id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-824r-f6r2-rhhx
CIRCUTOR Q-SMT in its firmware version 1.0.4, could be affected by a denial of service (DoS) attack if an attacker with access to the web service bypasses the authentication mechanisms on the login page, allowing the attacker to use all the functionalities implemented at web level that allow interacting with the device.
[]
null
10
null
null
CVE-2024-0158
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability to modify a UEFI variable, leading to denial of service and escalation of privileges
[ "cpe:2.3:o:dell:alienware_m15_r6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m15_r6:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m15_r7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m15_r7:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m16_r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m16_r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m18_r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m18_r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m18_r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m18_r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x14_r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x14_r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x16_r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x16_r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x16_r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x16_r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3900:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3910_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3910:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3911_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3911:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3990_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3990:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3991_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3991:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:edge_gateway_5000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:edge_gateway_5000:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g15_5510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g15_5510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g15_5511_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g15_5511:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g15_5520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g15_5520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g15_5530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g15_5530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g16_7620_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g16_7620:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g16_7630_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g16_7630:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g3_3500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g3_3500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g5_5000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g5_5000:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g5_5090_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g5_5090:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g5_5500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g5_5500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g7_7500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g7_7500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g7_7700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g7_7700:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3430_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3430_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3431_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3431_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3630_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3630_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5820_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5820_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7820_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7820_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7920_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7920_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:edge_gateway_3000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:edge_gateway_3000:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:embedded_box_pc_3000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:embedded_box_pc_3000:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:embedded_box_pc_5000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:embedded_box_pc_5000:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_13_5310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_13_5310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_13_5320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_13_5320:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_13_5330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_13_5330:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_14_5410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_14_5410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_14_5418_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_14_5418:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_14_5420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_14_5420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_14_5430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_14_5430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_14_5440_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_14_5440:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_14_7420_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_14_7420_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_14_7430_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_14_7430_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_14_7440_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_14_7440_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_14_plus_7420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_14_plus_7420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_14_plus_7430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_14_plus_7430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_15_3511_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_15_3511:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_15_3520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_15_3520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_15_3530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_15_3530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_15_5510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_15_5510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_15_5518_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_15_5518:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_15_7510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_15_7510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_16_5620_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_16_5620:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_16_5630_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_16_5630:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_16_5640_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_16_5640:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_16_7610_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_16_7610:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_16_7620_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_16_7620_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_16_7630_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_16_7630_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_16_plus_7620_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_16_plus_7620:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_16_plus_7630_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_16_plus_7630:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_24_5410_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_24_5410_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_24_5411_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_24_5411_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_24_5420_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_24_5420_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_27_7710_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_27_7710_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_27_7720_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_27_7720_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3020_desktop_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3020_desktop:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3020_small_desktop_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3020_small_desktop:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3030s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3030s:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3493_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3493:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3501:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3593_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3593:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3793_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3793:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3880_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3880:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3881_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3881:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3891_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3891:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3910_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3910:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5301_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5301:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5401_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5401:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5401_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5401_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5402_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5402:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5406_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5406_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5409_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5409:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5493_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5493:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5502_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5502:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5509_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5509:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5593_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5593:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7306_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7306_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7501:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7506_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7506_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7700_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7700_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7706_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7706_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_12_rugged_extreme_7214_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_12_rugged_extreme_7214:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3380_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3380:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3120_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3120:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3140_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3140:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3180_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3180:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3189_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3189:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3190_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3190:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3190_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3190_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3301_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3301:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3310_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3310_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3320:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3330:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3340_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3340:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3390_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3390_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3440_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3440:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3540_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3540:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5280_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5280:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5288_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5288:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5290_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5290:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5290_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5290_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5300_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5300_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5310_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5310_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5320:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5330:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5340_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5340:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5401_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5401:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5411_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5411:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5414_rugged_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5414_rugged:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5420_rugged_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5420_rugged:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5421_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5421:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5424_rugged_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5424_rugged:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5430_rugged_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5430_rugged:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5431_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5431:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5440_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5440:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5488_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5488:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5491_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5491:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5495_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5495:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5501:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5511_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5511:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5521_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5521:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5531_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5531:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5540_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5540:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5591_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5591:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7030_rugged_extreme_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7030_rugged_extreme:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7200_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7200_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7210_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7210_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7212_rugged_extreme_tablet_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7212_rugged_extreme_tablet:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7220_rugged_extreme_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7220_rugged_extreme:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7230_rugged_extreme_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7230_rugged_extreme:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7280_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7280:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7285_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7285_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7290_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7290:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7320:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7320_detachable_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7320_detachable:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7330:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7330_rugged_laptop_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7330_rugged_laptop:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7340_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7340:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7380_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7380:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7390_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7390:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7390_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7390_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7400_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7400_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7414_rugged_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7414_rugged:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7424_rugged_extreme_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7424_rugged_extreme:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7440_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7440:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7640_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7640:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9330:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9440_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9440_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9510_2in1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9510_2in1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_rugged_7220ex_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_rugged_7220ex:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3000_micro_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3000_micro:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3000_small_form_factor_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3000_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3000_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3000_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3000_thin_client_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3000_thin_client:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3050_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3050:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3050_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3050_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3060_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3060:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3070_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3070:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3080_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3080:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3090_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3090:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3090_ultra_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3090_ultra:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3280_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3280_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5000_micro_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5000_micro:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5000_small_form_factor_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5000_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5000_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5000_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5050_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5050:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5055_a-serial_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5055_a-serial:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5055_ryzen_apu_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5055_ryzen_apu:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5055_ryzen_cpu_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5055_ryzen_cpu:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5060_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5060:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5070_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5070:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5080_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5080:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5090_micro_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5090_micro:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5090_small_form_factor_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5090_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5090_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5090_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5260_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5260_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5270_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5270_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5400_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5400_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5480_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5480_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5490_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5490_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7000_micro_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7000_micro:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7000_small_form_factor_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7000_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7000_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7000_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7000_xe_micro_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7000_xe_micro:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7060_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7060:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7070_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7070:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7070_ultra_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7070_ultra:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7071_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7071:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7080_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7080:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7090_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7090_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7090_ultra_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7090_ultra:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7400_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7400_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7450_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7450_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7460_all_in_one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7460_all_in_one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7470_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7470_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7480_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7480_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7490_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7490_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7760_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7760_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7770_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7770_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7780_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7780_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_all-in-one_7410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_all-in-one_7410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_micro_7010_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_micro_7010:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_micro_plus_7010_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_micro_plus_7010:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_small_form_factor_7010_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_small_form_factor_7010:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_small_form_factor_plus_7010_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_small_form_factor_plus_7010:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_tower_7010_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_tower_7010:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_tower_plus_7010_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_tower_plus_7010:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_xe3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_xe3:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_xe4_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_xe4_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3240_compact_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3240_compact:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3260_xe_compact_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3260_xe_compact:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3260_compact_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3260_compact:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3420_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3420_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3440_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3440:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3450_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3450:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3460_xe_small_form_factor_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3460_xe_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3460_small_form_factor_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3460_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3470:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3540_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3540:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3541_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3541:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3550:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3551_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3551:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3560_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3560:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3561_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3561:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3570_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3570:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3571_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3571:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3581_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3581:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3620_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3620_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3640_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3640:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3650_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3650_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3660_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3660:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3930_rack_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3930_rack:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5470:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5530_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5530_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5540_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5540:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5550:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5560_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5560:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5570_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5570:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5680_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5680:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5750:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5760_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5760:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5770_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5770:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5860_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5860_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7540_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7540:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7550:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7560_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7560:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7670_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7670:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7680_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7680:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7720_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7720:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7730_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7730:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7740_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7740:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7750:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7760_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7760:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7770_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7770:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7780_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7780:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7865_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7865_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7875_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7875_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7960_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7960_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_13_5310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_13_5310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_14_3420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_14_3420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_14_3430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_14_3430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_14_3440_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_14_3440:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_14_5410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_14_5410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_15_3510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_15_3510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_15_3520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_15_3520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_15_3530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_15_3530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_15_5510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_15_5510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_15_7510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_15_7510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_16_5630_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_16_5630:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_16_5640_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_16_5640:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3020_small_desktop_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3020_small_desktop:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3020_tower_desktop_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3020_tower_desktop:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3030s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3030s:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3401_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3401:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3480:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3501:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3580:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3583_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3583:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3681_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3681:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3690_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3690:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3710_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3710:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3881_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3881:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3888_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3888:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3890_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3890:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3910_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3910:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5090_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5090:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5301_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5301:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5320:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5402_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5402:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5502_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5502:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5620_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5620:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5880_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5880:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5890_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5890:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_7500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_7500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_7620_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_7620:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:wyse_5070_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:wyse_5070:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:wyse_5470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:wyse_5470:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:wyse_5470_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:wyse_5470_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:wyse_7040_thin_client_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:wyse_7040_thin_client:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9305_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9305:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_7390_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_7390:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_7390_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_7390_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9310_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9310_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9315_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9315:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_plus_9320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_plus_9320:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_15_7590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_15_7590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_15_9500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_15_9500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_15_9510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_15_9510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_15_9520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_15_9520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_15_9530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_15_9530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_17_9700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_17_9700:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_17_9710_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_17_9710:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_17_9720_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_17_9720:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_17_9730_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_17_9730:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_8940_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_8940:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_9315_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_9315_2-in-1:-:*:*:*:*:*:*:*" ]
null
5.1
null
null
CVE-2006-1111
Aztek Forum 4.0 allows remote attackers to obtain sensitive information via a "*/*" in the msg parameter to index.php, which reveals usernames and passwords in a MySQL error message, possibly due to a forced SQL error or SQL injection.
[ "cpe:2.3:a:aztek_forum:aztek_forum:4.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
RHSA-2018:0516
Red Hat Security Advisory: qemu-kvm security update
Qemu: cirrus: OOB access issue in mode4and5 write functions
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
4.4
null
GHSA-7wpj-xm3v-6m5h
The atalk_sum_skb function in AppleTalk for Linux kernel 2.6.x before 2.6.21, and possibly 2.4.x, allows remote attackers to cause a denial of service (crash) via an AppleTalk frame that is shorter than the specified length, which triggers a BUG_ON call when an attempt is made to perform a checksum.
[]
null
null
null
null
GHSA-gvpq-4fvc-8q2q
Missing Authorization vulnerability in Easyship Easyship WooCommerce Shipping Rates allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Easyship WooCommerce Shipping Rates: from n/a through 0.9.0.
[]
null
5.4
null
null
GHSA-8724-vrjj-443h
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
[]
null
null
8.8
null
GHSA-2vq4-6g9q-2xjq
The Eat Spray Love mobile app for both iOS and Android contains logic that allows users to bypass authentication and retrieve or modify information that they would not normally have access to.
[]
null
null
null
null
RHSA-2024:6309
Red Hat Security Advisory: fence-agents security update
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools urllib3: proxy-authorization request header is not stripped during cross-origin redirects
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::highavailability", "cpe:/a:redhat:enterprise_linux:8::resilientstorage" ]
null
4.4
null
null
CVE-2020-10790
openITCOCKPIT before 3.7.3 has unnecessary files (such as Lodash files) under the web root, which leads to XSS.
[ "cpe:2.3:a:it-novum:openitcockpit:*:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
GHSA-w88g-vghh-w3r5
RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the id parameter at /bulletin/bulletin_template_show.aspx.
[]
null
9.8
null
null
CVE-2022-30550
An issue was discovered in the auth component in Dovecot 2.2 and 2.3 before 2.3.20. When two passdb configuration entries exist with the same driver and args settings, incorrect username_filter and mechanism settings can be applied to passdb definitions. These incorrectly applied settings can lead to an unintended security configuration and can permit privilege escalation in certain configurations. The documentation does not advise against the use of passdb definitions that have the same driver and args settings. One such configuration would be where an administrator wishes to use the same PAM configuration or passwd file for both normal and master users but use the username_filter setting to restrict which of the users is able to be a master user.
[ "cpe:2.3:a:dovecot:dovecot:*:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.2:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2014-9308
Unrestricted file upload vulnerability in inc/amfphp/administration/banneruploaderscript.php in the WP EasyCart (aka WordPress Shopping Cart) plugin before 3.0.9 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in products/banners/.
[ "cpe:2.3:a:wpeasycart:wp_easycart:*:*:*:*:*:wordpress:*:*" ]
null
null
null
6.5
GHSA-pqfp-vjxq-57m3
The NETGEAR WNR2000v5 router allows an administrator to perform sensitive actions by invoking the apply.cgi URL on the web server of the device. This special URL is handled by the embedded web server (uhttpd) and processed accordingly. The web server also contains another URL, apply_noauth.cgi, that allows an unauthenticated user to perform sensitive actions on the device. This functionality can be exploited to change the router settings (such as the answers to the password-recovery questions) and achieve remote code execution.
[]
null
null
9.8
null
CVE-2023-3044
Divide-by-zero in Xpdf 4.04 due to very large page size
An excessively large PDF page size (found in fuzz testing, unlikely in normal PDF files) can result in a divide-by-zero in Xpdf's text extraction code. This is related to CVE-2022-30524, but the problem here is caused by a very large page size, rather than by a very large character coordinate.
[ "cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*" ]
null
3.3
null
null
CVE-2002-1373
Signed integer vulnerability in the COM_TABLE_DUMP package for MySQL 3.23.x before 3.23.54 allows remote attackers to cause a denial of service (crash or hang) in mysqld by causing large negative integers to be provided to a memcpy call.
[ "cpe:2.3:a:oracle:mysql:3.22.26:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.22.27:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.22.28:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.22.29:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.22.30:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.22.32:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.8:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.9:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.23:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.24:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.25:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.26:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.27:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.28:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.29:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.30:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.31:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.34:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.36:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.37:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.38:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.39:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.40:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.41:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.42:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.43:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.44:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.45:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.46:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.47:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.48:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.50:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.51:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.52:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.53:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:3.23.53a:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2017-3387
Vulnerability in the Oracle Advanced Outbound Telephony component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Outbound Telephony. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Advanced Outbound Telephony, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Advanced Outbound Telephony accessible data as well as unauthorized update, insert or delete access to some of Oracle Advanced Outbound Telephony accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
[ "cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.6:*:*:*:*:*:*:*" ]
null
null
8.2
5.8
CVE-2024-56378
libpoppler.so in Poppler through 24.12.0 has an out-of-bounds read vulnerability within the JBIG2Bitmap::combine function in JBIG2Stream.cc.
[]
null
4.3
null
null
GHSA-pqph-5jcv-cwhp
An issue was discovered on D-Link DIR-816 A2 1.10 B05 devices. An HTTP request parameter is used in command string construction in the handler function of the /goform/Diagnosis route. This could lead to command injection via shell metacharacters in the sendNum parameter.
[]
null
null
9.8
null
CVE-2007-5370
Multiple cross-site scripting (XSS) vulnerabilities in cgi-bin/dnewsweb.exe in NetWin DNewsWeb (DNews News Server) 57e1 allow remote attackers to inject arbitrary web script or HTML via the (1) group or (2) utag parameter.
[ "cpe:2.3:a:netwin:dnewsweb:57e1:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2015-7854
Buffer overflow in the password management functionality in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted key file.
[ "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:*", "cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:-:*:*:*:*:7-mode:*:*" ]
null
8.8
null
6.5
GHSA-gwhp-rphj-77jh
Vulnerability in the OSS Support Tools product of Oracle Support Tools (component: Diagnostic Assistant). The supported version that is affected is Prior to 2.12.41. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise OSS Support Tools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all OSS Support Tools accessible data. CVSS 3.1 Base Score 4.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N).
[]
null
null
null
null
CVE-2024-47349
WordPress WPMobile.App plugin <= 11.50 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPMobile.App allows Reflected XSS.This issue affects WPMobile.App: from n/a through 11.50.
[]
null
7.1
null
null
GHSA-wrfg-qw24-93h8
When a BIG-IP PEM classification profile is configured on a UDP virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. This issue affects classification engines using signatures released between 09-08-2022 and 02-16-2023. See the table in the F5 Security Advisory for a complete list of affected classification signature files.  NOTE: Software versions which have reached End of Technical Support (EoTS) are not evaluated
[]
null
7.5
null
null
CVE-2017-13844
An issue was discovered in certain Apple products. iOS before 11.1 is affected. The issue involves the "Messages" component. It allows physically proximate attackers to view arbitrary photos via a Reply With Message action in the lock-screen state.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
null
null
2.4
2.1
CVE-2019-13953
An exploitable authentication bypass vulnerability exists in the Bluetooth Low Energy (BLE) authentication module of YI M1 Mirrorless Camera V3.2-cn. An attacker can send a set of BLE commands to trigger this vulnerability, resulting in sensitive data leakage (e.g., personal photos). An attacker can also control the camera to record or take a picture after bypassing authentication.
[ "cpe:2.3:o:xiaoyi:yi_m1_mirrorless_camera_firmware:3.2-cn:*:*:*:*:*:*:*", "cpe:2.3:h:xiaoyi:yi_m1_mirrorless_camera:-:*:*:*:*:*:*:*" ]
null
null
8.8
8.3
GHSA-p357-vv6x-p853
initscripts in Red Hat Enterprise Linux 4 does not properly handle certain environment variables when /sbin/service is executed, which allows local users with sudo permissions for /sbin/service to gain root privileges via unknown vectors.
[]
null
null
null
null
CVE-2018-7161
All versions of Node.js 8.x, 9.x, and 10.x are vulnerable and the severity is HIGH. An attacker can cause a denial of service (DoS) by causing a node server providing an http2 server to crash. This can be accomplished by interacting with the http2 server in a manner that triggers a cleanup bug where objects are used in native code after they are no longer available. This has been addressed by updating the http2 implementation.
[ "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*" ]
null
7.5
null
7.8
GHSA-w827-crcv-xp2x
AOL Instant Messenger (AIM) 4.7 and earlier allows remote attackers to cause a denial of service (application crash) via a large number of different fonts followed by an HTML HR tag.
[]
null
null
null
null
GHSA-66rx-5xf7-qhwq
Inappropriate implementation in Background Fetch API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.
[]
null
4.3
null
null
CVE-2007-5633
Speedfan.sys in Alfredo Milani Comparetti SpeedFan 4.33, when used on Microsoft Windows Vista x64, allows local users to read or write arbitrary MSRs, and gain privileges and load unsigned drivers, via the (1) IOCTL_RDMSR 0x9C402438 and (2) IOCTL_WRMSR 0x9C40243C IOCTLs to \Device\speedfan, as demonstrated by an IOCTL_WRMSR action on MSR_LSTAR.
[ "cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*", "cpe:2.3:a:almico:speedfan:4.33:*:*:*:*:*:*:*" ]
null
null
null
7.2
CVE-2023-22332
Information disclosure vulnerability exists in Pgpool-II 4.4.0 to 4.4.1 (4.4 series), 4.3.0 to 4.3.4 (4.3 series), 4.2.0 to 4.2.11 (4.2 series), 4.1.0 to 4.1.14 (4.1 series), 4.0.0 to 4.0.21 (4.0 series), All versions of 3.7 series, All versions of 3.6 series, All versions of 3.5 series, All versions of 3.4 series, and All versions of 3.3 series. A specific database user's authentication information may be obtained by another database user. As a result, the information stored in the database may be altered and/or database may be suspended by a remote attacker who successfully logged in the product with the obtained credentials.
[ "cpe:2.3:a:pgpool:pgpool-ii:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
CVE-2018-3972
An exploitable code execution vulnerability exists in the Levin deserialization functionality of the Epee library, as used in Monero 'Lithium Luna' (v0.12.2.0-master-ffab6700) and other cryptocurrencies. A specially crafted network packet can cause a logic flaw, resulting in code execution. An attacker can send a packet to trigger this vulnerability.
[ "cpe:2.3:a:getmonero:monero:0.12.2.0:*:*:*:*:*:*:*" ]
null
null
10
null
PYSEC-2022-175
null
Insecure Temporary File in GitHub repository horovod/horovod prior to 0.24.0.
[]
null
null
null
null
GHSA-423m-g5gq-97wq
Cross-site scripting (XSS) vulnerability in MediaWiki 1.19.9 before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to inject arbitrary web script or HTML via unspecified CSS values.
[]
null
null
null
null
GHSA-fch9-7g2p-f49f
IBM QRadar Advisor 1.0.0 through 2.6.5 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks.
[]
null
4.1
null
null
CVE-2024-48768
An issue in almaodo GmbH appinventor.ai_google.almando_control 2.3.1 allows a remote attacker to obtain sensitive information via the firmware update process
[ "cpe:2.3:o:almando:almando_control_firmware:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-rv6h-gcx5-h6mx
Cross-site scripting (XSS) vulnerability in module/search/function.php in Ganesha Digital Library (GDL) 4.2 allows remote attackers to inject arbitrary web script or HTML via the keyword parameter in a ByEge action.
[]
null
null
null
null
GHSA-2xpq-p284-h385
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
[]
null
null
null
null
CVE-2021-35540
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.28. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 5.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
cisco-sa-20181003-ind-csrf
Cisco Industrial Network Director Cross-Site Request Forgery Vulnerability
A vulnerability in the web-based management interface of Cisco Industrial Network Director could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. The vulnerability is due to insufficient CSRF protections for the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious, customized link. A successful exploit could allow the attacker to perform arbitrary actions on the affected device via a web browser and with the privileges of the user. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-ind-csrf ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-ind-csrf"]
[]
null
null
4.3
null
CVE-2005-1326
Buffer overflow in VooDoo cIRCle BOTNET before 1.0.33 allows remote authenticated attackers to cause a denial of service (client crash) via a crafted packet.
[ "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.22:*:*:*:*:*:*:*", "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.23:*:*:*:*:*:*:*", "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.24:*:*:*:*:*:*:*", "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.25:*:*:*:*:*:*:*", "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.26:*:*:*:*:*:*:*", "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.27:*:*:*:*:*:*:*", "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.28:*:*:*:*:*:*:*", "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.29:*:*:*:*:*:*:*", "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.30:*:*:*:*:*:*:*", "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.31:*:*:*:*:*:*:*", "cpe:2.3:a:voodoo_circle:voodoo_circle:1.0.32:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-47p7-xfcc-4pv9
php-imap vulnerable to RCE through a directory traversal vulnerability
SummaryAn unsanitized attachment filename allows any unauthenticated user to leverage a directory traversal vulnerability which results in a remote code execution vulnerability.DetailsAn attacker can send an email with a malicious attachment to the inbox, which gets crawled with webklex/php-imap or webklex/laravel-imap. Prerequisite for the vulnerability is that the script stores the attachments without providing a `$filename`, or providing an unsanitized `$filename`, in `src/Attachment::save(string $path, string $filename = null)` (https://github.com/Webklex/php-imap/blob/5.2.0/src/Attachment.php#L251-L255). In this case, where no `$filename` gets passed into the `Attachment::save()` method, the package would use a series of unsanitized and insecure input values from the mail as fallback (https://github.com/Webklex/php-imap/blob/5.2.0/src/Attachment.php#L252). Even if a developer passes a `$filename` into the `Attachment::save()` method, e.g. by passing the name or filename of the mail attachment itself (from email headers), the input values never get sanitized by the package. There is also no restriction about the file extension (e.g. ".php") or the contents of a file. This allows an attacker to upload malicious code of any type and content at any location where the underlying user has write permissions. The attacker can also overwrite existing files and inject malicious code into files that, e.g. get executed by the system via cron, requests,... The official documentation only shows examples of `Attachment::save()` without providing the `$filename` (https://www.php-imap.com/api/attachment), which makes this vulnerability even more widespread.PoCsend an email with a malicious attachment to an inbox, which gets crawled by the packagecrawl email with malicious attachmentstore the attachment with `Attachment::save('/path/to/storage')` without providing a `$filename` valueImpactThis is a remote code execution vulnerability that is made possible through a directory traversal vulnerability. Every application that stores attachments with `Attachment::save()` without providing a `$filename` or passing unsanitized user input is affected by this attack.
[]
null
9
null
null
GHSA-g4fg-5mvh-6qmq
The Photo Gallery by 10Web WordPress plugin before 1.8.33 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
[]
null
3.5
null
null
CVE-2024-10312
Exclusive Addons for Elementor <= 2.7.4 - Authenticated (Contributor+) Sensitive Information Exposure via Elementor Templates
The Exclusive Addons for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.7.4 via the render function in elements/tabs/tabs.php. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive private, pending, and draft template data.
[]
null
4.3
null
null
RHSA-2024:6030
Red Hat Security Advisory: python3 security update
python: incorrect IPv4 and IPv6 private ranges
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
3.7
null
null
GHSA-mw6x-vg34-fr9v
A remote code execution vulnerability exists in Microsoft Office when the software fails to properly handle objects in memory, aka "Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8509, CVE-2017-8510, CVE-2017-8511, CVE-2017-8512, and CVE-2017-0260.
[]
null
null
7.8
null
RHSA-2018:1661
Red Hat Security Advisory: qemu-kvm security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:rhel_aus:7.2::server", "cpe:/o:redhat:rhel_e4s:7.2::server", "cpe:/o:redhat:rhel_tus:7.2::server" ]
null
null
5.6
null
GHSA-q2x2-wjjv-pmmp
A Reflected Cross Site Scripting (XSS) vulnerability was found in /ifscfinder/index.php in PHPGurukul IFSC Code Finder Project v1.0, which allows remote attackers to execute arbitrary code via the "searchifsccode" parameter.
[]
null
8.8
null
null
CVE-2022-0604
Heap buffer overflow in Tab Groups in Google Chrome prior to 98.0.4758.102 allowed an attacker who convinced a user to install a malicious extension and engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
GHSA-536w-ccgx-f4pc
A vulnerability exists in Arista’s Cloud EOS VM / vEOS 4.23.2M and below releases in the 4.23.x train, 4.22.4M and below releases in the 4.22.x train, 4.21.3M to 4.21.9M releases in the 4.21.x train, 4.21.3FX-7368.*, 4.21.4-FCRFX.*, 4.21.4.1, 4.21.7.1, 4.22.2.0.1, 4.22.2.2.1, 4.22.3.1, and 4.23.2.1 Router code in a scenario where TCP MSS options are configured.
[]
null
null
null
null
CVE-2023-46819
Apache OFBiz: Execution of Solr plugin queries without authentication
Missing Authentication in Apache Software Foundation Apache OFBiz when using the Solr plugin. This issue affects Apache OFBiz: before 18.12.09.  Users are recommended to upgrade to version 18.12.09
[ "cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
RHSA-2020:2619
Red Hat Security Advisory: Red Hat Fuse 7.6.0 on EAP security update
apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default
[ "cpe:/a:redhat:jboss_fuse:7" ]
null
null
7.3
null
CVE-2020-28200
The Sieve engine in Dovecot before 2.3.15 allows Uncontrolled Resource Consumption, as demonstrated by a situation with a complex regular expression for the regex extension.
[ "cpe:2.3:a:dovecot:dovecot:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*" ]
null
4.3
null
null
GHSA-x37p-5rxc-rc3h
XnSoft XnView Classic RWZ File Parsing Integer Underflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of XnSoft XnView Classic. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of RWZ files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer underflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22913.
[]
null
null
7.8
null
GHSA-xh24-4hr4-phwj
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in NotFound Include URL allows Path Traversal. This issue affects Include URL: from n/a through 0.3.5.
[]
null
6.5
null
null
CVE-2024-2043
The EleForms – All In One Form Integration including DB for Elementor plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check when downloading form submissions in all versions up to, and including, 2.9.9.7. This makes it possible for unauthenticated attackers to view form submissions.
[]
null
5.3
null
null
CVE-2023-51739
Stored Cross Site Scripting Vulnerability in Skyworth Router
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Device Name parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system. Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
[ "cpe:2.3:o:skyworthdigital:cm5100_firmware:4.1.1.24:*:*:*:*:*:*:*", "cpe:2.3:h:skyworthdigital:cm5100:-:*:*:*:*:*:*:*" ]
null
6.9
null
null
GHSA-xc67-gr6r-x37f
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in web-mv.de ResAds allows SQL Injection.This issue affects ResAds: from n/a through 2.0.5.
[]
null
7.6
null
null
GHSA-xhj3-gjcc-48pc
Integer signedness error in the CIFSFindNext function in fs/cifs/cifssmb.c in the Linux kernel before 3.1 allows remote CIFS servers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large length value in a response to a read request for a directory.
[]
null
8.8
null
null
CVE-2022-47661
GPAC MP4Box 2.1-DEV-rev649-ga8f438d20 is vulnerable to Buffer Overflow via media_tools/av_parsers.c:4988 in gf_media_nalu_add_emulation_bytes
[ "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2021-0182
Uncontrolled resource consumption in the Intel(R) HAXM software before version 7.6.6 may allow an unauthenticated user to potentially enable information disclosure via local access.
[ "cpe:2.3:a:intel:hardware_accelerated_execution_manager:*:*:*:*:*:*:*:*" ]
null
6.2
null
2.1
GHSA-5mr2-cw9g-xq6c
A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerability exist because the affected software improperly validates Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit this vulnerability by sending a user a malicious ARF or WRF file via a link or email attachment and persuading the user to open the file with the affected software. Successful exploitation could allow the attacker to execute arbitrary code on the affected system.
[]
null
null
7.8
null
GHSA-fw5x-x7h2-3j3x
Arbitrary file upload vulnerability in SourceCodester Alumni Management System v 1.0 allows attackers to execute arbitrary code, via the file upload to manage_event.php.
[]
null
null
null
null
GHSA-fvfx-329r-5rr2
IBM Workload Scheduler Distributed 9.2, 9.3, 9.4, and 9.5 contains a vulnerability that could allow a local user to write files as root in the file system, which could allow the attacker to gain root privileges. IBM X-Force ID: 155997.
[]
null
null
null
null
GHSA-j654-gf62-fhpj
IBM InfoSphere Information Server 11.5 and 11.7 is affected by an information disclosure vulnerability. Sensitive information in an error message may be used to conduct further attacks against the system. IBM X-Force ID: 159945.
[]
null
4.3
null
null
GHSA-2m72-x5wj-734p
The instruction decoder in arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel before 3.18-rc2 does not properly handle invalid instructions, which allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a crafted application that triggers (1) an improperly fetched instruction or (2) an instruction that occupies too many bytes. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-8480.
[]
null
null
null
null
GHSA-c864-h25r-8gjj
Vulnerability in the Oracle Hospitality Cruise Fleet Management component of Oracle Hospitality Applications (subcomponent: BaseMasterPage). The supported version that is affected is 9.0.2.0. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Hospitality Cruise Fleet Management executes to compromise Oracle Hospitality Cruise Fleet Management. While the vulnerability is in Oracle Hospitality Cruise Fleet Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Hospitality Cruise Fleet Management accessible data as well as unauthorized access to critical data or complete access to all Oracle Hospitality Cruise Fleet Management accessible data. CVSS 3.0 Base Score 8.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N).
[]
null
null
8.4
null
GHSA-58mm-jjg7-f87h
Missing Authorization vulnerability in FeedbackWP kk Star Ratings allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects kk Star Ratings: from n/a through 5.4.3.
[]
null
5.3
null
null
GHSA-cmjv-gqcf-65cw
A Cross Site Scripting (XSS) vulnerability exists in DanPros htmly 2.8.1 via the Description field in (1) admin/config, and (2) index.php pages.
[]
null
4.8
null
null
GHSA-jhgr-2wpg-7p64
In the Linux kernel, the following vulnerability has been resolved:RDMA/rtrs: Ensure 'ib_sge list' is accessibleMove the declaration of the 'ib_sge list' variable outside the 'always_invalidate' block to ensure it remains accessible for use throughout the function.Previously, 'ib_sge list' was declared within the 'always_invalidate' block, limiting its accessibility, then caused a 'BUG: kernel NULL pointer dereference'[1]. ? __die_body.cold+0x19/0x27 ? page_fault_oops+0x15a/0x2d0 ? search_module_extables+0x19/0x60 ? search_bpf_extables+0x5f/0x80 ? exc_page_fault+0x7e/0x180 ? asm_exc_page_fault+0x26/0x30 ? memcpy_orig+0xd5/0x140 rxe_mr_copy+0x1c3/0x200 [rdma_rxe] ? rxe_pool_get_index+0x4b/0x80 [rdma_rxe] copy_data+0xa5/0x230 [rdma_rxe] rxe_requester+0xd9b/0xf70 [rdma_rxe] ? finish_task_switch.isra.0+0x99/0x2e0 rxe_sender+0x13/0x40 [rdma_rxe] do_task+0x68/0x1e0 [rdma_rxe] process_one_work+0x177/0x330 worker_thread+0x252/0x390 ? __pfx_worker_thread+0x10/0x10This change ensures the variable is available for subsequent operations that require it.[1] https://lore.kernel.org/linux-rdma/6a1f3e8f-deb0-49f9-bc69-a9b03ecfcda7@fujitsu.com/
[]
null
5.5
null
null
CVE-2022-39015
Under certain conditions, BOE AdminTools/ BOE SDK allows an attacker to access information which would otherwise be restricted.
[ "cpe:2.3:a:sap:business_objects_business_intelligence_platform:420:*:*:*:*:*:*:*", "cpe:2.3:a:sap:business_objects_business_intelligence_platform:430:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-9x25-pv9q-883c
The SYN cache (syncache) and SYN cookie (syncookie) mechanism in FreeBSD 4.5 and earlier allows remote attackers to cause a denial of service (crash) (1) via a SYN packet that is accepted using syncookies that causes a null pointer to be referenced for the socket's TCP options, or (2) by killing and restarting a process that listens on the same socket, which does not properly clear the old inpcb pointer on restart.
[]
null
null
null
null
GHSA-hrc4-p2h3-pjqw
Liferay Portal and Liferay DXP Vulnerable to Cross-Site Scripting (XSS)
Cross-site scripting (XSS) vulnerability on Liferay Portal 7.4.3.82 through 7.4.3.128, and Liferay DXP 2024.Q3.0, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.12, 2023.Q4.0 through 2023.Q4.10, 2023.Q3.1 through 2023.Q3.10, 7.4 update 82 through update 92 in the Frontend JS module's layout-taglib/__liferay__/index.js allows remote attackers to inject arbitrary web script or HTML via toastData parameter
[]
5.1
null
null
null
CVE-2018-0188
Multiple vulnerabilities in the web-based user interface (web UI) of Cisco IOS XE Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web UI of the affected software. The vulnerabilities are due to insufficient input validation of certain parameters that are passed to the affected software via the web UI. An attacker could exploit these vulnerabilities by persuading a user of the affected UI to access a malicious link or by intercepting a user request for the affected UI and injecting malicious code into the request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected UI or allow the attacker to access sensitive browser-based information on the user's system. Cisco Bug IDs: CSCuz38591, CSCvb09530, CSCvb10022.
[ "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
CVE-2006-1457
Safari on Apple Mac OS X 10.4.6, when "Open `safe' files after downloading" is enabled, will automatically expand archives, which could allow remote attackers to overwrite arbitrary files via an archive that contains a symlink.
[ "cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*" ]
null
null
null
2.6
CVE-2018-18431
An issue was discovered in DESTOON B2B 7.0. XSS exists via certain text boxes to the admin.php?moduleid=2&action=add URI.
[ "cpe:2.3:a:destoon:destoon_b2b:7.0:*:*:*:*:*:*:*" ]
null
null
4.8
3.5
CVE-2011-3531
Unspecified vulnerability in the Oracle Web Services Manager component in Oracle Fusion Middleware 11.1.1.3, 11.1.1.4, and 11.1.1.5 allows remote attackers to affect availability via unknown vectors related to Web Services Security.
[ "cpe:2.3:a:oracle:fusion_middleware:11.1.1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:11.1.1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:11.1.1.5.0:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2025-26351
A CWE-35 "Path Traversal" in the template download mechanism in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated remote attacker to read sensitive files via crafted HTTP requests.
[]
null
4.9
null
null
CVE-2020-14044
** PRODUCT NOT SUPPORTED WHEN ASSIGNED ** A Server-Side Request Forgery (SSRF) vulnerability was found in Codiad v1.7.8 and later. A user with admin privileges could use the plugin install feature to make the server request any URL via components/market/class.market.php. This could potentially result in remote code execution. NOTE: the vendor states "Codiad is no longer under active maintenance by core contributors."
[ "cpe:2.3:a:codiad:codiad:*:*:*:*:*:*:*:*" ]
null
7.2
null
6.5
CVE-2020-27801
A heap-based buffer over-read was discovered in the get_le64 function in bele.h in UPX 4.0.0 via a crafted Mach-O file.
[ "cpe:2.3:a:upx_project:upx:4.0.0:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2001-0596
Netscape Communicator before 4.77 allows remote attackers to execute arbitrary Javascript via a GIF image whose comment contains the Javascript.
[ "cpe:2.3:a:netscape:communicator:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2022-43923
IBM Maximo Application Suite 8.8.0 and 8.9.0 stores potentially sensitive information that could be read by a local user. IBM X-Force ID: 241584.
[ "cpe:2.3:a:ibm:maximo_application_suite:8.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_application_suite:8.9.0:*:*:*:*:*:*:*" ]
null
6.2
null
null
CVE-2006-4123
PHP remote file inclusion vulnerability in boitenews4/index.php in Boite de News 4.0.1 allows remote attackers to execute arbitrary PHP code via a URL in the url_index parameter.
[ "cpe:2.3:a:boite_de_news:boite_de_news:4.0.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-74hj-cr7f-ff3x
The WP Simple Anchors Links plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wpanchor shortcode in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
GHSA-pf7f-vvhc-pv8f
NVIDIA GPU software for Linux contains a vulnerability where it can expose sensitive information to an actor that is not explicitly authorized to have access to that information. A successful exploit of this vulnerability might lead to information disclosure.
[]
null
6.5
null
null
CVE-2019-15610
Improper authorization in the Circles app 0.17.7 causes retaining access when an email address was removed from a circle.
[ "cpe:2.3:a:nextcloud:circles:*:*:*:*:*:*:*:*" ]
null
4.3
null
4
GHSA-7rfp-f6jm-r63w
Unbound before 1.9.5 allows an out-of-bounds write via a compressed name in rdata_copy.
[]
null
9.8
null
null
GHSA-cf2r-vpqc-55g6
An attacker with access to an HX 10.0.0 and previous versions, may send specially-crafted data to the HX console. The malicious detection would then trigger file parsing containing exponential entity expansions in the consumer process thus causing a Denial of Service.
[]
null
5.9
null
null
GHSA-2qqq-gmvr-p2rw
YugabyteDB v2.21.1.0 was discovered to contain a buffer overflow via the "insert into" parameter.
[]
null
7.5
null
null
RHSA-2006:0758
Red Hat Security Advisory: firefox security update
security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
CVE-2021-3768
Cross-site Scripting (XSS) - Stored in bookstackapp/bookstack
bookstack is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
[ "cpe:2.3:a:bookstackapp:bookstack:*:*:*:*:*:*:*:*" ]
null
null
5.4
null
RHSA-2024:3346
Red Hat Security Advisory: git-lfs security update
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.9
null
null
CVE-2019-3571
An input validation issue affected WhatsApp Desktop versions prior to 0.3.3793 which allows malicious clients to send files to users that would be displayed with a wrong extension.
[ "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:desktop:mac_os_x:*:*", "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:desktop:windows:*:*" ]
null
null
5.3
5
CVE-2008-7006
Free PHP VX Guestbook 1.06 allows remote attackers to bypass authentication and download a backup of the database via a direct request to admin/backupdb.php.
[ "cpe:2.3:a:phpversion:php_vx_guestbook:1.06:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2023-4622
Use-after-free in Linux kernel's af_unix component
A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free. We recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-fmqq-qq9r-jcq6
Multiple cross-site scripting (XSS) vulnerabilities in Booktree 5.x before 5.x-7.3 and 6.x before 6.x-1.1, a module for Drupal, allow remote attackers to inject arbitrary web script or HTML via the (1) node title and (2) node body in a tree root page.
[]
null
null
null
null
CVE-2024-49394
Mutt: neomutt: in-reply-to email header field it not protected by cryptograpic signing
In mutt and neomutt the In-Reply-To email header field is not protected by cryptographic signing which allows an attacker to reuse an unencrypted but signed email message to impersonate the original sender.
[ "cpe:/o:redhat:enterprise_linux:7", "cpe:/o:redhat:enterprise_linux:8", "cpe:/o:redhat:enterprise_linux:9", "cpe:2.3:a:mutt:mutt:-:*:*:*:*:*:*:*", "cpe:2.3:a:neomutt:neomutt:-:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*" ]
null
5.3
null
null
CVE-2022-1212
Use-After-Free in str_escape in mruby/mruby in mruby/mruby
Use-After-Free in str_escape in mruby/mruby in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.
[ "cpe:2.3:a:mruby:mruby:*:*:*:*:*:*:*:*", "cpe:2.3:a:mruby:mruby:3.1.0:rc:*:*:*:*:*:*", "cpe:2.3:a:mruby:mruby:3.1.0:rc2:*:*:*:*:*:*" ]
null
null
9.3
null
CVE-2024-28110
Go SDK for CloudEvents's use of WithRoundTripper to create a Client leaks credentials
Go SDK for CloudEvents is the official CloudEvents SDK to integrate applications with CloudEvents. Prior to version 2.15.2, using cloudevents.WithRoundTripper to create a cloudevents.Client with an authenticated http.RoundTripper causes the go-sdk to leak credentials to arbitrary endpoints. When the transport is populated with an authenticated transport, then http.DefaultClient is modified with the authenticated transport and will start to send Authorization tokens to any endpoint it is used to contact. Version 2.15.2 patches this issue.
[ "cpe:2.3:a:cloudevents:sdk_go:*:*:*:*:*:*:*:*" ]
null
7.5
null
null