id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
listlengths
0
4.89k
CVE-2022-44718
An issue was discovered in NetScout nGeniusONE 6.3.2 build 904. Open Redirection can occur (issue 2 of 2). After successful login, an attacker must visit the vulnerable parameter and inject a crafted payload to successfully redirect to an unknown host. The attack vector is Network, and the Attack Complexity required is High. Privileges required are administrator, User Interaction is required, and Scope is unchanged. The user must visit the vulnerable parameter and inject a crafted payload to successfully redirect to an unknown host.
[ "cpe:2.3:a:netscout:ngeniusone:6.3.2:build904:*:*:*:*:*:*" ]
CVE-2024-0306
Kashipara Dynamic Lab Management System admin_login_process.php sql injection
A vulnerability was found in Kashipara Dynamic Lab Management System up to 1.0. It has been classified as critical. This affects an unknown part of the file /admin/admin_login_process.php. The manipulation of the argument admin_password leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249873 was assigned to this vulnerability.
[ "cpe:2.3:a:lopalopa:dynamic_lab_management_system:*:*:*:*:*:*:*:*" ]
CVE-2016-1032
Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, and CVE-2016-1033.
[ "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*", "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*", "cpe:2.3:a:adobe:air_desktop_runtime:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*" ]
CVE-2023-1226
Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Medium)
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
GHSA-8x54-9cjv-7vch
This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users.This issue affects CDeX application versions through 5.7.1.
[]
CVE-2024-39708
An issue was discovered in the Agent in Delinea Privilege Manager (formerly Thycotic Privilege Manager) before 12.0.1096 on Windows. Sometimes, a non-administrator user can copy a crafted DLL file to a temporary directory (used by .NET Shadow Copies) such that privilege escalation can occur if the core agent service loads that file.
[]
GHSA-c9wx-625j-c7mq
Microsoft Windows XP and Windows 2000, when configured to send administrative alerts and the "Do not overwrite events (clear log manually)" option is set, does not notify the administrator when the log reaches its maximum size, which allows local users and remote attackers to avoid detection.
[]
GHSA-fpqj-qcw8-hrx5
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Catch Themes Full frame allows Stored XSS.This issue affects Full frame: from n/a through 2.7.2.
[]
GHSA-wh28-gjgx-j43r
PHP remote file inclusion vulnerability in relocate-upload.php in Relocate Upload plugin before 0.20 for WordPress allows remote attackers to execute arbitrary PHP code via a URL in the abspath parameter.
[]
CVE-2023-22622
WordPress through 6.1.1 depends on unpredictable client visits to cause wp-cron.php execution and the resulting security updates, and the source code describes "the scenario where a site may not receive enough visits to execute scheduled tasks in a timely manner," but neither the installation guide nor the security guide mentions this default behavior, or alerts the user about security risks on installations with very few visits.
[ "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*" ]
CVE-2023-48341
In video decoder, there is a possible out of bounds read due to improper input validation. This could lead to local denial of service with no additional execution privileges needed
[ "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*" ]
CVE-2021-43074
An improper verification of cryptographic signature vulnerability [CWE-347] in FortiWeb 6.4 all versions, 6.3.16 and below, 6.2 all versions, 6.1 all versions, 6.0 all versions; FortiOS 7.0.3 and below, 6.4.8 and below, 6.2 all versions, 6.0 all versions; FortiSwitch 7.0.3 and below, 6.4.10 and below, 6.2 all versions, 6.0 all versions; FortiProxy 7.0.1 and below, 2.0.7 and below, 1.2 all versions, 1.1 all versions, 1.0 all versions may allow an attacker to decrypt portions of the administrative session management cookie if able to intercept the latter.
[ "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortiswitch:*:*:*:*:*:*:*:*" ]
GHSA-9jpw-fc84-wc8p
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Enej Bajgoric / Gagan Sandhu / CTLT DEV User Avatar plugin <= 1.4.11 versions.
[]
GHSA-w3fr-m559-rfgv
In notifyProfileAdded and notifyProfileRemoved of SipService.java, there is a possible way to retrieve SIP account names due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-176496502
[]
GHSA-2m9f-g829-9w5c
Cross-site scripting (XSS) vulnerability in Sun ONE Web Server 6.0 SP9 and earlier, Java System Web Server 6.1 SP4 and earlier, Sun ONE Application Server 7 Platform and Standard Edition Update 6 and earlier, and Java System Application Server 7 2004Q2 Standard and Enterprise Edition Update 2 and earlier, allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors, possibly involving error messages.
[]
GHSA-vwch-x387-pmjh
An issue was discovered in the SportsTeams extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. SportsTeams: Special:SportsManagerLogo and Special:SportsTeamsManagerLogo do not check for the sportsteamsmanager user right, and thus an attacker may be able to affect pages that are concerned with sports teams.
[]
CVE-2024-21089
Vulnerability in the Oracle Concurrent Processing product of Oracle E-Business Suite (component: Request Submission and Scheduling). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Concurrent Processing. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Concurrent Processing accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
[ "cpe:2.3:a:oracle:concurrent_processing:12.2.3-12.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:concurrent_processing:*:*:*:*:*:*:*:*" ]
CVE-2018-2928
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: RAD). The supported version that is affected is 11.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Solaris. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Solaris accessible data as well as unauthorized access to critical data or complete access to all Solaris accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N).
[ "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*" ]
CVE-2018-13920
Use-after-free condition due to Improper handling of hrtimers when the PMU driver tries to access its events in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in MDM9206, MDM9607, MDM9650, MSM8909W, QCS605, Qualcomm 215, SD 425, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 712 / SD 710 / SD 670, SD 820A, SD 845 / SD 850, SD 855, SDM439, SDM630, SDM660, SDX24
[ "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qm215:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_439_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_439:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_429_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_429:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_632_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_632:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_636:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_712_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_712:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_710_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_710:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_670_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_670:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_855_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_855:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*" ]
GHSA-8pm6-575p-r3mv
An Allocation of Resources Without Limits or Throttling vulnerability in the kernel of Juniper Networks Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS).In specific cases the state of TCP sessions that are terminated is not cleared, which over time leads to an exhaustion of resources, preventing new connections to the control plane from being established.A continuously increasing number of connections shown by:user@host > show system connectionsis indicative of the problem. To recover the respective RE needs to be restarted manually.This issue only affects IPv4 but does not affect IPv6. This issue only affects TCP sessions established in-band (over an interface on an FPC) but not out-of-band (over the management ethernet port on the routing-engine).This issue affects Junos OS Evolved:All versions before 21.4R3-S9-EVO,22.2 versions before 22.2R3-S4-EVO,22.4 version before 22.4R3-S3-EVO,23.2 versions before 23.2R2-S1-EVO,23.4 versions before 23.4R2-EVO.
[]
CVE-2024-57640
An issue in the dc_add_int component of openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
[]
CVE-2025-27133
WeGIA has SQL Injection endpoint at 'dao/pet/adicionar_tipo_exame.php' parameter 'tipo_exame'
WeGIA is a Web manager for charitable institutions. A SQL Injection vulnerability was discovered in the WeGIA application prior to version 3.2.15 at the `adicionar_tipo_exame.php` endpoint. This vulnerability allows an authorized attacker to execute arbitrary SQL queries, allowing access to sensitive information. Version 3.2.15 contains a patch for the issue.
[]
CVE-2021-22453
A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to cause nearby process crash.
[ "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*" ]
CVE-2017-6253
NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape where the size of an input buffer is not validated which may lead to denial of service or potential escalation of privileges
[ "cpe:2.3:a:nvidia:gpu_driver:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
GHSA-f7jj-rg8f-cvm6
Multiple cross-site scripting (XSS) vulnerabilities in Open Classifieds 1.7.0.2 allow remote attackers to inject arbitrary web script or HTML via the (1) desc, (2) price, (3) title, and (4) place parameters to index.php and the (5) subject parameter to contact.htm, related to content/contact.php.
[]
CVE-2014-2587
SQL injection vulnerability in jsp/reports/ReportsAudit.jsp in McAfee Asset Manager 6.6 allows remote authenticated users to execute arbitrary SQL commands via the username of an audit report (aka user parameter).
[ "cpe:2.3:a:mcafee:asset_manager:6.6:*:*:*:*:*:*:*" ]
CVE-2022-41575
A credential-exposure vulnerability in the support-bundle mechanism in Gradle Enterprise 2022.3 through 2022.3.3 allows remote attackers to access a subset of application data (e.g., cleartext credentials). This is fixed in 2022.3.3.
[ "cpe:2.3:a:gradle:enterprise:*:*:*:*:*:*:*:*" ]
GHSA-5gq4-mx55-wm2m
IBM WebSphere Commerce 6.x through 6.0.0.11 and 7.x through 7.0.0.9 allows remote authenticated Commerce Accelerator administrators to obtain sensitive information via unspecified vectors.
[]
CVE-2018-21148
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D7800 before 1.0.1.34, DM200 before 1.0.0.50, R6100 before 1.0.1.22, R7500 before 1.0.0.122, R7500v2 before 1.0.3.26, R7800 before 1.0.2.42, R8900 before 1.0.3.10, R9000 before 1.0.3.10, WNDR3700v4 before 1.0.2.96, WNDR4300 before 1.0.2.98, WNDR4300v2 before 1.0.0.54, WNDR4500v3 before 1.0.0.54, and WNR2000v5 before 1.0.0.64.
[ "cpe:2.3:o:netgear:d7800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d7800:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:dm200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:dm200:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6100:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7500:-:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7500:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8900:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wndr3700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndr3700:v4:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndr4300:-:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndr4300:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wndr4500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndr4500:v3:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wnr2000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wnr2000:v5:*:*:*:*:*:*:*" ]
CVE-2020-26561
Belkin LINKSYS WRT160NL 1.0.04.002_US_20130619 devices have a stack-based buffer overflow vulnerability because of sprintf in create_dir in mini_httpd. Successful exploitation leads to arbitrary code execution. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
[ "cpe:2.3:o:belkin:linksys_wrt_160nl_firmware:1.0.04:build_2:*:*:*:*:*:*", "cpe:2.3:h:belkin:linksys_wrt_160nl:-:*:*:*:*:*:*:*" ]
CVE-2014-4222
Unspecified vulnerability in the Oracle HTTP Server component in Oracle Fusion Middleware 11.1.1.7.0 and 12.1.2.0 allows remote authenticated users to affect confidentiality via vectors related to plugin 1.1.
[ "cpe:2.3:a:oracle:fusion_middleware:11.1.1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:12.1.2.0.0:*:*:*:*:*:*:*" ]
CVE-2022-30694
The login endpoint /FormLogin in affected web services does not apply proper origin checking. This could allow authenticated remote attackers to track the activities of other users via a login cross-site request forgery attack.
[ "cpe:2.3:a:siemens:simatic_s7-1500_software_controller:-:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_s7-plcsim_advanced:-:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc_runtime:-:*:*:*:advanced:*:*:*", "cpe:2.3:o:siemens:6es7154-8fb01-0ab0_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6es7154-8fb01-0ab0:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:6es7154-8ab01-0ab0_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6es7154-8ab01-0ab0:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:6es7154-8fx00-0ab0_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6es7154-8fx00-0ab0:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:6es7151-8ab01-0ab0_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6es7151-8ab01-0ab0:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:6es7151-8fb01-0ab0_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6es7151-8fb01-0ab0:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:6es7314-6eh04-0ab0_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6es7314-6eh04-0ab0:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:6es7315-2eh14-0ab0_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6es7315-2eh14-0ab0:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:6es7315-2fj14-0ab0_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6es7315-2fj14-0ab0:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:6es7315-7tj10-0ab0_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6es7315-7tj10-0ab0:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:6es7317-2ek14-0ab0_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6es7317-2ek14-0ab0:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:6es7317-2fk14-0ab0_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6es7317-2fk14-0ab0:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:6es7317-7tk10-0ab0_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6es7317-7tk10-0ab0:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:6es7317-7ul10-0ab0_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6es7317-7ul10-0ab0:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:6es7318-3el01-0ab0_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6es7318-3el01-0ab0:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:6es7318-3fl01-0ab0_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6es7318-3fl01-0ab0:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:6ag1151-8ab01-7ab0_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6ag1151-8ab01-7ab0:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:6ag1151-8fb01-2ab0_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6ag1151-8fb01-2ab0:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:6ag1314-6eh04-7ab0_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6ag1314-6eh04-7ab0:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:6ag1315-2eh14-7ab0_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6ag1315-2eh14-7ab0:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:6ag1315-2fj14-2ab0_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6ag1315-2fj14-2ab0:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:6ag1317-2ek14-7ab0_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6ag1317-2ek14-7ab0:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:6ag1317-2fk14-2ab0_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6ag1317-2fk14-2ab0:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinumerik_one_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:sinumerik_one:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_pcs_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_pcs:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_drive_controller_cpu_1504d_tf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_drive_controller_cpu_1504d_tf:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_drive_controller_cpu_1507d_tf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_drive_controller_cpu_1507d_tf:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-400_pn\\/dp_v7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-400_pn\\/dp_v7:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-400_pn\\/dp_v6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-400_pn\\/dp_v6:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1507s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1507s:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1507s_f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1507s_f:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1508s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1508s:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1508s_f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1508s_f:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1510sp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1510sp:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1510sp-1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1510sp-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1511-1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1511-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1511-1_pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1511-1_pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1511c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1511c:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1511c-1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1511c-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1511f-1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1511f-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1511f-1_pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1511f-1_pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1511t-1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1511t-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1511tf-1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1511tf-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1512c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1512c:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1512c-1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1512c-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1512sp-1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1512sp-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1512spf-1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1512spf-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1513-1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1513-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1513-1_pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1513-1_pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1513f-1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1513f-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1513f-1_pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1513f-1_pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1513r-1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1513r-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_151511c-1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_151511c-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_151511f-1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_151511f-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1515-2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1515-2:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1515-2_pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1515-2_pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1515f-2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1515f-2:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1515f-2_pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1515f-2_pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1515r-2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1515r-2:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1515t-2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1515t-2:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1515tf-2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1515tf-2:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1516-3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1516-3:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1516-3_dp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1516-3_dp:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1516-3_pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1516-3_pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1516-3_pn\\/dp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1516-3_pn\\/dp:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1516f-3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1516f-3:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1516f-3_pn\\/dp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1516f-3_pn\\/dp:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1516pro_f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1516pro_f:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1516pro-2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1516pro-2:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1516t-3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1516t-3:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1516tf-3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1516tf-3:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1517-3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1517-3:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1517-3_dp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1517-3_dp:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1517-3_pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1517-3_pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1517-3_pn\\/dp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1517-3_pn\\/dp:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1517f-3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1517f-3:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1517f-3_pn\\/dp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1517f-3_pn\\/dp:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1517tf-3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1517tf-3:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518-4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518-4:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518-4_dp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518-4_dp:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518-4_pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518-4_pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518-4_pn\\/dp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518-4_pn\\/dp:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518-4_pn\\/dp_mfp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518-4_pn\\/dp_mfp:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518f-4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518f-4:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518f-4_pn\\/dp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518f-4_pn\\/dp:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518hf-4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518hf-4:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518t-4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518t-4:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518tf-4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518tf-4:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_15pro-2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_15pro-2:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_15prof-2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_15prof-2:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_cpu_1513pro-2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_cpu_1513pro-2:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_cpu_cpu_1513prof-2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_cpu_cpu_1513prof-2:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1200_cpu_12_1211c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1200_cpu_12_1211c:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1200_cpu_12_1212c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1200_cpu_12_1212c:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1200_cpu_12_1212fc_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1200_cpu_12_1212fc:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1200_cpu_12_1214c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1200_cpu_12_1214c:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1200_cpu_12_1214fc_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1200_cpu_12_1214fc:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1200_cpu_12_1215c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1200_cpu_12_1215c:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1200_cpu_12_1215fc_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1200_cpu_12_1215fc:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1200_cpu_12_1217c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1200_cpu_12_1217c:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1200_cpu_1211c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1200_cpu_1211c:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1200_cpu_1212c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1200_cpu_1212c:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1200_cpu_1212fc_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1200_cpu_1212fc:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1200_cpu_1214_fc_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1200_cpu_1214_fc:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1200_cpu_1214c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1200_cpu_1214c:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1200_cpu_1214fc_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1200_cpu_1214fc:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1200_cpu_1215_fc_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1200_cpu_1215_fc:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1200_cpu_1215c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1200_cpu_1215c:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1200_cpu_1215fc_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1200_cpu_1215fc:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1200_cpu_1217c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1200_cpu_1217c:-:*:*:*:*:*:*:*" ]
GHSA-p4q6-rxpw-36xr
WordPress W3 Total Cache Plugin 0.9.2.8 has a Remote PHP Code Execution Vulnerability
[]
CVE-2023-37017
Open5GS MME versions <= 2.6.4 contain an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send an `S1Setup Request` message missing a required `Global eNB ID` field to repeatedly crash the MME, resulting in denial of service.
[]
CVE-2023-36921
Header Injection in SAP Solution Manager (Diagnostic Agent)
SAP Solution Manager (Diagnostics agent) - version 7.20, allows an attacker to tamper with headers in a client request. This misleads SAP Diagnostics Agent to serve poisoned content to the server. On successful exploitation, the attacker can cause a limited impact on confidentiality and availability of the application.
[ "cpe:2.3:a:sap:solution_manager:7.20:*:*:*:*:*:*:*" ]
CVE-2021-46748
Insufficient bounds checking in the ASP (AMD Secure Processor) may allow an attacker to access memory outside the bounds of what is permissible to a TA (Trusted Application) resulting in a potential denial of service.
[ "cpe:2.3:o:intel:radeon_rx_vega_m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hnkqc:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkva:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkvaw:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_kit_nuc8i7hvk:-:*:*:*:*:*:*:*", "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*", "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_pro_vega_56_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_vega_56:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_pro_vega_64_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_vega_64:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3015ce:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3015e:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_4100:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_4500:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_4600hs:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_4680u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5500h:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_pro_3200g:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_pro_3200ge:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_4800hs:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_4980u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*" ]
GHSA-cchp-c7c7-jf58
A vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The firmware flaw does not properly implement access controls.
[]
GHSA-fw3v-q2x5-3q3q
Various Lexmark products have Incorrect Access Control (issue 1 of 2).
[]
GHSA-6hhm-232w-8g2c
A privilege escalation vulnerability exists in the WinRing0x64 Driver IRP 0x9c40a148 functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) can cause an adversary to obtain elevated privileges. An attacker can send a malicious IRP to trigger this vulnerability.
[]
CVE-2012-2289
EMC ApplicationXtender Desktop before 6.5 SP2 and ApplicationXtender Web Access .NET before 6.5 SP2 allow remote attackers to upload files to any location, and possibly execute arbitrary code, via unspecified vectors.
[ "cpe:2.3:a:emc:applicationxtender_desktop:*:*:*:*:*:*:*:*", "cpe:2.3:a:emc:applicationxtender_web_access_.net:*:*:*:*:*:*:*:*" ]
GHSA-mg7g-v2j9-85r8
An issue was discovered in CHICKEN Scheme through 4.12.0. When using a nonstandard CHICKEN-specific extension to allocate an SRFI-4 vector in unmanaged memory, the vector size would be used in unsanitised form as an argument to malloc(). With an unexpected size, the impact may have been a segfault or buffer overflow.
[]
CVE-2017-9607
The BL1 FWU SMC handling code in ARM Trusted Firmware before 1.4 might allow attackers to write arbitrary data to secure memory, bypass the bl1_plat_mem_check protection mechanism, cause a denial of service, or possibly have unspecified other impact via a crafted AArch32 image, which triggers an integer overflow.
[ "cpe:2.3:o:arm:arm-trusted-firmware:*:*:*:*:*:*:*:*" ]
GHSA-9x2x-p5cv-5cgv
The Ticketmeo – Sell Tickets – Event Ticketing plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 2.3.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
GHSA-x8j8-pwr7-frjw
Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.
[]
GHSA-9hv6-wmqm-882c
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
[]
GHSA-wp22-wqwx-2pc9
PHP remote file inclusion vulnerability in includes/class_image.php in PHP Pro Bid 6.05, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the fileExtension parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
CVE-2021-37737
A remote SQL injection vulnerability was discovered in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1. Aruba has released patches for ClearPass Policy Manager that address this security vulnerability.
[ "cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*" ]
CVE-2024-29066
Windows Distributed File System (DFS) Remote Code Execution Vulnerability
Windows Distributed File System (DFS) Remote Code Execution Vulnerability
[]
GHSA-5h3p-vhgq-p526
Windows Hyper-V Denial of Service Vulnerability This CVE ID is unique from CVE-2021-33755.
[]
CVE-2021-45310
Sangoma Technologies Corporation Switchvox Version 102409 is affected by an information disclosure vulnerability due to an improper access restriction. Users information such as first name, last name, acount id, server uuid, email address, profile image, number, timestamps, etc can be extracted by sending an unauthenticated HTTP GET request to the https://Switchvox-IP/main?cmd=invalid_browser.
[ "cpe:2.3:a:sangoma:switchvox:102409:*:*:*:*:*:*:*" ]
CVE-2025-29401
An arbitrary file upload vulnerability in the component /views/plugin.php of emlog pro v2.5.7 allows attackers to execute arbitrary code via uploading a crafted PHP file.
[]
CVE-2023-26281
IBM HTTP Server denial of service
IBM HTTP Server 8.5 used by IBM WebSphere Application Server could allow a remote user to cause a denial of service using a specially crafted URL. IBM X-Force ID: 248296.
[ "cpe:2.3:a:ibm:http_server:8.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:z\\/os:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*" ]
GHSA-hx65-c266-87h8
Mattermost Boards fail to properly validate a board link, allowing an attacker to crash a channel by posting a specially crafted boards link.
[]
CVE-2023-41578
Jeecg boot up to v3.5.3 was discovered to contain an arbitrary file read vulnerability via the interface /testConnection.
[ "cpe:2.3:a:jeecg:jeecg_boot:*:*:*:*:*:*:*:*" ]
GHSA-8h98-mv3j-75c6
PrintHTML API Remote Code Execution Vulnerability
[]
CVE-2024-10842
romadebrian WEB-Sekolah Backend Proses_Edit_Akun.php cross site scripting
A vulnerability, which was classified as problematic, has been found in romadebrian WEB-Sekolah 1.0. Affected by this issue is some unknown functionality of the file /Admin/Proses_Edit_Akun.php of the component Backend. The manipulation of the argument Username_Baru/Password leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:romadebrian:web-sekolah:*:*:*:*:*:*:*:*", "cpe:2.3:a:romadebrian:web-sekolah:1.0:*:*:*:*:*:*:*" ]
GHSA-42hc-v8w6-f575
A LDAP injection vulnerability exists in Tenable.sc due to improper validation of user-supplied input before returning it to users. An authenticated attacker could generate data in Active Directory using the application account through blind LDAP injection.
[]
GHSA-xq7h-vpgx-544h
The Login Window in Apple Mac OS X 10.3.9 through 10.4.9 does not properly check certain environment variables, which allows local users to gain privileges via unspecified vectors.
[]
GHSA-wmj5-3hww-4pjp
The Elementor ImageBox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the image box widget in all versions up to, and including, 1.2.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
GHSA-3cw9-2xmh-p9g8
Cross-site scripting (XSS) vulnerability in the Web UI in IBM Security QRadar SIEM 7.1.x before 7.1 MR2 Patch 12 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
[]
GHSA-v453-9c8g-w373
SQL injection vulnerability in deleteSession() in DB_eSession library 1.0.2 and earlier, as used in multiple products, allows remote attackers to execute arbitrary SQL commands via the $_sess_id_set variable, which is usually derived from PHPSESSID.
[]
GHSA-9gcj-95cr-frx9
Stack-based buffer overflow in the client for Citrix Program Neighborhood Agent for Win32 8.00.24737 and earlier and Citrix MetaFrame Presentation Server client for WinCE before 8.33 allows remote attackers to execute arbitrary code via a long cached icon filename in the InName XML element.
[]
CVE-2010-2263
nginx 0.8 before 0.8.40 and 0.7 before 0.7.66, when running on Windows, allows remote attackers to obtain source code or unparsed content of arbitrary files under the web document root by appending ::$DATA to the URI.
[ "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2011-1137
Integer overflow in the mod_sftp (aka SFTP) module in ProFTPD 1.3.3d and earlier allows remote attackers to cause a denial of service (memory consumption leading to OOM kill) via a malformed SSH message.
[ "cpe:2.3:a:proftpd:proftpd:*:d:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.0:pre10:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.0:pre9:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.2:rc2:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.2:rc3:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.5:rc1:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.5:rc2:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.5:rc3:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.6:rc1:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.6:rc2:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.7:rc1:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.7:rc2:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.7:rc3:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.8:rc1:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.8:rc2:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.9:rc1:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.9:rc2:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.9:rc3:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.10:rc1:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.10:rc2:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.2.10:rc3:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.3.0:a:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.3.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.3.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.3.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.3.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.3.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.3.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.3.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.3.1:rc3:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.3.2:a:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.3.2:b:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.3.2:c:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.3.2:d:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.3.2:e:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.3.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.3.2:rc2:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.3.2:rc3:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.3.2:rc4:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.3.3:a:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.3.3:b:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.3.3:c:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.3.3:rc1:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.3.3:rc2:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.3.3:rc3:*:*:*:*:*:*", "cpe:2.3:a:proftpd:proftpd:1.3.3:rc4:*:*:*:*:*:*" ]
CVE-2021-25765
In JetBrains YouTrack before 2020.4.4701, CSRF via attachment upload was possible.
[ "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*" ]
CVE-2012-1481
Unspecified vulnerability in the Textdroid (com.app.android.textdroid) application 2.5.2 for Android has unknown impact and attack vectors.
[ "cpe:2.3:a:kashif_masud:textdroid:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
CVE-2018-6192
In Artifex MuPDF 1.12.0, the pdf_read_new_xref function in pdf/pdf-xref.c allows remote attackers to cause a denial of service (segmentation violation and application crash) via a crafted pdf file.
[ "cpe:2.3:a:artifex:mupdf:1.12.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
CVE-2022-37731
ftcms 2.1 poster.PHP has a XSS vulnerability. The attacker inserts malicious JavaScript code into the web page, causing the user / administrator to trigger malicious code when accessing.
[ "cpe:2.3:a:ftcms:ftcms:2.1:*:*:*:*:*:*:*" ]
CVE-2014-8733
Cloudera Manager 5.2.0, 5.2.1, and 5.3.0 stores the LDAP bind password in plaintext in unspecified world-readable files under /etc/hadoop, which allows local users to obtain this password.
[ "cpe:2.3:a:cloudera:cloudera_manager:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cloudera:cloudera_manager:5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:cloudera:cloudera_manager:5.3.0:*:*:*:*:*:*:*" ]
GHSA-3pww-qvr8-6mhp
Ray Path Traversal vulnerability
LFI in Ray's log API endpoint allows attackers to read any file on the server without authentication. The issue is fixed in version 2.8.1+. Ray maintainers response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023
[]
CVE-2024-49792
IBM ApplinX Cross-Site Scripting
IBM ApplinX 11.1 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
[]
GHSA-q5q7-8x6x-hcg2
ActiveMQ Artemis AMQ Broker Operator Starting Credentials Reuse
A flaw was found in ActiveMQ Artemis. The password generated by activemq-artemis-operator does not regenerate between separated CR dependencies.
[]
GHSA-fv7x-4hpc-hf9f
Moderate severity vulnerability that affects org.apache.cxf.fediz:fediz-spring, org.apache.cxf.fediz:fediz-spring2, and org.apache.cxf.fediz:fediz-spring3
Apache CXF Fediz ships with a number of container-specific plugins to enable WS-Federation for applications. A CSRF (Cross Style Request Forgery) style vulnerability has been found in the Spring 2, Spring 3 and Spring 4 plugins in versions before 1.4.3 and 1.3.3. The vulnerability can result in a security context that is set up using a malicious client's roles for the given enduser.
[]
CVE-2024-42229
crypto: aead,cipher - zeroize key buffer after use
In the Linux kernel, the following vulnerability has been resolved: crypto: aead,cipher - zeroize key buffer after use I.G 9.7.B for FIPS 140-3 specifies that variables temporarily holding cryptographic information should be zeroized once they are no longer needed. Accomplish this by using kfree_sensitive for buffers that previously held the private key.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
CVE-2006-0575
convert-fcrontab in Fcron 2.9.5 and 3.0.0 allows remote attackers to create or overwrite arbitrary files via ".." sequences and a symlink attack on the temporary file that is used during conversion.
[ "cpe:2.3:a:thibault_godouet:fcron:2.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:thibault_godouet:fcron:3.0.0:*:*:*:*:*:*:*" ]
GHSA-38vq-cjh5-vw7x
Malicious Package in nodes.js
All versions of `nodes.js ` contain malicious code. The package searches and installs globally thousands of packages based on keywords `node`, `react`, `react-native`, `vue`, `angular` and `babel` to fill the system's memory.RecommendationRemove the package from your environment and validate what packages are installed.
[]
CVE-2017-2278
The RBB SPEED TEST App for Android version 2.0.3 and earlier, RBB SPEED TEST App for iOS version 2.1.0 and earlier does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:iid:rbb_speed_test:-:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
GHSA-75pj-645r-579v
Buffer overflow in the sendToMythTV function in MythControlServer.c in MythControl 1.0 and earlier allows remote attackers to execute arbitrary code via a crafted sendStr string to the Bluetooth interface. NOTE: some of these details are obtained from third party information.
[]
GHSA-8x87-hc58-vg99
gdk-pixbuf before 0.20 allows attackers to cause a denial of service (crash) via a malformed bitmap (BMP) file.
[]
GHSA-h423-w6qv-2wj3
parse-server crashes when receiving file download request with invalid byte range
ImpactParse Server crashes when a file download request is received with an invalid byte range.PatchesImproved parsing of the range parameter to properly handle invalid range requests.WorkaroundsNoneReferences[GHSA-h423-w6qv-2wj3](https://github.com/parse-community/parse-server/security/advisories/GHSA-h423-w6qv-2wj3)
[]
GHSA-25fr-pq5j-rg59
This vulnerability exists in InstaRISPACS software due to insufficient validation of user supplied input for the loginTo parameter in user login module of the web interface of the application. A remote attacker could exploit this vulnerability by sending a specially crafted input to the vulnerable parameter to perform reflected Cross Site Scripting (XSS) attacks on the targeted system.
[]
GHSA-3j9f-c32h-wgj8
The Mindless Behavior Fan Base (aka com.mindless.behavior.fan.base) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
CVE-2023-44824
An issue in Expense Management System v.1.0 allows a local attacker to execute arbitrary code via a crafted file uploaded to the sign-up.php component.
[ "cpe:2.3:a:oretnom23:expense_management_system:1.0:*:*:*:*:*:*:*" ]
GHSA-hg84-qww7-vgqq
In ppmp_unprotect_mfcfw_buf of drm_fw.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege in S-EL1 with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-234859169References: N/A
[]
CVE-2023-6671
Cross-Site Request Forgery on OPEN JOURNAL SYSTEMS
A vulnerability has been discovered on OJS, that consists in a CSRF (Cross-Site Request Forgery) attack that forces an end user to execute unwanted actions on a web application in which they're currently authenticated.
[ "cpe:2.3:a:openjournalsystems:open_journal_systems:3.3.0.13:*:*:*:*:*:*:*" ]
CVE-2005-2999
PHP Advanced Transfer Manager 1.30 allows remote attackers to obtain sensitive PHP configuration information via a direct request to test.php.
[ "cpe:2.3:a:bugada_andrea:php_advanced_transfer_manager:1.30:*:*:*:*:*:*:*" ]
CVE-2020-29134
The TOTVS Fluig platform allows path traversal through the parameter "file = .. /" encoded in base64. This affects all versions Fluig Lake 1.7.0, Fluig 1.6.5 and Fluig 1.6.4
[ "cpe:2.3:a:totvs:fluig:1.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:totvs:fluig:1.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:totvs:fluig:1.7.0:*:*:*:*:*:*:*" ]
GHSA-xfrc-3x4c-8gwv
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel Zones virtualized block driver). The supported version that is affected is 11.3. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Solaris accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Solaris. CVSS v3.0 Base Score 5.7 (Integrity and Availability impacts).
[]
CVE-2023-6444
Seriously Simple Podcasting < 3.0.0 - Unauthenticated Administrator Email Disclosure
The Seriously Simple Podcasting WordPress plugin before 3.0.0 discloses the Podcast owner's email address (which by default is the admin email address) via an unauthenticated crafted request.
[ "cpe:2.3:a:castos:seriously_simple_podcasting:*:*:*:*:*:wordpress:*:*" ]
CVE-2022-29422
WordPress Countdown & Clock plugin <= 2.3.2 - Multiple Authenticated Persistent Cross-Site Scripting (XSS) vulnerabilities
Multiple Authenticated (admin+) Persistent Cross-Site Scripting (XSS) vulnerabilities in Adam Skaat's Countdown & Clock plugin <= 2.3.2 at WordPress via &ycd-countdown-width, &ycd-progress-height, &ycd-progress-width, &ycd-button-margin-top, &ycd-button-margin-right, &ycd-button-margin-bottom, &ycd-button-margin-left, &ycd-circle-countdown-before-countdown, &ycd-circle-countdown-after-countdown vulnerable parameters.
[ "cpe:2.3:a:edmonsoft:countdown_builder:*:*:*:*:*:wordpress:*:*" ]
CVE-2007-2374
Unspecified vulnerability in Microsoft Windows 2000, XP, and Server 2003 allows user-assisted remote attackers to execute arbitrary code via unspecified vectors. NOTE: this information is based upon a vague pre-advisory with no actionable information. However, the advisory is from a reliable source.
[ "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:*:sp1:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:datacenter:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:enterprise:itanium_sp1_beta_1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:enterprise:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:enterprise:sp1_beta_1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:itanium:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:standard:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:standard:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:standard:sp1_beta_1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:web:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:web:sp1_beta_1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit_2003:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp1:embedded:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp1:professional:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:professional:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*", "cpe:2.3:a:avaya:media_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:avaya:definity_one_media_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:avaya:s3400:*:*:*:*:*:*:*:*", "cpe:2.3:h:avaya:s8100:*:*:*:*:*:*:*:*" ]
CVE-2006-5607
Directory traversal vulnerability in /cgi-bin/webcm in INCA IM-204 allows remote attackers to read arbitrary files via a "/./." (modified dot dot) sequences in the getpage parameter.
[ "cpe:2.3:h:inca:im-204_adsl_router:*:*:*:*:*:*:*:*" ]
GHSA-6vwf-gj43-wr9h
Cross-site scripting (XSS) vulnerability in Novell Identity Manager (aka IDM) User Application 3.5.0, 3.5.1, 3.6.0, 3.6.1, 3.7.0, and 4.0.0, and Identity Manager Roles Based Provisioning Module 3.6.0, 3.6.1, 3.7.0, and 4.0.0, allows remote attackers to inject arbitrary web script or HTML via the apwaDetail (aka apwaDetailId) parameter, aka Bug 709603.
[]
CVE-2019-8919
The seadroid (aka Seafile Android Client) application through 2.2.13 for Android always uses the same Initialization Vector (IV) with Cipher Block Chaining (CBC) Mode to encrypt private data, making it easier to conduct chosen-plaintext attacks or dictionary attacks.
[ "cpe:2.3:a:seafile:seadroid:*:*:*:*:*:android:*:*" ]
CVE-2020-8807
In Electric Coin Company Zcashd before 2.1.1-1, the time offset between messages could be leveraged to obtain sensitive information about the relationship between a suspected victim's address and an IP address, aka a timing side channel.
[ "cpe:2.3:a:electriccoin:zcashd:*:*:*:*:*:*:*:*" ]
GHSA-vp8r-986v-6qj4
Type confusion in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
[]
CVE-2024-5941
GiveWP – Donation Plugin and Fundraising Platform <= 3.14.1 - Missing Authorization to Authenticated (Subscriber+) Limited File Deletion
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to unauthorized access and deletion of data due to a missing capability check on the 'handle_request' function in all versions up to, and including, 3.14.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read attachment paths and delete attachment files.
[ "cpe:2.3:a:givewp:givewp:*:*:*:*:*:wordpress:*:*" ]
GHSA-96jm-2888-9qjr
A stack overflow vulnerability in the Tenda W18E V16.01.0.8(1625) web management portal allows an authenticated remote attacker to cause a denial of service or potentially execute arbitrary code. This vulnerability occurs due to improper input validation when handling user-supplied data in the delFacebookPic function.
[]
CVE-2022-46551
Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the time parameter at /goform/saveParentControlInfo.
[ "cpe:2.3:o:tenda:f1203_firmware:2.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:f1203:-:*:*:*:*:*:*:*" ]
CVE-2016-5497
Unspecified vulnerability in the RDBMS Security component in Oracle Database Server 12.1.0.2 allows local users to affect confidentiality, integrity, and availability via unknown vectors.
[ "cpe:2.3:a:oracle:database:12.1.0.2:*:*:*:*:*:*:*" ]