id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
CVE-2023-32222
D-Link DSL-G256DG firmware version vBZ_1.00.27 Authentication Bypass
D-Link DSL-G256DG version vBZ_1.00.27 web management interface allows authentication bypass via an unspecified method.
[ "cpe:2.3:a:d-link:dsl-g256dg:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dsl-g256dg_firmware:bz_1.00.27:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dsl-g256dg:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-hr7v-m862-8hh8
A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.
[]
null
7.5
null
null
null
GHSA-7q9j-26p4-98cm
Stack-based buffer overflow in the t2p_write_pdf_page function in tiff2pdf in libtiff before 4.0.3 allows remote attackers to cause a denial of service (application crash) via a crafted image length and resolution in a TIFF image file.
[]
null
null
null
null
null
GHSA-x887-33v9-84j9
IBM API Management 3.x before 3.0.1.0 allows local users to obtain sensitive ciphertext information via unspecified vectors.
[]
null
null
null
null
null
CVE-2025-46565
Vite's server.fs.deny bypassed with /. for files under project root
Vite is a frontend tooling framework for javascript. Prior to versions 6.3.4, 6.2.7, 6.1.6, 5.4.19, and 4.5.14, the contents of files in the project root that are denied by a file matching pattern can be returned to the browser. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. Only files that are under project root and are denied by a file matching pattern can be bypassed. `server.fs.deny` can contain patterns matching against files (by default it includes .env, .env.*, *.{crt,pem} as such patterns). These patterns were able to bypass for files under `root` by using a combination of slash and dot (/.). This issue has been patched in versions 6.3.4, 6.2.7, 6.1.6, 5.4.19, and 4.5.14.
[]
6
null
null
null
null
RHSA-2022:9107
Red Hat Security Advisory: OpenShift Container Platform 4.11.21 bug fix and security update
golang: crash in a golang.org/x/crypto/ssh server
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
7.5
null
null
null
GHSA-6p8p-pr7r-jrrc
Multiple cross-site scripting (XSS) vulnerabilities in Pro Chat Rooms Text Chat Rooms 8.2.0 allow remote authenticated users to inject arbitrary web script or HTML via (1) an uploaded profile picture or (2) the edit parameter to profiles/index.php.
[]
null
null
null
null
null
GHSA-gw49-f4qm-3gcc
cdrecord in the cdrtools package before 2.01, when installed setuid root, does not properly drop privileges before executing a program specified in the RSH environment variable, which allows local users to gain privileges.
[]
null
null
null
null
null
CVE-2018-14261
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getTemplate method. By performing actions in JavaScript, an attacker can trigger a type confusion condition. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-6024.
[ "cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
GHSA-xc9g-4r2q-p359
A vulnerability, which was classified as critical, has been found in Itech Movie Portal Script 7.36. This issue affects some unknown processing of the file /film-rating.php. The manipulation of the argument v leads to sql injection (Error). The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
null
9.8
null
null
null
CVE-2019-9113
Ming (aka libming) 0.4.8 has a NULL pointer dereference in the function getString() in the decompile.c file in libutil.a.
[ "cpe:2.3:a:libming:ming:0.4.8:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
CVE-2017-14513
Directory traversal vulnerability in MetInfo 5.3.17 allows remote attackers to read information from any ini format file via the f_filename parameter in a fingerprintdo action to admin/app/physical/physical.php.
[ "cpe:2.3:a:metinfo:metinfo:5.3.17:*:*:*:*:*:*:*" ]
null
null
5.3
5
null
CVE-2024-20824
Implicit intent hijacking vulnerability in VoiceSearch of Galaxy Store prior to version 4.5.63.6 allows local attackers to access sensitive information via implicit intent.
[ "cpe:2.3:a:samsung:galaxy_store:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-fjqq-wrxc-5qvx
The NAT implementation in Zonet ZSR1104WE Wireless Router Runtime Code Version 2.41 converts IP addresses of inbound connections to the IP address of the router, which allows remote attackers to bypass intended security restrictions.
[]
null
null
null
null
null
CVE-2021-3033
Prisma Cloud Compute: SAML Authentication Bypass Vulnerability in Console
An improper verification of cryptographic signature vulnerability exists in the Palo Alto Networks Prisma Cloud Compute console. This vulnerability enables an attacker to bypass signature validation during SAML authentication by logging in to the Prisma Cloud Compute console as any authorized user. This issue impacts: All versions of Prisma Cloud Compute 19.11, Prisma Cloud Compute 20.04, and Prisma Cloud Compute 20.09; Prisma Cloud Compute 20.12 before update 1. Prisma Cloud Compute SaaS version is not impacted by this vulnerability.
[ "cpe:2.3:a:paloaltonetworks:prisma_cloud:19.11:-:*:*:compute:*:*:*", "cpe:2.3:a:paloaltonetworks:prisma_cloud:19.11:update_1:*:*:compute:*:*:*", "cpe:2.3:a:paloaltonetworks:prisma_cloud:19.11:update_2:*:*:compute:*:*:*", "cpe:2.3:a:paloaltonetworks:prisma_cloud:20.04:-:*:*:compute:*:*:*", "cpe:2.3:a:paloaltonetworks:prisma_cloud:20.04:update_1:*:*:compute:*:*:*", "cpe:2.3:a:paloaltonetworks:prisma_cloud:20.04:update_2:*:*:compute:*:*:*", "cpe:2.3:a:paloaltonetworks:prisma_cloud:20.09:-:*:*:compute:*:*:*", "cpe:2.3:a:paloaltonetworks:prisma_cloud:20.09:update_1:*:*:compute:*:*:*", "cpe:2.3:a:paloaltonetworks:prisma_cloud:20.09:update_2:*:*:compute:*:*:*", "cpe:2.3:a:paloaltonetworks:prisma_cloud:20.12:-:*:*:compute:*:*:*" ]
null
9.1
null
null
null
GHSA-q94c-x56g-qr59
A use-after-free flaw was found in the Linux Kernel. When a disk is removed, bdi_unregister is called to stop further write-back and waits for associated delayed work to complete. However, wb_inode_writeback_end() may schedule bandwidth estimation work after this has completed, which can result in the timer attempting to access the recently freed bdi_writeback.
[]
null
7.8
null
null
null
CVE-2019-10308
A missing permission check in Jenkins Static Analysis Utilities Plugin 1.95 and earlier in the DefaultGraphConfigurationView#doSave form handler method allowed attackers with Overall/Read permission to change the per-job default graph configuration for all users.
[ "cpe:2.3:a:jenkins:static_analysis_utilities:*:*:*:*:*:jenkins:*:*" ]
null
6.5
null
4
null
CVE-2014-4297
Unspecified vulnerability in the JPublisher component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect confidentiality via unknown vectors, a different vulnerability than CVE-2014-4290, CVE-2014-4291, CVE-2014-4292, CVE-2014-4293, CVE-2014-4296, CVE-2014-4310, CVE-2014-6547, and CVE-2014-6477.
[ "cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:11.2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:11.2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:12.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:12.1.0.2:*:*:*:*:*:*:*" ]
null
null
null
4
null
CVE-2015-8753
SAP Afaria 7.0.6001.5 allows remote attackers to bypass authorization checks and wipe or lock mobile devices via a crafted request, related to "Insecure signature," aka SAP Security Note 2134905.
[ "cpe:2.3:a:sap:afaria:7.0.6001.5:*:*:*:*:*:*:*" ]
null
null
9.1
9.4
null
GHSA-jh8h-hqfp-q5vr
Buffer overflow in blenderplay in Blender Player 2.37a allows attackers to execute arbitrary code via a long command line argument.
[]
null
null
null
null
null
GHSA-6pvw-p9fg-rwxj
A reflected cross-site scripting (XSS) vulnerability exists in phpipam/phpipam versions 1.5.0 through 1.6.0. The vulnerability arises when the application receives data in an HTTP request and includes that data within the immediate response in an unsafe manner. This allows an attacker to execute arbitrary JavaScript in the context of the user's browser, potentially leading to full compromise of the user.
[]
null
null
3.5
null
null
GHSA-qgg3-3qc5-h6ch
Unspecified vulnerability in the (1) web cache or (2) web proxy in Fujitsu NetShelter/FW allows remote attackers to cause a denial of service (device unresponsiveness) via certain DNS packets, as demonstrated by the OUSPG PROTOS DNS test suite.
[]
null
null
null
null
null
CVE-2020-14296
Red Hat CloudForms 4.7 and 5 was vulnerable to Server-Side Request Forgery (SSRF) flaw. With the access to add Ansible Tower provider, an attacker could scan and attack systems from the internal network which are not normally accessible.
[ "cpe:2.3:a:redhat:cloudforms_management_engine:4.7:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:cloudforms_management_engine:5.0:*:*:*:*:*:*:*" ]
null
7.1
null
5.5
null
CVE-2008-0540
Multiple cross-site scripting (XSS) vulnerabilities in trixbox 2.4.2.0 allow remote attackers to inject arbitrary web script or HTML via the query string to index.php in (1) user/ or (2) maint/.
[ "cpe:2.3:a:trixbox:trixbox:2.4.2.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2012-1701
Unspecified vulnerability in the Siebel CRM component in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote attackers to affect confidentiality via unknown vectors related to Highly Interactive Web UI.
[ "cpe:2.3:a:oracle:siebel_crm:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:siebel_crm:8.2.2:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-42cx-qwh9-c3xj
Microsoft Windows Graphics Device Interface (GDI+, GdiPlus.dll) allows context-dependent attackers to cause a denial of service (crash) via an ICO file with an InfoHeader containing a Height of zero, which triggers a divide-by-zero error.
[]
null
5.5
null
null
null
GHSA-xm6v-3wmv-c56v
The Glossary by WPPedia – Best Glossary plugin for WordPress plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.3.0 via deserialization of untrusted input from the 'posttypes' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.
[]
null
7.2
null
null
null
GHSA-28mj-h58q-vmmm
The Insights from Google PageSpeed WordPress plugin before 4.0.7 does not verify for CSRF before doing various actions such as deleting Custom URLs, which could allow attackers to make a logged in admin perform such actions via CSRF attacks
[]
null
8.8
null
null
null
GHSA-8qgh-c754-3crv
Bluetooth Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a nearby device, reflecting the authentication evidence from a Provisioner, to complete authentication without possessing the AuthValue, and potentially acquire a NetKey and AppKey.
[]
null
null
null
null
null
GHSA-7qxq-62rc-m2w2
A vulnerability classified as problematic was found in Radare2 5.9.9. Affected by this vulnerability is the function cons_stack_load in the library /libr/cons/cons.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. An attack has to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The patch is named 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added.
[]
2
2.5
null
null
null
GHSA-hvr4-ppmm-c7fp
In the Linux kernel, the following vulnerability has been resolved:net_sched: hfsc: Fix a UAF vulnerability in class handlingThis patch fixes a Use-After-Free vulnerability in the HFSC qdisc class handling. The issue occurs due to a time-of-check/time-of-use condition in hfsc_change_class() when working with certain child qdiscs like netem or codel.The vulnerability works as follows:hfsc_change_class() checks if a class has packets (q.qlen != 0)It then calls qdisc_peek_len(), which for certain qdiscs (e.g., codel, netem) might drop packets and empty the queueThe code continues assuming the queue is still non-empty, adding the class to vttreeThis breaks HFSC scheduler assumptions that only non-empty classes are in vttreeLater, when the class is destroyed, this can lead to a Use-After-FreeThe fix adds a second queue length check after qdisc_peek_len() to verify the queue wasn't emptied.
[]
null
null
null
null
null
GHSA-2hr4-7jx8-v3gp
The zzip_mem_entry_new function in memdisk.c in zziplib 0.13.62 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted ZIP file.
[]
null
null
5.5
null
null
GHSA-g2cq-gp92-98c4
NVIDIA Windows GPU Display driver contains a vulnerability in the 3D vision component in which the stereo service software, when opening a file, does not check for hard links. This behavior may lead to code execution, denial of service or escalation of privileges.
[]
null
null
7.8
null
null
CVE-2005-3889
Gadu-Gadu 7.20 allows remote attackers to cause a denial of service via multiple DCC packets with a code of 6 or 7, which triggers a large number of popup windows to the user and creates a large number of threads.
[ "cpe:2.3:a:gadu-gadu:gadu-gadu_instant_messenger:7.20:*:*:*:*:*:*:*" ]
null
null
null
7.8
null
GHSA-38gq-f4qx-7pmw
Untrusted search path vulnerability in Installer for Shin Sekiyu Yunyu Chousa Houkoku Data Nyuryoku Program (program released on 2013 September 30) distributed on the website until 2017 May 17 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
[]
null
null
7.8
null
null
GHSA-x7g8-97jm-3vpj
A use after free vulnerability in iva_ctl driver prior to SMR Sep-2022 Release 1 allows attacker to cause memory access fault.
[]
null
7.8
null
null
null
CVE-2018-3269
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: SMB Server). The supported version that is affected is 11.3. Easily exploitable vulnerability allows low privileged attacker with network access via SMB to compromise Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Solaris. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).
[ "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*" ]
null
null
4.3
4
null
GHSA-w622-2pcj-f3x2
cgi-bin/qcmap_web_cgi on JioFi 4G M2S 1.0.2 devices allows a DoS (Hang) via the mask POST parameter.
[]
null
null
6.5
null
null
GHSA-pmm9-ffgf-jpqg
Directory traversal vulnerability in Marshal MailMarshal SMTP 5.x, 6.x, and 2006, and MailMarshal for Exchange 5.x, allows remote attackers to write arbitrary files via ".." sequences in filenames in an ARJ compressed archive.
[]
null
null
null
null
null
CVE-2013-2340
Unspecified vulnerability on the HP ProCurve JC###A, JC###B, JD###A, JD###B, JE###A, JF###A, JF###B, JF###C, JG###A, 658250-B21, and 658247-B21; HP 3COM routers and switches; and HP H3C routers and switches allows remote attackers to execute arbitrary code or obtain sensitive information via unknown vectors.
[ "cpe:2.3:h:hp:3com_baseline_plus_switch:2900:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_baseline_plus_switch:2900g:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_baseline_plus_switch:2900g-28hpwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_baseline_plus_switch:2900g-28pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:3012:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:3013:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:3016:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:3018:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:3036:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:3040:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:3041:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:5009:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:5012:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:5231:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:5232:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:5640:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:5642:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:5642_taa:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:5680:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:5682:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:6040:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:6080:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:jg005a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:ss4_5500g-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4200g:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4200g-ntg:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4200g_pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4210:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4210-24g:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4210-48g:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4210_pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4210_pwr_9p_taa:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4500:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4500_pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4510g:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4510g_pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4800g:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:5500g-ei_sfp:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:e4210-24g-poe:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:e4510-24g:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:ss4_5500-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:ss4_5500-ei-pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:ss4_5500-si:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:ss4_5500g-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:ss4_5500g-ei-pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:ss4_switch_5500g-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch_taa_compliant:5500g-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch_taa_compliant:5500g-ei-pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch_taa_compliant:5500g-ei-sfp:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_taa_switch:5500-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5500-28c-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5500-28c-ei-dc:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5500-28c-pwr-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5500-28c-pwr-si:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5500-28c-si:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5500-28f-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5500-52c-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5500-52c-pwr-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5500-52c-pwr-si:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5500-52c-si:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5600-26c:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5600-26c-pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5600-26f:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5600-50c:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5600-50c-pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s7502e:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s7503e:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s7503e-s:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s7506e:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s7506e-v:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s7510e:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_high_performance_main_processing_unit:msr_50_3ge:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_processing_module:msr_50_g2:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_processor_module:msr_50:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-10:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-11:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-12:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-12_t1:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-13:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-13_w:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-15:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-15_a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-15_a_w:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-15_iw:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-20:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-21:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-40:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_30-10:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_30-20:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_30-20_poe:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_30-20_rtvz33020as:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_30-40:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_30-40_poe:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_30-60:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_30-60_poe:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_50-40:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_50-60:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_900:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_920:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_3010:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_3016:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_3016_poe:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr5040-dc-ovs-h3c:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2011-ac-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2012-ac-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2012-ac-ovs-s-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2012-ac-ovs-w-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2012-t-ac-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2013-ac-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2013-ac-ovs-w-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2015-ac-ovs-a-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2015-ac-ovs-aw-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2015-ac-ovs-i-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2015-ac-ovs-iw-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2020-ac-ovs-h3c:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2040-ac-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2040-ac-ovs-h3c:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3011-ac-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3016-ac-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3016-ac-poe-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3020-ac-poe-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3020-dc-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3040-ac-ovs-as-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3040-ac-ovs-h:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3040-ac-poe-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3060-ac-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3060-ac-poe-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3060-dc-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr5060-ac-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:sr_20-12_w:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:sr8802:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:sr8805:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:sr8808:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:sr8812:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_routing_switch:s9505e:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_routing_switch:s9508e-v:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_routing_switch:s9512e:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_routing_switch:s12508:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_routing_switch:s12518:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3100-8c-si_ls-s3100-8c-si-ac-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3100-8c-si_ls-s3100-8c-si-dc-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3100-8t-si_ls-s3100-8t-si-ac-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3100-16c-si_ls-s3100-16c-si-ac-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3100-16c-si_ls-s3100-16c-si-dc-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3100-16t-si_ls-s3100-16t-si-ac-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3100-26c-si_ls-s3100-26c-si-ac-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3100-26c-si_ls-s3100-26c-si-dc-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3100-26t-si_ls-s3100-26t-si-ac-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3100-52p_ls-3100-52p-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3600-28f-ei_ls-3600-28f-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3600-28p-ei_ls-3600-28p-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3600-28p-pwr-ei_ls-3600-28p-pwr-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3600-28p-pwr-si_ls-3600-28p-pwr-si-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3600-28p-si_ls-3600-28p-si-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3600-28tp-si_ls-3600-28tp-si-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3600-52p-ei_ls-3600-52p-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3600-52p-pwr-ei_ls-3600-52p-pwr-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3600-52p-pwr-si_ls-3600-52p-pwr-si-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3600-52p-si_ls-3600-52p-si-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3610-28f_ls-3610-28f-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3610-28p_ls-3610-28p-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3610-28tp_ls-3610-28tp-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3610-52p_ls-3610-52p-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-8p-ei_ls-5100-8p-ei-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-8p-pwr-ei_ls-5100-8p-pwr-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-8p-si_ls-5100-8p-si-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-16p-ei_ls-5100-16p-ei-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-16p-pwr-ei_ls-5100-16p-pwr-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-16p-si_ls-5100-16p-si-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-24p-ei_ls-5100-24p-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-24p-si_ls-5100-24p-si-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-26c-ei_ls-5100-26c-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-26c-pwr-ei_ls-5100-26c-pwr-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-48p-ei_ls-5100-48p-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-48p-si_ls-5100-48p-si-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-50c-ei_ls-5100-50c-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-50c-pwr-ei_ls-5100-50c-pwr-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-20p-si:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-24p-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-28c-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-28c-pwr-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-28p-hpwr-si:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-28p-pwr-si:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-28p-si:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-48p-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-52c-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-52c-pwr-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-52p-si:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5800-32c:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5800-32c-pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5800-32f:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5800-56c:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5800-56c-pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5800-60c-pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5820x-28c:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5820x-28s:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s7502e:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s7503e:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s7503e-s:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s7506e:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s7506e-v:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s9505e:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s9508e-v:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s12508:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s12518:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jc147a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jc147b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jc148a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jc148b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jc149a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jc149b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jc150a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jc150b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd429b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd431a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd432a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd433a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd653a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd655a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd656a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd662a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd663a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd663b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd664a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd916a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd917a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd918a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd921a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd922a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd923a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd935a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd943a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd944a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd945a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd946a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd967a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd972a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf182a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf183a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf184a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf228a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf229a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf230a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf231a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf233a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf234a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf235a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf236a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf237a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf238a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf239a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf240a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf241a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf283a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf284a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf285a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf287a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf640a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf800a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf801a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf802a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf803a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf804a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf806a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf807a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf808a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf809a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf812a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf813a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf814a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf815a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf816a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf817a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:658247-b21:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:658250-b21:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc085a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc086a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc099a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc100a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc101a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc102a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc103a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc104a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc105a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc106a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc124a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc124b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc125a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc125b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc474a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc474b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc611a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc612a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc613a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc652a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc653a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc654a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc655a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc691a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc694a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc748a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd007a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd008a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd009a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd010a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd011a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd238a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd238b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd239a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd239b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd240a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd240b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd241a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd241b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd242a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd242b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd243a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd243b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd302a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd303a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd304a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd305a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd306a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd307a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd308a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd309a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd310a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd313b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd317a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd318b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd319b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd320b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd325a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd326a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd327a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd328a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd329a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd330a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd331a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd332a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd333a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd334a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd335a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd336a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd337a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd338a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd344a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd345a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd346a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd347a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd348a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd349a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd350a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd351a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd352a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd353a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd354a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd355a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd356a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd357a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd369a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd370a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd371a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd372a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd373a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd374a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd375a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd376a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd377a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd378a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd379a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd391a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd392a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd393a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd394a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd395a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je005a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je006a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je007a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je008a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je009a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je015a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je016a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je017a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je018a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je019a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je020a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je021a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je022a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je023a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je024a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je025a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je026a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je027a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je028a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je029a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je030a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je031a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je032a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je033a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je045a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je046a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je047a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je048a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je066a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je067a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je068a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je069a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je070a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je071a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je072a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je073a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je074a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je088a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je089a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je090a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je091a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je092a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je093a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je094a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je095a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je096a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je097a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je099a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je100a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je101a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je102a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je104a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je105a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je106a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je107a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je108a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je109a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je110a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je164a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je165a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je166a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je167a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je168a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je169a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf427a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf428a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf430a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf430b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf430c:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf431a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf431b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf431c:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf551a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf552a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf553a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf844a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf845a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf846a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf847a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg091a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg092a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg219a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg221a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg222a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg223a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg225a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg236a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg237a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg238a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg239a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg240a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg241a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg242a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg243a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg245a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg246a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg247a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg248a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg249a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg250a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg251a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg252a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg253a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg254a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg255a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg256a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg257a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg258a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg259a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg299a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg300a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg301a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg302a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg303a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg304a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg305a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg306a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg307a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg311a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg312a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg315a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg316a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg348a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg349a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg350a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg374a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:vpn_firewall_appliance:jd270a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:vpn_firewall_appliance:jd271a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:vpn_firewall_appliance:jg213a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:vpn_firewall_appliance:jg214a:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-jcmg-8grx-m8j6
** UNSUPPORTED WHEN ASSIGNED ** The administration web interface on Belkin Linksys WRT160NL 1.0.04.002_US_20130619 devices allows remote authenticated attackers to execute system commands with root privileges via shell metacharacters in the ui_language POST parameter to the apply.cgi form endpoint. This occurs in do_upgrade_post in mini_httpd. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
[]
null
8.8
null
null
null
CVE-2005-3849
Cross-site scripting (XSS) vulnerability in the Search module in PmWiki up to 2.0.12 allows remote attackers to inject arbitrary web script or HTML via the q parameter.
[ "cpe:2.3:a:pmwiki:pmwiki:*:*:*:*:*:*:*:*", "cpe:2.3:a:pmwiki:pmwiki:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:pmwiki:pmwiki:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:pmwiki:pmwiki:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:pmwiki:pmwiki:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:pmwiki:pmwiki:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:pmwiki:pmwiki:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:pmwiki:pmwiki:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:pmwiki:pmwiki:2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:pmwiki:pmwiki:2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:pmwiki:pmwiki:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:pmwiki:pmwiki:2.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:pmwiki:pmwiki:2.0.11:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2019-8986
TIBCO JasperReports Server XML Entity Expansion Vulnerability
The SOAP API component vulnerability of TIBCO Software Inc.'s TIBCO JasperReports Server, and TIBCO JasperReports Server for ActiveMatrix BPM contains a vulnerability that may allow a malicious authenticated user to copy text files from the host operating system. Affected releases are TIBCO Software Inc.'s TIBCO JasperReports Server: versions up to and including 6.3.4; 6.4.0; 6.4.1; 6.4.2; 6.4.3, TIBCO JasperReports Server for ActiveMatrix BPM: versions up to and including 6.4.3.
[ "cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:*:activematrix_bpm:*:*", "cpe:2.3:a:tibco:jasperreports_server:6.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:jasperreports_server:6.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:jasperreports_server:6.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:jasperreports_server:6.4.3:*:*:*:*:*:*:*" ]
null
null
7.7
null
null
PYSEC-2021-608
null
TensorFlow is an open source platform for machine learning. In affected versions if `tf.tile` is called with a large input argument then the TensorFlow process will crash due to a `CHECK`-failure caused by an overflow. The number of elements in the output tensor is too much for the `int64_t` type and the overflow is detected via a `CHECK` statement. This aborts the process. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
[]
null
null
null
null
null
GHSA-6rx4-xv8f-g72g
Product: AndroidVersions: Android kernelAndroid ID: A-204541506References: N/A
[]
null
7.5
null
null
null
GHSA-wrw7-6rh3-qhmq
A vulnerability, which was classified as problematic, was found in Antabot White-Jotter up to 0.2.2. Affected is an unknown function of the file /admin/content/book of the component Edit Book Handler. The manipulation leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
4.3
null
null
null
GHSA-pcmh-49qc-2rx3
This High severity Remote Code Execution (RCE) vulnerability was introduced in version 2.1.0 of Confluence Data Center and Server.Remote Code Execution (RCE) vulnerability, with a CVSS Score of 8.3 and a CVSS Vector of CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H allows an unauthenticated attacker to remotely expose assets in your environment susceptible to exploitation which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction.Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:Confluence Data Center and Server 7.19: Upgrade to a release 7.19.18, or any higher 7.19.x releaseConfluence Data Center and Server 8.5: Upgrade to a release 8.5.5 or any higher 8.5.x releaseConfluence Data Center and Server 8.7: Upgrade to a release 8.7.2 or any higher releaseSee the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html ). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives).
[]
null
null
8.3
null
null
CVE-2021-30666
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 12.5.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
null
GHSA-2g88-r927-2prg
A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcXFixesCreatePointerBarrier function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
[]
null
7.8
null
null
null
CVE-2023-52348
In ril service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed
[]
null
4.4
null
null
null
CVE-2002-1239
QNX Neutrino RTOS 6.2.0 uses the PATH environment variable to find and execute the cp program while operating at raised privileges, which allows local users to gain privileges by modifying the PATH to point to a malicious cp program.
[ "cpe:2.3:a:qnx:rtos:6.2.0:*:*:*:*:*:*:*" ]
null
null
null
7.2
null
GHSA-8qwq-m68r-6pcj
SAP ERP HCM Portugal does not perform necessary authorization checks for a report that reads the payroll data of employees in a certain area. Since the affected report only reads the payroll information, the attacker can neither modify any information nor cause availability impacts.
[]
null
null
null
null
null
CVE-2008-4040
Directory traversal vulnerability in the Kyocera Command Center in Kyocera FS-118MFP allows remote attackers to read arbitrary files via a .. (dot dot) in the URI.
[ "cpe:2.3:h:kyocera_mita:fs_118mfp:*:*:*:*:*:*:*:*" ]
null
null
null
7.8
null
CVE-2022-36098
XWiki Platform Mentions UI vulnerable to Cross-site Scripting
XWiki Platform Mentions UI is a user interface for mentioning users in wiki content for XWiki Platform, a generic wiki platform. Starting in version 12.5-rc-1 and prior to versions 13.10.6 and 14.4, it's possible to store Javascript or groovy scripts in a mention, macro anchor, or reference field. The stored code is executed by anyone visiting the page with the mention. This issue has been patched on XWiki 14.4 and 13.10.6. As a workaround, one may update `XWiki.Mentions.MentionsMacro` and edit the `Macro code` field of the `XWiki.WikiMacroClass` XObject.
[ "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*" ]
null
8.9
null
null
null
CVE-2024-8157
Alphabetical List <= 1.0.3 - Settings Update via CSRF
The Alphabetical List WordPress plugin through 1.0.3 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
[ "cpe:2.3:a:alain_gonzalez:alphabetical-list:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
null
GHSA-mw65-xrm6-grcv
The management portal component of JetNexus/EdgeNexus ADC 4.2.8 was discovered to contain a command injection vulnerability. This vulnerability allows authenticated attackers to execute arbitrary commands through a specially crafted payload. This vulnerability can also be exploited from an unauthenticated context via unspecified vectors
[]
null
8.8
null
null
null
CVE-2012-4614
The default configuration of EMC Smarts Network Configuration Manager (NCM) before 9.1 does not require authentication for database access, which allows remote attackers to have an unspecified impact via a network session.
[ "cpe:2.3:a:emc:it_operations_intelligence:*:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
CVE-2018-19726
Adobe Experience Manager versions 6.4, 6.3, 6.2, 6.1, and 6.0 have a stored cross-site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure.
[ "cpe:2.3:a:adobe:experience_manager:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager:6.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager:6.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager:6.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager:6.4.0:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
GHSA-gm4w-75rj-3wr6
Harbor API has a Broken Access Control vulnerability. The vulnerability allows project administrators to use the Harbor API to create a robot account with unauthorized push and/or pull access permissions to a project they don't have access or control for. The Harbor API did not enforce the proper project permissions and project scope on the API request to create a new robot account.
[]
null
7.5
null
null
null
GHSA-cw7r-xrhg-xv22
Directory traversal vulnerability in C3 Corp. WebCalenderC3 0.32 and earlier allows remote attackers to read arbitrary files via unknown vectors.
[]
null
null
null
null
null
GHSA-q2vx-jxvf-g6gg
Remote PC Access Server 2.2 allows remote attackers to cause a denial of service (crash) by receiving packets from the server and sending them back to the server.
[]
null
null
null
null
null
CVE-2022-1759
RB Internal Links <= 2.0.16 - Stored Cross-Site Scripting via CSRF
The RB Internal Links WordPress plugin through 2.0.16 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack, as well as perform Stored Cross-Site Scripting attacks due to the lack of sanitisation and escaping
[ "cpe:2.3:a:rb_internal_links_project:rb_internal_links:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
3.5
null
GHSA-2pjg-x482-xwr4
Netgear EX8000 V1.0.0.126 is vulnerable to Command Injection via the Iface parameter in the action_wireless function.
[]
null
6.5
null
null
null
GHSA-fmrr-hm86-xwmh
An issue was discovered in certain Apple products. Xcode before 9.2 is affected. The issue involves the "ld64" component. A buffer overflow allows remote attackers to execute arbitrary code via crafted source code.
[]
null
null
7.8
null
null
GHSA-pjmm-jqrg-3hmg
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
[]
null
7.5
null
null
null
CVE-2024-21436
Windows Installer Elevation of Privilege Vulnerability
Windows Installer Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
CVE-2016-8577
Memory leak in the v9fs_read function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors related to an I/O read operation.
[ "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*" ]
null
6
null
2.1
null
CVE-2022-34125
front/icon.send.php in the CMDB plugin before 3.0.3 for GLPI allows attackers to gain read access to sensitive information via a _log/ pathname in the file parameter.
[ "cpe:2.3:a:glpi-project:cmdb:*:*:*:*:*:glpi:*:*" ]
null
6.5
null
null
null
CVE-2021-46997
arm64: entry: always set GIC_PRIO_PSR_I_SET during entry
In the Linux kernel, the following vulnerability has been resolved: arm64: entry: always set GIC_PRIO_PSR_I_SET during entry Zenghui reports that booting a kernel with "irqchip.gicv3_pseudo_nmi=1" on the command line hits a warning during kernel entry, due to the way we manipulate the PMR. Early in the entry sequence, we call lockdep_hardirqs_off() to inform lockdep that interrupts have been masked (as the HW sets DAIF wqhen entering an exception). Architecturally PMR_EL1 is not affected by exception entry, and we don't set GIC_PRIO_PSR_I_SET in the PMR early in the exception entry sequence, so early in exception entry the PMR can indicate that interrupts are unmasked even though they are masked by DAIF. If DEBUG_LOCKDEP is selected, lockdep_hardirqs_off() will check that interrupts are masked, before we set GIC_PRIO_PSR_I_SET in any of the exception entry paths, and hence lockdep_hardirqs_off() will WARN() that something is amiss. We can avoid this by consistently setting GIC_PRIO_PSR_I_SET during exception entry so that kernel code sees a consistent environment. We must also update local_daif_inherit() to undo this, as currently only touches DAIF. For other paths, local_daif_restore() will update both DAIF and the PMR. With this done, we can remove the existing special cases which set this later in the entry code. We always use (GIC_PRIO_IRQON | GIC_PRIO_PSR_I_SET) for consistency with local_daif_save(), as this will warn if it ever encounters (GIC_PRIO_IRQOFF | GIC_PRIO_PSR_I_SET), and never sets this itself. This matches the gic_prio_kentry_setup that we have to retain for ret_to_user. The original splat from Zenghui's report was: | DEBUG_LOCKS_WARN_ON(!irqs_disabled()) | WARNING: CPU: 3 PID: 125 at kernel/locking/lockdep.c:4258 lockdep_hardirqs_off+0xd4/0xe8 | Modules linked in: | CPU: 3 PID: 125 Comm: modprobe Tainted: G W 5.12.0-rc8+ #463 | Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 | pstate: 604003c5 (nZCv DAIF +PAN -UAO -TCO BTYPE=--) | pc : lockdep_hardirqs_off+0xd4/0xe8 | lr : lockdep_hardirqs_off+0xd4/0xe8 | sp : ffff80002a39bad0 | pmr_save: 000000e0 | x29: ffff80002a39bad0 x28: ffff0000de214bc0 | x27: ffff0000de1c0400 x26: 000000000049b328 | x25: 0000000000406f30 x24: ffff0000de1c00a0 | x23: 0000000020400005 x22: ffff8000105f747c | x21: 0000000096000044 x20: 0000000000498ef9 | x19: ffff80002a39bc88 x18: ffffffffffffffff | x17: 0000000000000000 x16: ffff800011c61eb0 | x15: ffff800011700a88 x14: 0720072007200720 | x13: 0720072007200720 x12: 0720072007200720 | x11: 0720072007200720 x10: 0720072007200720 | x9 : ffff80002a39bad0 x8 : ffff80002a39bad0 | x7 : ffff8000119f0800 x6 : c0000000ffff7fff | x5 : ffff8000119f07a8 x4 : 0000000000000001 | x3 : 9bcdab23f2432800 x2 : ffff800011730538 | x1 : 9bcdab23f2432800 x0 : 0000000000000000 | Call trace: | lockdep_hardirqs_off+0xd4/0xe8 | enter_from_kernel_mode.isra.5+0x7c/0xa8 | el1_abort+0x24/0x100 | el1_sync_handler+0x80/0xd0 | el1_sync+0x6c/0x100 | __arch_clear_user+0xc/0x90 | load_elf_binary+0x9fc/0x1450 | bprm_execve+0x404/0x880 | kernel_execve+0x180/0x188 | call_usermodehelper_exec_async+0xdc/0x158 | ret_from_fork+0x10/0x18
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
RHSA-2024:3426
Red Hat Security Advisory: varnish:6 security update
varnish: HTTP/2 Broken Window Attack may result in denial of service
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.5
null
null
null
GHSA-33wh-vxg7-253j
LINE 4.3.0.724 and earlier on Windows and 4.3.1 and earlier on OS X allows remote authenticated users to cause a denial of service (application crash) via a crafted post that is mishandled when displaying a Timeline.
[]
null
null
5.7
null
null
CVE-2024-11963
code-projects Responsive Hotel Site room.php sql injection
A vulnerability, which was classified as critical, has been found in code-projects Responsive Hotel Site 1.0. Affected by this issue is some unknown functionality of the file /admin/room.php. The manipulation of the argument troom leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:codeprojects:responsive_hotel_site:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:fabianros:responsive_hotel_site:1.0:*:*:*:*:*:*:*" ]
5.3
6.3
6.3
6.5
null
CVE-2006-6463
Unrestricted file upload vulnerability in admin/add.php in Midicart allows remote authenticated users to upload arbitrary .php files, and possibly other files, to the images/ directory under the web root.
[ "cpe:2.3:a:midicart_software:midicart_php_shopping_cart:*:*:*:*:*:*:*:*" ]
null
null
null
6.5
null
cisco-sa-on-prem-access-ctrl-fpQRfdpf
Cisco Smart Software Manager On-Prem Improper Access Control Vulnerability
A vulnerability in the web application of Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an unauthenticated, remote attacker to create arbitrary user accounts. The vulnerability is due to the lack of authorization controls in the web application. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to add user accounts to the configuration of an affected device. These accounts would not be administrator or operator accounts. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-on-prem-access-ctrl-fpQRfdpf ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-on-prem-access-ctrl-fpQRfdpf"]
[]
null
null
5.3
null
null
CVE-2020-10196
An XSS vulnerability in the popup-builder plugin before 3.64.1 for WordPress allows remote attackers to inject arbitrary JavaScript into existing popups via an unsecured ajax action in com/classes/Ajax.php. It is possible for an unauthenticated attacker to insert malicious JavaScript in several of the popup's fields by sending a request to wp-admin/admin-ajax.php with the POST action parameter of sgpb_autosave and including additional data in an allPopupData parameter, including the popup's ID (which is visible in the source of the page in which the popup is inserted) and arbitrary JavaScript which will then be executed in the browsers of visitors to that page. Because the plugin functionality automatically adds script tags to data entered into these fields, this injection will typically bypass most WAF applications.
[ "cpe:2.3:a:sygnoos:popup-builder:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
4.3
null
CVE-2022-36056
Vulnerabilities with blob verification in sigstore cosign
Cosign is a project under the sigstore organization which aims to make signatures invisible infrastructure. In versions prior to 1.12.0 a number of vulnerabilities have been found in cosign verify-blob, where Cosign would successfully verify an artifact when verification should have failed. First a cosign bundle can be crafted to successfully verify a blob even if the embedded rekorBundle does not reference the given signature. Second, when providing identity flags, the email and issuer of a certificate is not checked when verifying a Rekor bundle, and the GitHub Actions identity is never checked. Third, providing an invalid Rekor bundle without the experimental flag results in a successful verification. And fourth an invalid transparency log entry will result in immediate success for verification. Details and examples of these issues can be seen in the GHSA-8gw7-4j42-w388 advisory linked. Users are advised to upgrade to 1.12.0. There are no known workarounds for these issues.
[ "cpe:2.3:a:sigstore:cosign:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-wr6q-54pc-3f46
Denial of Service (DoS) vulnerability for Cerberus Enterprise 8.0.10.3 web administration. The vulnerability exists when the web server, default port 10001, attempts to process a large number of incomplete HTTP requests.
[]
null
7.5
null
null
null
cisco-sa-web-cmdinj2-fOnjk2LD
Cisco IOS XE Software Web UI Command Injection Vulnerability
A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker to inject and execute arbitrary commands with administrative privileges on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of user-supplied input to the web UI. An attacker could exploit this vulnerability by submitting crafted input to the web UI. A successful exploit could allow an attacker to execute arbitrary commands with administrative privileges on an affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-web-cmdinj2-fOnjk2LD ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-web-cmdinj2-fOnjk2LD"] This advisory is part of the June 3, 2020, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 23 Cisco Security Advisories that describe 25 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: June 2020 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication [" https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-73388"].
[]
null
null
8.8
null
null
GHSA-g822-h382-cv3p
The affected product is vulnerable to a heap-based buffer overflow via uninitialized pointer, which may allow an attacker to execute arbitrary code
[]
null
7.8
null
null
null
RHSA-2019:3219
Red Hat Security Advisory: sudo security update
sudo: Privilege escalation via 'Runas' specification with 'ALL' keyword
[ "cpe:/o:redhat:rhel_aus:7.3::server", "cpe:/o:redhat:rhel_e4s:7.3::server", "cpe:/o:redhat:rhel_tus:7.3::server" ]
null
null
7
null
null
GHSA-94m4-mcfw-8g48
TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a post-authentication buffer overflow via parameter text in the setSmsCfg function.
[]
null
8.8
null
null
null
GHSA-22vc-92p3-x699
Pre-School Enrollment version 1.0 is vulnerable to SQL Injection via the username parameter in preschool/admin/ page.
[]
null
9.8
null
null
null
CVE-2023-25309
Cross Site Scripting (XSS) Vulnerability in Fetlife rollout-ui version 0.5, allows attackers to execute arbitrary code via a crafted url to the delete a feature functionality.
[ "cpe:2.3:a:fetlife:rollout-ui:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
CVE-2018-16055
An authenticated command injection vulnerability exists in status_interfaces.php via dhcp_relinquish_lease() in pfSense before 2.4.4 due to its passing user input from the $_POST parameters "ifdescr" and "ipv" to a shell without escaping the contents of the variables. This allows an authenticated WebGUI user with privileges for the affected page to execute commands in the context of the root user when submitting a request to relinquish a DHCP lease for an interface which is configured to obtain its address via DHCP.
[ "cpe:2.3:a:netgate:pfsense:*:*:*:*:*:*:*:*" ]
null
null
8.8
9
null
GHSA-9qc9-qw5g-vjpm
SQL injection vulnerability have been found in 101news affecting version 1.0 through the "searchtitle" parameter in search.php.
[]
9.3
9.8
null
null
null
GHSA-3v68-wgp5-q8w6
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ajay Top 10 allows Stored XSS. This issue affects Top 10: from n/a through 4.1.0.
[]
null
6.5
null
null
null
CVE-2013-6434
The remote-viewer in Red Hat Enterprise Virtualization Manager (RHEV-M) before 3.3, when using a native SPICE client invocation method, initially makes insecure connections to the SPICE server, which allows man-in-the-middle attackers to spoof the SPICE server.
[ "cpe:2.3:a:redhat:enterprise_virtualization_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:enterprise_virtualization_manager:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:enterprise_virtualization_manager:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:enterprise_virtualization_manager:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:enterprise_virtualization_manager:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:enterprise_virtualization_manager:3.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-x9q5-6p8q-rxm7
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted Journal file, aka "Windows Journal Remote Code Execution Vulnerability," a different vulnerability than CVE-2015-1675, CVE-2015-1695, CVE-2015-1696, CVE-2015-1697, and CVE-2015-1698.
[]
null
null
null
null
null
CVE-2019-18604
In axohelp.c before 1.3 in axohelp in axodraw2 before 2.1.1b, as distributed in TeXLive and other collections, sprintf is mishandled.
[ "cpe:2.3:a:axohelp.c_project:axohelp.c:*:*:*:*:*:*:*:*", "cpe:2.3:a:axodraw2_project:axodraw2:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
CVE-2017-7109
An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. A cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML via crafted web content that incorrectly interacts with the Application Cache policy.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
GHSA-mj6j-rpg7-pcmw
The Buy A Gift (aka com.wBuyAGift) application 13529.90084 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
null
CVE-2021-30109
Froala Editor 3.2.6 is affected by Cross Site Scripting (XSS). Under certain conditions, a base64 crafted string leads to persistent Cross-site scripting (XSS) vulnerability within the hyperlink creation module.
[ "cpe:2.3:a:froala:froala_editor:3.2.6:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
GHSA-rgp9-mx7h-rwqv
The URI handlers in Konqueror for KDE 3.2.2 and earlier do not properly filter "-" characters that begin a hostname in a (1) telnet, (2) rlogin, (3) ssh, or (4) mailto URI, which allows remote attackers to manipulate the options that are passed to the associated programs, possibly to read arbitrary files or execute arbitrary code.
[]
null
null
null
null
null
CVE-2010-4600
Dojo Toolkit, as used in the Web client in IBM Rational ClearQuest 7.1.1.x before 7.1.1.4 and 7.1.2.x before 7.1.2.1, allows remote attackers to read cookies by navigating to a Dojo file, related to an "open direct" issue.
[ "cpe:2.3:a:dojofoundation:dojo_toolkit:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.2:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2023-36479
Jetty vulnerable to errant command quoting in CGI Servlet
Eclipse Jetty Canonical Repository is the canonical repository for the Jetty project. Users of the CgiServlet with a very specific command structure may have the wrong command executed. If a user sends a request to a org.eclipse.jetty.servlets.CGI Servlet for a binary with a space in its name, the servlet will escape the command by wrapping it in quotation marks. This wrapped command, plus an optional command prefix, will then be executed through a call to Runtime.exec. If the original binary name provided by the user contains a quotation mark followed by a space, the resulting command line will contain multiple tokens instead of one. This issue was patched in version 9.4.52, 10.0.16, 11.0.16 and 12.0.0-beta2.
[ "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:12.0.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:12.0.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:12.0.0:alpha3:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:12.0.0:beta0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:12.0.0:beta1:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*" ]
null
3.5
null
null
null
ICSA-15-064-02A
Siemens SIMATIC ProSave, SIMATIC CFC, SIMATIC STEP 7, SIMOTION Scout, and STARTER Insufficiently Qualified Paths (Update A)
Untrusted search path vulnerability in Siemens SIMATIC ProSave before 13 SP1; SIMATIC CFC before 8.0 SP4 Upd9 and 8.1 before Upd1; SIMATIC STEP 7 before 5.5 SP1 HF2, 5.5 SP2 before HF7, 5.5 SP3, and 5.5 SP4 before HF4; SIMOTION Scout before 4.4; and STARTER before 4.4 HF3 allows local users to gain privileges via a Trojan horse application file.
[]
null
null
null
null
null
CVE-2023-1861
Limit Login Attempts < 1.7.2 - Subscriber+ Stored XSS
The Limit Login Attempts WordPress plugin through 1.7.2 does not sanitize and escape usernames when outputting them back in the logs dashboard, which could allow any authenticated users, such as subscriber to perform Stored Cross-Site Scripting attacks
[ "cpe:2.3:a:limit_login_attempts_project:limit_login_attempts:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
null
CVE-2009-4331
The Install component in IBM DB2 9.5 before FP5 and 9.7 before FP1 configures the High Availability (HA) scripts with incorrect file-permission and authorization settings, which has unknown impact and local attack vectors.
[ "cpe:2.3:a:ibm:db2:9.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.5:fp1:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.5:fp2:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.5:fp2a:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.5:fp3:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.5:fp3a:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.5:fp3b:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.7:*:*:*:*:*:*:*" ]
null
null
null
7.2
null
GHSA-q6ch-7835-jp5v
Unspecified vulnerability in Microsoft Office 2003 SP1 and SP2, Office XP SP3, Office 2000 SP3, and other products, allows user-assisted attackers to execute arbitrary code via an Office file with malformed string that triggers memory corruption related to record lengths, aka "Microsoft Office Parsing Vulnerability," a different vulnerability than CVE-2006-2389.
[]
null
null
null
null
null
GHSA-hpw7-29rw-mm8p
An elevation of privilege vulnerability exists when Windows Hyper-V instruction emulation fails to properly enforce privilege levels, aka "Hypervisor Code Integrity Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers.
[]
null
null
8.8
null
null