10.2:*:*:*:*:*:*:*" ]
CVE-2023-0684
The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_unassign_folders function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as changing the folder structure maintained by the plugin.
[ "cpe:2.3:a:wickedplugins:wicked_folders:*:*:*:*:*:wordpress:*:*" ]
CVE-2025-4172
VerticalResponse Newsletter Widget <= 1.6 - Authenticated (Contributor+) Stored Cross-Site Scripting
The VerticalResponse Newsletter Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'verticalresponse' shortcode in all versions up to, and including, 1.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
GHSA-7mc6-x925-7qvx
Test code in published microsoft-graph-beta package exposes phpinfo()
ImpactThe Microsoft Graph Beta PHP SDK published packages which contained test code that enabled the use of the phpInfo() function from any application that could access and execute the file at vendor/microsoft/microsoft-graph-beta/tests/GetPhpInfo.php. The phpInfo function exposes system information.The vulnerability affects the GetPhpInfo.php script of the PHP SDK which contains a call to the phpinfo() function.This vulnerability requires a misconfiguration of the server to be present so it can be exploited. For example, making the PHP application’s /vendor directory web accessible.The combination of the vulnerability and the server misconfiguration would allow an attacker to craft an HTTP request that executes the phpinfo() method. The attacker would then be able to get access to system information like configuration, modules, and environment variables and later on use the compromised secrets to access additional data.PatchesThis problem has been patched in dependencies of version 2.0.1.WorkaroundsIf an immediate deployment with the updated vendor package is not available, you can perform the following temporary workarounds:delete the vendor/microsoft/microsoft-graph-beta/tests/GetPhpInfo.php fileremove access to the /vendor directory will remove this vulnerabilitydisable the phpinfo functionReferencesFor more information about the vulnerability and the patch, users can refer to the following sources:https://nvd.nist.gov/vuln/detail/CVE-2023-49103https://github.com/microsoftgraph/msgraph-beta-sdk-php/compare/2.0.0...2.0.1https://github.com/microsoftgraph/msgraph-sdk-php-core/compare/2.0.1...2.0.2https://github.com/microsoftgraph/msgraph-sdk-php/compare/1.109.0...1.109.1https://owncloud.com/security-advisories/disclosure-of-sensitive-credentials-and-configuration-in-containerized-deployments/
[]
GHSA-82w9-g9wm-675r
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
[]
CVE-2014-5736
The Buy Coins (aka com.wBuyCoins) application 0.62.13364.24150 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:buycoins:buy_coins:0.62.13364.24150:*:*:*:*:android:*:*" ]
GHSA-jjv4-qpph-8548
An issue was discovered in OpenGamePanel OGP-Agent-Linux through 2021-08-14. $HOME/OGP/Cfg/Config.pm has the root password in cleartext.
[]
GHSA-rwf9-8fqr-p44m
Qualys Jenkins Plugin for Policy Compliance Cross-site Scripting vulnerability
Qualys Jenkins Plugin for Policy Compliance prior to version and including 1.0.5 was identified to be affected by a security flaw, which was missing a permission check while performing a connectivity check to Qualys Cloud Services. This allowed any user with login access and access to configure or edit jobs to utilize the plugin to configure a potential rouge endpoint via which it was possible to control response for certain request which could be injected with XSS payloads leading to XSS while processing the response data.
[]
CVE-2015-4275
The Packet Data Network Gateway (aka PGW) component on Cisco ASR 5000 devices with software 18.0.0.59167 and 18.0.0.59211 allows remote attackers to cause a denial of service via a malformed header in a GTPv2 packet, aka Bug ID CSCut11534.
[ "cpe:2.3:a:cisco:asr_5000_series_software:18.0.0.59167:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:asr_5000_series_software:18.0.0.59211:*:*:*:*:*:*:*" ]
CVE-2024-2118
Social Media Share Buttons < 2.8.9 - Admin+ Stored XSS via settings
The Social Media Share Buttons & Social Sharing Icons WordPress plugin before 2.8.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[]
GHSA-x5q7-5ch5-5m3v
In the Linux kernel, the following vulnerability has been resolved:net: stmmac: move the EST lock to struct stmmac_privReinitialize the whole EST structure would also reset the mutex lock which is embedded in the EST structure, and then trigger the following warning. To address this, move the lock to struct stmmac_priv. We also need to reacquire the mutex lock when doing this initialization.DEBUG_LOCKS_WARN_ON(lock->magic != lock) WARNING: CPU: 3 PID: 505 at kernel/locking/mutex.c:587 __mutex_lock+0xd84/0x1068 Modules linked in: CPU: 3 PID: 505 Comm: tc Not tainted 6.9.0-rc6-00053-g0106679839f7-dirty #29 Hardware name: NXP i.MX8MPlus EVK board (DT) pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __mutex_lock+0xd84/0x1068 lr : __mutex_lock+0xd84/0x1068 sp : ffffffc0864e3570 x29: ffffffc0864e3570 x28: ffffffc0817bdc78 x27: 0000000000000003 x26: ffffff80c54f1808 x25: ffffff80c9164080 x24: ffffffc080d723ac x23: 0000000000000000 x22: 0000000000000002 x21: 0000000000000000 x20: 0000000000000000 x19: ffffffc083bc3000 x18: ffffffffffffffff x17: ffffffc08117b080 x16: 0000000000000002 x15: ffffff80d2d40000 x14: 00000000000002da x13: ffffff80d2d404b8 x12: ffffffc082b5a5c8 x11: ffffffc082bca680 x10: ffffffc082bb2640 x9 : ffffffc082bb2698 x8 : 0000000000017fe8 x7 : c0000000ffffefff x6 : 0000000000000001 x5 : ffffff8178fe0d48 x4 : 0000000000000000 x3 : 0000000000000027 x2 : ffffff8178fe0d50 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: __mutex_lock+0xd84/0x1068 mutex_lock_nested+0x28/0x34 tc_setup_taprio+0x118/0x68c stmmac_setup_tc+0x50/0xf0 taprio_change+0x868/0xc9c
[]
CVE-2018-11871
Buffer overwrite can happen in WLAN function while processing set pdev parameter command due to lack of input validation in Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in version IPQ4019, IPQ8064, IPQ8074, MDM9206, MDM9607, MDM9635M, MDM9640, MDM9650, MSM8996AU, QCA6174A, QCA6564, QCA6574, QCA6574AU, QCA6584, QCA6584AU, QCA9377, QCA9378, QCA9379, QCA9531, QCA9558, QCA9563, QCA9880, QCA9886, QCA9980, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 600, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM630, SDM632, SDM636, SDM660, SDM710, SDX20, Snapdragon_High_Med_2016.
[ "cpe:2.3:o:qualcomm:ipq4019_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq4019:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8064_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8064:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8074:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6564:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6584_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6584:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9378_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9378:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9531_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9531:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9558_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9558:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9563_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9563:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9880_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9880:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9886_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9886:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9980_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9980:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_427:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_435:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_600:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_high_med_2016_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_high_med_2016:-:*:*:*:*:*:*:*" ]
GHSA-jc3m-3wcx-qq62
A vulnerability has been identified in Polarion Subversion Webclient (All versions). The web interface could allow a Cross-Site Request Forgery (CSRF) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation requires user interaction by a legitimate user, who must be authenticated to the web interface. A successful attack could allow an attacker to trigger actions via the web interface that the legitimate user is allowed to perform. This could allow the attacker to read or modify contents of the web application.
[]
CVE-2011-2120
Integer overflow in the CursorAsset x32 component in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors.
[ "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*" ]
GHSA-r24q-wpfh-2vqx
In the Linux kernel, the following vulnerability has been resolved:spufs: fix a leak in spufs_create_context()Leak fixes back in 2008 missed one case - if we are trying to set affinity and spufs_mkdir() fails, we need to drop the reference to neighbor.
[]
GHSA-xjq6-gc34-j23x
Cross-site scripting (XSS) vulnerability in search.php in Esselbach Storyteller CMS 1.8 allows remote attackers to inject arbitrary web script or HTML via the query parameter, which is used by the Search field.
[]
CVE-2025-23576
WordPress WP Intro.JS Plugin plugin <= 1.1 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP Intro.JS allows Reflected XSS. This issue affects WP Intro.JS: from n/a through 1.1.
[]
CVE-2020-13158
Artica Proxy before 4.30.000000 Community Edition allows Directory Traversal via the fw.progrss.details.php popup parameter.
[ "cpe:2.3:a:articatech:artica_proxy:*:*:*:*:community:*:*:*" ]
CVE-2022-44631
WordPress 1app Business Forms Plugin <= 1.0.0 is vulnerable to Cross Site Scripting (XSS)
Auth. (author+) Stored Cross-Site Scripting (XSS) vulnerability in 1app Technologies, Inc 1app Business Forms plugin <= 1.0.0 versions.
[ "cpe:2.3:a:1app:1app_business_forms:1.0.0:*:*:*:*:wordpress:*:*" ]
GHSA-qxcw-rf4v-hp26
Pimcore vulnerable to Cross Site Scripting in image/video thumbnail config
ImpactAn attacker can use XSS to send a malicious script to any user through Image/Video thumbnail configPatchesUpdate to version 10.5.18 or apply this patch manually https://github.com/pimcore/pimcore/pull/14472.patchWorkaroundsApply https://github.com/pimcore/pimcore/pull/14472.patch manually.Referenceshttps://huntr.dev/bounties/e8c0044d-a31b-4347-b2d5-59fbf492da39/
[]
GHSA-784m-xw5j-hrmc
Untrusted search path vulnerability in the installers of multiple SEIKO EPSON products allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
[]
GHSA-95xm-vmqm-gc9f
The Simple Alert Boxes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Alert shortcode in all versions up to, and including, 1.4.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
CVE-2011-5115
Cross-site scripting (XSS) vulnerability in DLGuard, possibly 4.6 and earlier, allows remote attackers to inject arbitrary web script or HTML via the searchCart parameter to index.php.
[ "cpe:2.3:a:dlguard:dlguard:*:*:*:*:*:*:*:*", "cpe:2.3:a:dlguard:dlguard:4.5:*:*:*:*:*:*:*" ]
CVE-2020-9931
A denial of service issue was addressed with improved input validation. This issue is fixed in iOS 13.6 and iPadOS 13.6. A remote attacker may cause an unexpected application termination.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
CVE-2022-32485
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
[ "cpe:2.3:o:dell:alienware_area_51m_r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_area_51m_r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_area_51m_r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_area_51m_r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r11_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r11:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r12_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r12:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r13_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r13:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r10_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r10:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r8:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r9:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m15_r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m15_r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m15_r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m15_r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m15_r3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m15_r3:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m15_r4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m15_r4:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m17_r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m17_r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m17_r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m17_r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m17_r3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m17_r3:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m17_r4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m17_r4:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x14_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x14:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x15_r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x15_r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x15_r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x15_r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x17_r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x17_r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x17_r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x17_r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3980_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3980:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3988_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3988:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3990_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3990:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3991_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3991:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g3_15_3590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g3_15_3590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g3_15_5590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g3_15_5590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g3_3579_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g3_3579:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g3_3779_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g3_3779:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g5_5000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g5_5000:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g5_5090_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g5_5090:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g7_17_7590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g7_17_7590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g7_17_7790_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g7_17_7790:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:edge_gateway_3000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:edge_gateway_3000:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:edge_gateway_5000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:edge_gateway_5000:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:embedded_box_pc_3000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:embedded_box_pc_3000:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:embedded_box_pc_5000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:embedded_box_pc_5000:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_14_3467_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_14_3467:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_15_2-in-1_5582_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_15_2-in-1_5582:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_15_3567_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_15_3567:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3277_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3277:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3280_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3280:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3470:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3471_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3471:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3477_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3477:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3481_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3481:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3482_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3482:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3493_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3493:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3501:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3502_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3502:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3581_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3581:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3582_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3582:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3593_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3593:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3670_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3670:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3671_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3671:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3780_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3780:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3781_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3781:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3782_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3782:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3790_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3790:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3793_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3793:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3880_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3880:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3881_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3881:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5390_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5390:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5391_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5391:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5401_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5401:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5477_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5477:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5481_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5481:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5482_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5482:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5491_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5491_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5493_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5493:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5494_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5494:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5498_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5498:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5491_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5491_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5570_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5570:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5583_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5583:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5584_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5584:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5591_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5591_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5593_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5593:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5594_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5594:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5598_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5598:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5680_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5680:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5770_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5770:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7000:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7370_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7370:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7373_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7373:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7380_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7380:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7386_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7386:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7390_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7390:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7391_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7391:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7570_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7570:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7573_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7573:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7586_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7586:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7591_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7591:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7700_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7700_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7777_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7777:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7786_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7786:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7790_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7790:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7791_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7791:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3120_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3120:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3180_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3180:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3189_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3189:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3190_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3190:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3190_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3190_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3301_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3301:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3310_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3310_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3379_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3379:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3390_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3390:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5280_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5280:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5285_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5285_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5289_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5289:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5290_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5290:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5290_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5290_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5300_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5300_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5310_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5310_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5401_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5401:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5411_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5411:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5414_rugged_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5414_rugged:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5420_rugged_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5420_rugged:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5488_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5488:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5491_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5491:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5495_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5495:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5501:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5511_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5511:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5591_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5591:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7200_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7200_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7210_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7210_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7212_rugged_extreme_tablet_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7212_rugged_extreme_tablet:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7214_rugged_extreme_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7214_rugged_extreme:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7220_rugged_extreme_tablet_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7220_rugged_extreme_tablet:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7220ex_rugged_extreme_tablet_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7220ex_rugged_extreme_tablet:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7275_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7275_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7290_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7290:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7370_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7370:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7380_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7380:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7389_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7389:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7390_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7390:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7390_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7390_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7400_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7400_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7414_rugged_extreme_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7414_rugged_extreme:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7424_rugged_extreme_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7424_rugged_extreme:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_e5270_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_e5270:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_e5470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_e5470:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_e5570_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_e5570:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_e7270_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_e7270:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_e7470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_e7470:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3040_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3040:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3046_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3046:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3050_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3050:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3050_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3050_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3060_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3060:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3070_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3070:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3080_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3080:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3090_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3090:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3280_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3280_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5050_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5050:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5055_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5055:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5060_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5060:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5070_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5070:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5080_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5080:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5260_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5260_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5480_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5480_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7040_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7040:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7050_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7050:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7060_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7060:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7070_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7070:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7070_ultra_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7070_ultra:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7071_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7071:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7080_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7080:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7450_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7450:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7460_all_in_one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7460_all_in_one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7470_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7470_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7480_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7480_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_xe3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_xe3:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3240_compact_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3240_compact:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3420_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3420_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3430_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3430_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3431_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3431_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3440_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3440:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3540_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3540:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3541_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3541:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3550:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3551_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3551:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3620_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3620_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3630_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3630_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3640_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3640_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3930_rack_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3930_rack:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5530_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5530_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5540_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5540:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5720_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5720_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5820_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5820_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7540_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7540:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7550:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7710_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7710:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7720_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7720:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7730_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7730:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7740_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7740:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7750:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7820_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7820_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7920_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7920_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3070_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3070:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3267_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3267:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3268_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3268:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3401_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3401:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3470:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3471_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3471:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3481_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3481:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3501:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3581_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3581:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3582_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3582:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3583_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3583:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3584_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3584:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3667_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3667:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3668_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3668:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3669_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3669:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3670_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3670:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3671_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3671:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3681_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3681:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3881_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3881:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3888_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3888:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5090_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5090:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5390_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5390:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5391_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5391:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5581_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5581:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5591_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5591:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5880_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5880:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_7590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_7590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:wyse_5070_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:wyse_5070:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:wyse_5470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:wyse_5470:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:wyse_5470_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:wyse_5470_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:wyse_7040_thin_client_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:wyse_7040_thin_client:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_7390_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_7390:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_7390_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_7390_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9365_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9365_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9370_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9370:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9380_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9380:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_15_7590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_15_7590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_15_9575_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_15_9575_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_7590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_7590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_8930_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_8930:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_8940_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_8940:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_8950_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_8950:-:*:*:*:*:*:*:*" ]
CVE-2019-14309
Ricoh SP C250DN 1.05 devices have a fixed password. FTP service credential were found to be hardcoded within the printer firmware. This would allow to an attacker to access and read information stored on the shared FTP folders.
[ "cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_c250dn_firmware:1.05:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*" ]
CVE-2025-0666
BOINC Server Stored XSS Injection in host_venue_action.php
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in BOINC Server allows Stored XSS.This issue affects BOINC Server: through 1.4.7.
[]
GHSA-gv3c-929j-rc7p
Cloud Foundry UAA Release, versions prior to v74.8.0, logs all query parameters to tomcat’s access file. If the query parameters are used to provide authentication, ie. credentials, then they will be logged as well.
[]
CVE-2023-5795
CodeAstro POS System Profile Picture profil unrestricted upload
A vulnerability was found in CodeAstro POS System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /profil of the component Profile Picture Handler. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-243601 was assigned to this vulnerability.
[ "cpe:2.3:a:martmbithi:pos_system:1:0:*:*:*:*:*:*" ]
CVE-2014-6525
Unspecified vulnerability in the Oracle Web Applications Desktop Integrator component in Oracle E-Business Suite 11.5.10.2, 12.0.6, 12.1.3, 12.2.2, 12.2.3, and 12.2.4 allows remote authenticated users to affect integrity via unknown vectors related to Templates.
[ "cpe:2.3:a:oracle:e-business_suite:11.5.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:12.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:12.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:12.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:12.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:12.2.4:*:*:*:*:*:*:*" ]
GHSA-7xv5-5f2f-vfq3
The API on Fisher-Price Smart Toy Bear devices allows remote attackers to obtain sensitive information or modify data by leveraging presence in an 802.11 network's coverage area and entering an account number.
[]
GHSA-3q99-mmr6-6chg
In ovs versions v0.90.0 through v2.5.0 are vulnerable to heap buffer over-read in flow.c. An unsafe comparison of “minimasks” function could lead access to an unmapped region of memory. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.
[]
CVE-2024-43313
WordPress FormFacade – WordPress plugin for Google Forms plugin <= 1.3.2 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in FormFacade allows Reflected XSS.This issue affects FormFacade: from n/a through 1.3.2.
[ "cpe:2.3:a:formfacade:formfacade:*:*:*:*:*:wordpress:*:*" ]
GHSA-vc5q-wf68-hw8w
In the Linux kernel, the following vulnerability has been resolved:media: i2c: ds90ub9x3: Fix extra fwnode_handle_put()The ub913 and ub953 drivers call fwnode_handle_put(priv->sd.fwnode) as part of their remove process, and if the driver is removed multiple times, eventually leads to put "overflow", possibly causing memory corruption or crash.The fwnode_handle_put() is a leftover from commit 905f88ccebb1 ("media: i2c: ds90ub9x3: Fix sub-device matching"), which changed the code related to the sd.fwnode, but missed removing these fwnode_handle_put() calls.
[]
GHSA-v4v4-7wwq-64g3
A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Ventura 13.3. An app may be able to read sensitive location information.
[]
CVE-2006-2608
artmedic newsletter 4.1 and possibly other versions, when register_globals is enabled, allows remote attackers to modify arbitrary files and execute arbitrary PHP code via the logfile parameter in a direct request to log.php, which causes the $logfile variable to be redefined to an attacker-controlled value, as demonstrated by injecting PHP code into info.php.
[ "cpe:2.3:a:artmedic_webdesign:artmedic_newsletter:4.1:*:*:*:*:*:*:*" ]
GHSA-44mc-55q4-jh5m
SQL injection vulnerability in Joomla! CMS 3.1.x and 3.2.x before 3.2.3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[]
GHSA-2vm4-g44x-w548
Unquoted Windows search path vulnerability in the srvInventoryWebServer service in 10-Strike Network Monitor 5.4 allows local users to gain privileges via a malicious artefact.
[]
GHSA-w7v6-vm58-fw22
The STARTTLS implementation in Cyrus IMAP Server before 2.4.7 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.
[]
CVE-2015-2794
The installation wizard in DotNetNuke (DNN) before 7.4.1 allows remote attackers to reinstall the application and gain SuperUser access via a direct request to Install/InstallWizard.aspx.
[ "cpe:2.3:a:dotnetnuke:dotnetnuke:*:*:*:*:*:*:*:*" ]
GHSA-gm89-j9wr-p8rw
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.02.34. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of IFC files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16367.
[]
GHSA-vh6q-mgp6-79wr
In the Linux kernel, the following vulnerability has been resolved:wifi: b43: Stop/wake correct queue in DMA Tx path when QoS is disabledWhen QoS is disabled, the queue priority value will not map to the correct ieee80211 queue since there is only one queue. Stop/wake queue 0 when QoS is disabled to prevent trying to stop/wake a non-existent queue and failing to stop/wake the actual queue instantiated.Log of issue before change (with kernel parameter qos=0): [ +5.112651] ------------[ cut here ]------------ [ +0.000005] WARNING: CPU: 7 PID: 25513 at net/mac80211/util.c:449 __ieee80211_wake_queue+0xd5/0x180 [mac80211] [ +0.000067] Modules linked in: b43(O) snd_seq_dummy snd_hrtimer snd_seq snd_seq_device nft_chain_nat xt_MASQUERADE nf_nat xfrm_user xfrm_algo xt_addrtype overlay ccm af_packet amdgpu snd_hda_codec_cirrus snd_hda_codec_generic ledtrig_audio drm_exec amdxcp gpu_sched xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip6t_rpfilter ipt_rpfilter xt_pkttype xt_LOG nf_log_syslog xt_tcpudp nft_compat nf_tables nfnetlink sch_fq_codel btusb uinput iTCO_wdt ctr btrtl intel_pmc_bxt i915 intel_rapl_msr mei_hdcp mei_pxp joydev at24 watchdog btintel atkbd libps2 serio radeon btbcm vivaldi_fmap btmtk intel_rapl_common snd_hda_codec_hdmi bluetooth uvcvideo nls_iso8859_1 applesmc nls_cp437 x86_pkg_temp_thermal snd_hda_intel intel_powerclamp vfat videobuf2_vmalloc coretemp fat snd_intel_dspcfg crc32_pclmul uvc polyval_clmulni snd_intel_sdw_acpi loop videobuf2_memops snd_hda_codec tun drm_suballoc_helper polyval_generic drm_ttm_helper drm_buddy tap ecdh_generic videobuf2_v4l2 gf128mul macvlan ttm ghash_clmulni_intel ecc tg3 [ +0.000044] videodev bridge snd_hda_core rapl crc16 drm_display_helper cec mousedev snd_hwdep evdev intel_cstate bcm5974 hid_appleir videobuf2_common stp mac_hid libphy snd_pcm drm_kms_helper acpi_als mei_me intel_uncore llc mc snd_timer intel_gtt industrialio_triggered_buffer apple_mfi_fastcharge i2c_i801 mei snd lpc_ich agpgart ptp i2c_smbus thunderbolt apple_gmux i2c_algo_bit kfifo_buf video industrialio soundcore pps_core wmi tiny_power_button sbs sbshc button ac cordic bcma mac80211 cfg80211 ssb rfkill libarc4 kvm_intel kvm drm irqbypass fuse backlight firmware_class efi_pstore configfs efivarfs dmi_sysfs ip_tables x_tables autofs4 dm_crypt cbc encrypted_keys trusted asn1_encoder tee tpm rng_core input_leds hid_apple led_class hid_generic usbhid hid sd_mod t10_pi crc64_rocksoft crc64 crc_t10dif crct10dif_generic ahci libahci libata uhci_hcd ehci_pci ehci_hcd crct10dif_pclmul crct10dif_common sha512_ssse3 sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel usbcore scsi_mod libaes crypto_simd cryptd scsi_common [ +0.000055] usb_common rtc_cmos btrfs blake2b_generic libcrc32c crc32c_generic crc32c_intel xor raid6_pq dm_snapshot dm_bufio dm_mod dax [last unloaded: b43(O)] [ +0.000009] CPU: 7 PID: 25513 Comm: irq/17-b43 Tainted: G W O 6.6.7 #1-NixOS [ +0.000003] Hardware name: Apple Inc. MacBookPro8,3/Mac-942459F5819B171B, BIOS 87.0.0.0.0 06/13/2019 [ +0.000001] RIP: 0010:__ieee80211_wake_queue+0xd5/0x180 [mac80211] [ +0.000046] Code: 00 45 85 e4 0f 85 9b 00 00 00 48 8d bd 40 09 00 00 f0 48 0f ba ad 48 09 00 00 00 72 0f 5b 5d 41 5c 41 5d 41 5e e9 cb 6d 3c d0 <0f> 0b 5b 5d 41 5c 41 5d 41 5e c3 cc cc cc cc 48 8d b4 16 94 00 00 [ +0.000002] RSP: 0018:ffffc90003c77d60 EFLAGS: 00010097 [ +0.000001] RAX: 0000000000000001 RBX: 0000000000000002 RCX: 0000000000000000 [ +0.000001] RDX: 0000000000000000 RSI: 0000000000000002 RDI: ffff88820b924900 [ +0.000002] RBP: ffff88820b924900 R08: ffffc90003c77d90 R09: 000000000003bfd0 [ +0.000001] R10: ffff88820b924900 R11: ffffc90003c77c68 R12: 0000000000000000 [ +0.000001] R13: 0000000000000000 R14: ffffc90003c77d90 R15: ffffffffc0fa6f40 [ +0.000001] FS: 0000000000000000(0000) GS:ffff88846fb80000(0000) knlGS:0000000000000000 [ +0.000001] CS: 0010 DS: 0 ---truncated---
[]
GHSA-r7jr-h86x-vvx4
Microsoft Teams for Android Information Disclosure
[]
GHSA-8pcw-jr9p-76hj
A flaw was found in djvulibre-3.5.28 and earlier. A heap buffer overflow in function DJVU::GBitmap::decode() via crafted djvu file may lead to application crash and other consequences.
[]
CVE-2016-7046
Red Hat JBoss Enterprise Application Platform (EAP) 7, when operating as a reverse-proxy with default buffer sizes, allows remote attackers to cause a denial of service (CPU and disk consumption) via a long URL.
[ "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0:*:*:*:*:*:*:*" ]
CVE-2021-30888
An information leakage issue was addressed. This issue is fixed in iOS 15.1 and iPadOS 15.1, macOS Monterey 12.0.1, iOS 14.8.1 and iPadOS 14.8.1, tvOS 15.1, watchOS 8.1. A malicious website using Content Security Policy reports may be able to leak information via redirect behavior .
[ "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:ipados:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
GHSA-4g6p-3xf9-rrv7
Directory traversal vulnerability in chat.php in Sky GUNNING MySpeach 3.0.7 and earlier allows remote attackers to include arbitrary local files via a .. (dot dot) and trailing %00 (NULL) in a my_ms[root] cookie.
[]
CVE-2019-13522
An attacker could use a specially crafted project file to corrupt the memory and execute code under the privileges of the EZ PLC Editor Versions 1.8.41 and prior.
[ "cpe:2.3:a:ezautomation:ez_plc_editor:*:*:*:*:*:*:*:*" ]
CVE-2014-4275
Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect availability via vectors related to SMB server kernel module.
[ "cpe:2.3:o:sun:sunos:5.11:*:*:*:*:*:*:*" ]
CVE-2002-1356
Ethereal 0.9.7 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via malformed packets to the (1) LMP, (2) PPP, or (3) TDS dissectors, possibly related to a missing field for EndVerifyAck messages.
[ "cpe:2.3:a:ethereal_group:ethereal:*:*:*:*:*:*:*:*" ]
GHSA-h3fw-qcc5-7h9g
Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution.
[]
GHSA-93ww-rvxc-x7gp
Several services in Honor Device Co., Ltd Honor PC Manager v16.0.0.118 was discovered to connect services to the named pipe iMateBookAssistant with default or overly permissive security attributes, leading to a privilege escalation.
[]
CVE-2024-51609
WordPress Emoji Shortcode plugin <= 1.0.0 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Elsner Technologies Pvt. Ltd. Emoji Shortcode allows Stored XSS.This issue affects Emoji Shortcode: from n/a through 1.0.0.
[ "cpe:2.3:a:elsner:emoji_shortcode:*:*:*:*:*:wordpress:*:*" ]
GHSA-rvxf-5p77-738g
Unspecified vulnerability in context.py in Albatross web application toolkit before 1.33 allows remote attackers to execute arbitrary commands via unspecified vectors involving template files and the "handling of submitted form fields".
[]
CVE-2021-1995
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Services). Supported versions that are affected are 10.3.6.0.0 and 12.1.3.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 6.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N).
[ "cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*" ]
GHSA-7654-vfh6-rw6x
Remote code execution from account through SearchAdmin
ImpactThe search administration interface doesn't properly escape the id and label of search user interface extensions, allowing the injection of XWiki syntax containing script macros including Groovy macros that allow remote code execution, impacting the confidentiality, integrity and availability of the whole XWiki instance. This attack can be executed by any user who can edit some wiki page like the user's profile (editable by default) as user interface extensions that will be displayed in the search administration can be added on any document by any user.To reproduce, edit any document with the object editor, add an object of type `XWiki.UIExtensionClass`, set "Extension Point Id" to `org.xwiki.platform.search`, set "Extension ID" to `{{async}}{{groovy}}services.logging.getLogger("attacker").error("Attack from extension id succeeded!"){{/groovy}}{{/async}}`, set "Extension Parameters" to `label={{async}}{{groovy}}services.logging.getLogger("attacker").error("Attack from label succeeded!"){{/groovy}}{{/async}}` and "Extension Scope" to "Current User". Then open the page `XWiki.SearchAdmin`, e.g., on http://localhost:8080/xwiki/bin/view/XWiki/SearchAdmin. If there are error log messages in XWiki's log that announce that attacks succeeded, the instance is vulnerable.PatchesThe necessary escaping has been added in XWiki 14.10.15, 15.5.2 and 15.7RC1.WorkaroundsThe [patch](https://github.com/xwiki/xwiki-platform/commit/62863736d78ffd60d822279c5fb7fb9593042766#diff-2272c913e5ca43813e52f8fa748c9b043bf0f01561908d7eba6ca3601d8475c4) can be manually applied to the page `XWiki.SearchAdmin`.Referenceshttps://github.com/xwiki/xwiki-platform/commit/62863736d78ffd60d822279c5fb7fb9593042766https://jira.xwiki.org/browse/XWIKI-21200
[]
CVE-2023-28646
App lockout in nextcloud Android app can be bypassed via thirdparty apps
Nextcloud android is an android app for interfacing with the nextcloud home server ecosystem. In versions from 3.7.0 and before 3.24.1 an attacker that has access to the unlocked physical device can bypass the Nextcloud Android Pin/passcode protection via a thirdparty app. This allows to see meta information like sharer, sharees and activity of files. It is recommended that the Nextcloud Android app is upgraded to 3.24.1. There are no known workarounds for this vulnerability.
[ "cpe:2.3:a:nextcloud:nextcloud:*:*:*:*:*:android:*:*" ]
GHSA-876c-vcrv-xpmc
A vulnerability was found in Netgear WNDR3700v2 1.0.1.14 and classified as problematic. This issue affects some unknown processing of the component Web Interface. The manipulation leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221153 was assigned to this vulnerability.
[]
GHSA-vc29-vg52-6643
DoS Vulnerability in TraceContextPropagator.Extract - OpenTelemetry.Api
Impact_What kind of vulnerability is it? Who is impacted?_A vulnerability in `OpenTelemetry.Api` package `1.10.0` to `1.11.1` could cause a [Denial of Service (DoS) when a tracestate and traceparent header is received](https://github.com/open-telemetry/opentelemetry-dotnet/security/advisories/GHSA-8785-wc3w-h8q6). These versions are used in OpenTelemetry .NET Automatic Instrumentation `1.10.0-beta.1` and `1.10.0`.Even if an application does not explicitly use trace context propagation, receiving these headers can still trigger high CPU usage. This issue impacts any application accessible over the web or backend services that process HTTP requests containing a tracestate header. Application may experience excessive resource consumption, leading to increased latency, degraded performance, or downtime.Patches_Has the problem been patched? What versions should users upgrade to?_This issue has been resolved in `OpenTelemetry.Api` `1.11.2` by reverting the change that introduced the problematic behavior in versions `1.10.0` to `1.11.1`. OpenTelemetry .NET Automatic Instrumentation fixes it in `1.11.0` release.Fixed version| OpenTelemetry .NET Automatic Instrumentation | Status | |----|----| | <= 1.9.0 | ✅ Not affected | | 1.10.0-beta.1, 1.10.0 | ❌ Vulnerable | | 1.11.0 (Fixed)| ✅ Safe to use|Workarounds_Is there a way for users to fix or remediate the vulnerability without upgrading?_References_Are there any links users can visit to find out more?_
[]
GHSA-664m-vm73-69h5
Cross-site scripting (XSS) vulnerability in the MDS API in Microsoft SQL Server 2016 allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka "MDS API XSS Vulnerability."
[]
GHSA-mxq8-5vwv-h9rj
JFrog Artifactory prior to version 7.29.8 and 6.23.38 is vulnerable to Reflected Cross-Site Scripting (XSS) through one of the XHR parameters in Users REST API endpoint. This issue affects: JFrog JFrog Artifactory JFrog Artifactory versions before 7.36.1 versions prior to 7.29.8; JFrog Artifactory versions before 6.23.41 versions prior to 6.23.38.
[]
CVE-2009-0254
Stack-based buffer overflow in easyHDR PRO 1.60.2 allows user-assisted attackers to execute arbitrary code via an invalid Flexible Image Transport System (FITS) file. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:easyhdr:easyhdr:1.60.2:*:pro:*:*:*:*:*" ]
CVE-2022-25301
Prototype Pollution
All versions of package jsgui-lang-essentials are vulnerable to Prototype Pollution due to allowing all Object attributes to be altered, including their magical attributes such as proto, constructor and prototype.
[ "cpe:2.3:a:jsgui-lang-essentials_project:jsgui-lang-essentials:*:*:*:*:*:*:*:*" ]
GHSA-rw5m-8cqh-g86f
The rpza_decode_stream function in libavcodec/rpza.c in FFmpeg before 2.1 does not properly maintain a pointer to pixel data, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted Apple RPZA data.
[]
CVE-2025-20998
Improper access control in SamsungAccount for Galaxy Watch prior to SMR Jul-2025 Release 1 allows local attackers to access phone number.
[]
GHSA-v489-w5g6-hr95
In Yokogawa WideField3 R1.01 - R4.03, a buffer overflow could be caused when a user loads a maliciously crafted project file.
[]
CVE-2016-10368
Open redirect vulnerability in Opsview Monitor Pro (Prior to 5.1.0.162300841, prior to 5.0.2.27475, prior to 4.6.4.162391051, and 4.5.x without a certain 2016 security patch) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the back parameter to the /login URI.
[ "cpe:2.3:a:opsview:opsview:4.5.0:*:*:*:pro:*:*:*", "cpe:2.3:a:opsview:opsview:4.6.4:*:*:*:pro:*:*:*", "cpe:2.3:a:opsview:opsview:5.0.2:*:*:*:pro:*:*:*", "cpe:2.3:a:opsview:opsview:5.1.0:*:*:*:pro:*:*:*" ]
CVE-2020-4290
IBM Security Information Queue (ISIQ) 1.0.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, and 1.0.5 could allow any authenticated user to spoof the configuration owner of any other user which disclose sensitive information or allow for unauthorized access. IBM X-Force ID: 176333.
[ "cpe:2.3:a:ibm:security_information_queue:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_information_queue:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_information_queue:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_information_queue:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_information_queue:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_information_queue:1.0.5:*:*:*:*:*:*:*" ]
CVE-2021-4354
The PWA for WP & AMP for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the pwaforwp_splashscreen_uploader function in versions up to, and including, 1.7.32. This makes it possible for authenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
[ "cpe:2.3:a:magazine3:pwa_for_wp_\\&_amp:*:*:*:*:*:wordpress:*:*" ]
CVE-2008-1464
Multiple SQL injection vulnerabilities in Gallarific Free Edition 1.1 allow remote attackers to execute arbitrary SQL commands via the (1) query parameter to (a) search.php; (2) gusername and (3) gpassword parameters to (b) login.php; and the (4) username and (5) password parameters to (c) gadmin/index.php in a signin action. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:gallarific:gallarific:1.1:-:free:*:*:*:*:*" ]
GHSA-9m73-cfj6-8gjc
WRC-1167FS-W, WRC-1167FS-B, and WRC-1167FSA all versions allow an unauthenticated network-adjacent attacker to obtain sensitive information via unspecified vectors.
[]
GHSA-258f-3vwc-4rjv
The Advanced iFrame plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'advanced_iframe' shortcode in versions up to, and including, 2023.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
CVE-2022-34937
Yuba u5cms v8.3.5 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component savepage.php. This vulnerability allows attackers to execute arbitrary code.
[ "cpe:2.3:a:yuba:u5cms:8.3.5:*:*:*:*:*:*:*" ]
GHSA-4m8h-h59m-m34j
Prototype Pollution in bmoor
The package bmoor before 0.10.1 is vulnerable to Prototype Pollution due to missing sanitization in set function. **Note:** This vulnerability derives from an incomplete fix in [CVE-2020-7736](https://security.snyk.io/vuln/SNYK-JS-BMOOR-598664)
[]
GHSA-7jp2-p26r-xp47
SQL injection vulnerability in MgrLogin.asp in Addsoft StoreBot 2005 Professional allows remote attackers to execute arbitrary SQL commands via the Pwd parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
GHSA-hc63-rcvm-wp7w
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of Link objects. By manipulating a document's elements, an attacker can cause a pointer to be reused after it has been freed. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-6267.
[]
GHSA-974q-rh86-63r2
idreamsoft iCMS 7.0.13 allows admincp.php?app=files ../ Directory Traversal via the udir parameter to files.admincp.php, resulting in execution of arbitrary PHP code from a ZIP file via the admincp.php?app=apps zipfile parameter to apps.admincp.php.
[]
GHSA-f2c7-w7wj-2qjw
In the Linux kernel, the following vulnerability has been resolved:md: Don't suspend the array for interrupted reshapemd_start_sync() will suspend the array if there are spares that can be added or removed from conf, however, if reshape is still in progress, this won't happen at all or data will be corrupted(remove_and_add_spares won't be called from md_choose_sync_action for reshape), hence there is no need to suspend the array if reshape is not done yet.Meanwhile, there is a potential deadlock for raid456:reshape is interrupted;set one of the disk WantReplacement, and add a new disk to the array, however, recovery won't start until the reshape is finished;then issue an IO across reshpae position, this IO will wait for reshape to make progress;continue to reshape, then md_start_sync() found there is a spare disk that can be added to conf, mddev_suspend() is called;Step 4 and step 3 is waiting for each other, deadlock triggered. Noted this problem is found by code review, and it's not reporduced yet.Fix this porblem by don't suspend the array for interrupted reshape, this is safe because conf won't be changed until reshape is done.
[]
CVE-2022-27823
Improper size check in sapefd_parse_meta_HEADER_old function of libsapeextractor library prior to SMR Apr-2022 Release 1 allows out of bounds read via a crafted media file.
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*" ]
CVE-2025-30555
WordPress WordPres 同步微博 plugin <= 1.1.0 - CSRF to Stored XSS vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in iiiryan WordPres 同步微博 allows Stored XSS. This issue affects WordPres 同步微博: from n/a through 1.1.0.
[]
CVE-2023-32993
Jenkins SAML Single Sign On(SSO) Plugin 2.0.2 and earlier does not perform hostname validation when connecting to miniOrange or the configured IdP to retrieve SAML metadata, which could be abused using a man-in-the-middle attack to intercept these connections.
[ "cpe:2.3:a:jenkins:saml_single_sign_on:*:*:*:*:*:jenkins:*:*" ]
GHSA-59p9-f7jg-cpj5
During the initial setup of the device the user connects to an access point broadcast by the Sight Bulb Pro. During the negotiation, AES Encryption keys are passed in cleartext. If captured, an attacker may be able to decrypt communications between the management app and the Sight Bulb Pro which may include sensitive information such as network credentials.
[]
GHSA-63m7-fp94-2qv7
Cross Site Scripting (XSS) vulnerability in sourcecodester Toll Tax Management System 1.0 allows remote attackers to run arbitrary code via the First Name and Last Name fields on the My Account page.
[]
GHSA-j269-qhvq-9q42
A vulnerability was found in Album Lock 4.0 and classified as critical. Affected by this issue is some unknown functionality of the file /getImage. The manipulation of the argument filePaht leads to path traversal. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
[]
CVE-2022-45138
WAGO: Missing Authentication for Critical Function
The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device.
[ "cpe:2.3:o:wago:751-9301_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:751-9301_firmware:22:-:*:*:*:*:*:*", "cpe:2.3:o:wago:751-9301_firmware:23:*:*:*:*:*:*:*", "cpe:2.3:h:wago:751-9301:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:22:-:*:*:*:*:*:*", "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:23:*:*:*:*:*:*:*", "cpe:2.3:h:wago:752-8303\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:pfc100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:pfc100_firmware:22:-:*:*:*:*:*:*", "cpe:2.3:o:wago:pfc100_firmware:23:*:*:*:*:*:*:*", "cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:pfc200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:pfc200_firmware:22:-:*:*:*:*:*:*", "cpe:2.3:o:wago:pfc200_firmware:23:*:*:*:*:*:*:*", "cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:22:-:*:*:*:*:*:*", "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:23:*:*:*:*:*:*:*", "cpe:2.3:h:wago:touch_panel_600_advanced:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:touch_panel_600_marine_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:touch_panel_600_marine_firmware:22:-:*:*:*:*:*:*", "cpe:2.3:o:wago:touch_panel_600_marine_firmware:23:*:*:*:*:*:*:*", "cpe:2.3:h:wago:touch_panel_600_marine:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:touch_panel_600_standard_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:touch_panel_600_standard_firmware:22:-:*:*:*:*:*:*", "cpe:2.3:o:wago:touch_panel_600_standard_firmware:23:*:*:*:*:*:*:*", "cpe:2.3:h:wago:touch_panel_600_standard:-:*:*:*:*:*:*:*" ]
GHSA-rwf7-w5qg-cvrg
The ActiveCampaign WordPress plugin before 8.1.12 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
[]
GHSA-45fv-8pr3-cvf3
cPanel before 70.0.23 allows demo accounts to execute code via the Landing Page (SEC-405).
[]
CVE-2011-1068
Microsoft Windows Azure Software Development Kit (SDK) 1.3.x before 1.3.20121.1237, when Full IIS and a Web Role are used with an ASP.NET application, does not properly support the use of cookies for maintaining state, which allows remote attackers to obtain potentially sensitive information by reading an encrypted cookie and performing unspecified other steps.
[ "cpe:2.3:a:microsoft:windows_azure_sdk:1.3:*:*:*:*:*:*:*" ]
GHSA-8fc9-94c7-j435
Improper validation of syntactic correctness of input vulnerability exist in Movable Type series. Having a user to access a specially crafted URL may allow a remote unauthenticated attacker to set a specially crafted URL to the Reset Password page and conduct a phishing attack. Affected products/versions are as follows: Movable Type 7 r.5301 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.5301 and earlier (Movable Type Advanced 7 Series), Movable Type 6.8.7 and earlier (Movable Type 6 Series), Movable Type Advanced 6.8.7 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.53 and earlier, and Movable Type Premium Advanced 1.53 and earlier.
[]
GHSA-5rjr-j9m9-qpm9
A vulnerability, which was classified as critical, was found in SourceCodester Clinics Patient Management System 2.0. Affected is an unknown function of the file /pms/update_user.php?user_id=1. The manipulation of the argument profile_picture with the input <?php phpinfo();?> leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
CVE-2020-9977
A validation issue existed in the entitlement verification. This issue was addressed with improved validation of the process entitlement. This issue is fixed in macOS Big Sur 11.0.1, iOS 14.0 and iPadOS 14.0. A malicious application may be able to determine a user's open tabs in Safari.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
CVE-2017-16414
An issue was discovered in Adobe Acrobat and Reader: 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, and 11.0.22 and earlier versions. This vulnerability occurs as a result of a computation that reads data that is past the end of the target buffer; the computation is a part of the JavaScript API module responsible for form field computation. The use of an invalid (out-of-range) pointer offset during access of internal data structure fields causes the vulnerability. A successful attack can lead to sensitive data exposure.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*" ]
GHSA-jqmx-q56m-xx75
Directory traversal vulnerability in index.php in blur6ex 0.3.452 allows remote attackers to include arbitrary files via the shard parameter. NOTE: this issue can be exploited to produce resultant XSS when the parameter has XSS manipulations, and path disclosure with other invalid values.
[]
CVE-2008-7239
Multiple unspecified vulnerabilities in Oracle E-Business Suite 11.5.10.2 allow remote attackers to affect confidentiality via unknown vectors related to the (1) Oracle Application Object Library (APP02) and (2) Oracle Applications Manager (APP04).
[ "cpe:2.3:a:oracle:e-business_suite_11i:11.5.10.2:*:*:*:*:*:*:*" ]
CVE-2012-6698
The decode_search function in dhcp.c in dhcpcd 3.x allows remote DHCP servers to cause a denial of service (out-of-bounds write) via a crafted response.
[ "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:dhcpcd_project:dhcpcd:3.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:dhcpcd_project:dhcpcd:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:dhcpcd_project:dhcpcd:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:dhcpcd_project:dhcpcd:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:dhcpcd_project:dhcpcd:3.2.3:*:*:*:*:*:*:*" ]
CVE-2018-11903
In all android releases (Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, lack of length validation check for value received from caller function used as an array index for WMA interfaces can lead to OOB write in WLAN HOST.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
GHSA-wq9w-w8pf-99c8
The mark_line_tr function in gxscanc.c in Artifex Ghostscript 9.21 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PostScript document.
[]
GHSA-6c69-f792-7pq7
A stack-based buffer overflow could be triggered in WhatsApp by sending a specially crafted MP4 file to a WhatsApp user. The issue was present in parsing the elementary stream metadata of an MP4 file and could result in a DoS or RCE. This affects Android versions prior to 2.19.274, iOS versions prior to 2.19.100, Enterprise Client versions prior to 2.25.3, Business for Android versions prior to 2.19.104 and Business for iOS versions prior to 2.19.100.
[]
CVE-2013-5996
Multiple cross-site scripting (XSS) vulnerabilities in shopping/payment.tpl components in LOCKON EC-CUBE 2.11.0 through 2.13.0 allow remote attackers to inject arbitrary web script or HTML via crafted values.
[ "cpe:2.3:a:lockon:ec-cube:2.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.11.0:beta:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.11.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.11.2:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.11.3:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.11.4:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.11.5:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.12.2:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.12.3:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.12.3en:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.12.3enp1:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.12.3enp2:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.12.4en:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.12.5:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.12.5en:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.12.6:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.12.6en:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.13.0:*:*:*:*:*:*:*" ]