id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2019-14233
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to the behaviour of the underlying HTMLParser, django.utils.html.strip_tags would be extremely slow to evaluate certain inputs containing large sequences of nested incomplete HTML entities.
[ "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-x846-9rxh-mcv9
In the Linux kernel, the following vulnerability has been resolved:drm/dp: Fix divide-by-zero regression on DP MST unplug with nouveauFix a regression when using nouveau and unplugging a StarTech MSTDP122DP DisplayPort 1.2 MST hub (the same regression does not appear when using a Cable Matters DisplayPort 1.4 MST hub). Trace:divide error: 0000 [#1] PREEMPT SMP PTI CPU: 7 PID: 2962 Comm: Xorg Not tainted 6.8.0-rc3+ #744 Hardware name: Razer Blade/DANA_MB, BIOS 01.01 08/31/2018 RIP: 0010:drm_dp_bw_overhead+0xb4/0x110 [drm_display_helper] Code: c6 b8 01 00 00 00 75 61 01 c6 41 0f af f3 41 0f af f1 c1 e1 04 48 63 c7 31 d2 89 ff 48 8b 5d f8 c9 48 0f af f1 48 8d 44 06 ff <48> f7 f7 31 d2 31 c9 31 f6 31 ff 45 31 c0 45 31 c9 45 31 d2 45 31 RSP: 0018:ffffb2c5c211fa30 EFLAGS: 00010206 RAX: ffffffffffffffff RBX: 0000000000000000 RCX: 0000000000f59b00 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffb2c5c211fa48 R08: 0000000000000001 R09: 0000000000000020 R10: 0000000000000004 R11: 0000000000000000 R12: 0000000000023b4a R13: ffff91d37d165800 R14: ffff91d36fac6d80 R15: ffff91d34a764010 FS: 00007f4a1ca3fa80(0000) GS:ffff91d6edbc0000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000559491d49000 CR3: 000000011d180002 CR4: 00000000003706f0 Call Trace: <TASK> ? show_regs+0x6d/0x80 ? die+0x37/0xa0 ? do_trap+0xd4/0xf0 ? do_error_trap+0x71/0xb0 ? drm_dp_bw_overhead+0xb4/0x110 [drm_display_helper] ? exc_divide_error+0x3a/0x70 ? drm_dp_bw_overhead+0xb4/0x110 [drm_display_helper] ? asm_exc_divide_error+0x1b/0x20 ? drm_dp_bw_overhead+0xb4/0x110 [drm_display_helper] ? drm_dp_calc_pbn_mode+0x2e/0x70 [drm_display_helper] nv50_msto_atomic_check+0xda/0x120 [nouveau] drm_atomic_helper_check_modeset+0xa87/0xdf0 [drm_kms_helper] drm_atomic_helper_check+0x19/0xa0 [drm_kms_helper] nv50_disp_atomic_check+0x13f/0x2f0 [nouveau] drm_atomic_check_only+0x668/0xb20 [drm] ? drm_connector_list_iter_next+0x86/0xc0 [drm] drm_atomic_commit+0x58/0xd0 [drm] ? __pfx___drm_printfn_info+0x10/0x10 [drm] drm_atomic_connector_commit_dpms+0xd7/0x100 [drm] drm_mode_obj_set_property_ioctl+0x1c5/0x450 [drm] ? __pfx_drm_connector_property_set_ioctl+0x10/0x10 [drm] drm_connector_property_set_ioctl+0x3b/0x60 [drm] drm_ioctl_kernel+0xb9/0x120 [drm] drm_ioctl+0x2d0/0x550 [drm] ? __pfx_drm_connector_property_set_ioctl+0x10/0x10 [drm] nouveau_drm_ioctl+0x61/0xc0 [nouveau] __x64_sys_ioctl+0xa0/0xf0 do_syscall_64+0x76/0x140 ? do_syscall_64+0x85/0x140 ? do_syscall_64+0x85/0x140 entry_SYSCALL_64_after_hwframe+0x6e/0x76 RIP: 0033:0x7f4a1cd1a94f Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <41> 89 c0 3d 00 f0 ff ff 77 1f 48 8b 44 24 18 64 48 2b 04 25 28 00 RSP: 002b:00007ffd2f1df520 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007ffd2f1df5b0 RCX: 00007f4a1cd1a94f RDX: 00007ffd2f1df5b0 RSI: 00000000c01064ab RDI: 000000000000000f RBP: 00000000c01064ab R08: 000056347932deb8 R09: 000056347a7d99c0 R10: 0000000000000000 R11: 0000000000000246 R12: 000056347938a220 R13: 000000000000000f R14: 0000563479d9f3f0 R15: 0000000000000000 </TASK> Modules linked in: rfcomm xt_conntrack nft_chain_nat xt_MASQUERADE nf_nat nf_conntrack_netlink nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xfrm_user xfrm_algo xt_addrtype nft_compat nf_tables nfnetlink br_netfilter bridge stp llc ccm cmac algif_hash overlay algif_skcipher af_alg bnep binfmt_misc snd_sof_pci_intel_cnl snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_pci snd_sof_xtensa_dsp snd_sof_intel_hda snd_sof snd_sof_utils snd_soc_acpi_intel_match snd_soc_acpi snd_soc_core snd_compress snd_sof_intel_hda_mlink snd_hda_ext_core iwlmvm intel_rapl_msr intel_rapl_common intel_tcc_cooling x86_pkg_temp_thermal intel_powerclamp mac80211 coretemp kvm_intel snd_hda_codec_hdmi kvm snd_hda_ ---truncated---
[]
null
5.5
null
null
CVE-2018-18783
XSS was discovered in SEMCMS V3.4 via the semcms_remail.php?type=ok umail parameter.
[ "cpe:2.3:a:sem-cms:semcms:3.4:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
CVE-2020-16861
Microsoft Dynamics 365 (On-Premise) Cross Site Scripting Vulnerability
<p>A cross site scripting vulnerability exists when Microsoft Dynamics 365 (on-premises) does not properly sanitize a specially crafted web request to an affected Dynamics server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected Dynamics server.</p> <p>The attacker who successfully exploited the vulnerability could then perform cross-site scripting attacks on affected systems and run script in the security context of the current authenticated user. These attacks could allow the attacker to read content that the attacker is not authorized to read, use the victim's identity to take actions within Dynamics Server on behalf of the user, such as change permissions and delete content, and inject malicious content in the browser of the user.</p> <p>The security update addresses the vulnerability by helping to ensure that Dynamics Server properly sanitizes web requests.</p>
[ "cpe:2.3:a:microsoft:dynamics_365:8.2:*:*:*:on-premises:*:*:*", "cpe:2.3:a:microsoft:dynamics_365:9.0:*:*:*:on-premises:*:*:*" ]
null
5.4
null
null
CVE-2023-22662
Improper input validation of EpsdSrMgmtConfig in UEFI firmware for some Intel(R) Server Board S2600BP products may allow a privileged user to potentially enable denial of service via local access.
[]
null
5.8
null
null
GHSA-65f7-9jmg-75c7
In the Linux kernel, the following vulnerability has been resolved:misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram()`struct vmci_event_qp` allocated by qp_notify_peer() contains padding, which may carry uninitialized data to the userspace, as observed by KMSAN:BUG: KMSAN: kernel-infoleak in instrument_copy_to_user ./include/linux/instrumented.h:121 instrument_copy_to_user ./include/linux/instrumented.h:121 _copy_to_user+0x5f/0xb0 lib/usercopy.c:33 copy_to_user ./include/linux/uaccess.h:169 vmci_host_do_receive_datagram drivers/misc/vmw_vmci/vmci_host.c:431 vmci_host_unlocked_ioctl+0x33d/0x43d0 drivers/misc/vmw_vmci/vmci_host.c:925 vfs_ioctl fs/ioctl.c:51 ...Uninit was stored to memory at: kmemdup+0x74/0xb0 mm/util.c:131 dg_dispatch_as_host drivers/misc/vmw_vmci/vmci_datagram.c:271 vmci_datagram_dispatch+0x4f8/0xfc0 drivers/misc/vmw_vmci/vmci_datagram.c:339 qp_notify_peer+0x19a/0x290 drivers/misc/vmw_vmci/vmci_queue_pair.c:1479 qp_broker_attach drivers/misc/vmw_vmci/vmci_queue_pair.c:1662 qp_broker_alloc+0x2977/0x2f30 drivers/misc/vmw_vmci/vmci_queue_pair.c:1750 vmci_qp_broker_alloc+0x96/0xd0 drivers/misc/vmw_vmci/vmci_queue_pair.c:1940 vmci_host_do_alloc_queuepair drivers/misc/vmw_vmci/vmci_host.c:488 vmci_host_unlocked_ioctl+0x24fd/0x43d0 drivers/misc/vmw_vmci/vmci_host.c:927 ...Local variable ev created at: qp_notify_peer+0x54/0x290 drivers/misc/vmw_vmci/vmci_queue_pair.c:1456 qp_broker_attach drivers/misc/vmw_vmci/vmci_queue_pair.c:1662 qp_broker_alloc+0x2977/0x2f30 drivers/misc/vmw_vmci/vmci_queue_pair.c:1750Bytes 28-31 of 48 are uninitialized Memory access of size 48 starts at ffff888035155e00 Data copied to user address 0000000020000100Use memset() to prevent the infoleaks.Also speculatively fix qp_notify_peer_local(), which may suffer from the same problem.
[]
null
null
null
null
CVE-2024-21938
Incorrect default permissions in the AMD Management Plugin for the Microsoft® System Center Configuration Manager (SCCM) installation directory could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution.
[ "cpe:2.3:a:amd:management_plugin_for_sccm:*:*:*:*:*:*:*:*" ]
null
7.3
null
null
GHSA-mrcx-3pvh-cm2f
In JetBrains WebStorm before 2021.1, code execution without user confirmation was possible for untrusted projects.
[]
null
null
null
null
GHSA-56mw-mj26-xm7x
Adobe Acrobat and Reader versions 2019.021.20061 and earlier, 2017.011.30156 and earlier, 2017.011.30156 and earlier, and 2015.006.30508 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
[]
null
null
null
null
CVE-2020-5944
In BIG-IQ 7.1.0, accessing the DoS Summary events and DNS Overview pages in the BIG-IQ system interface returns an error message due to disabled Grafana reverse proxy in web service configuration. F5 has done further review of this vulnerability and has re-classified it as a defect. CVE-2020-5944 will continue to be referenced in F5 Security Advisory K57274211 and will not be assigned to other F5 vulnerabilities.
[ "cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*" ]
null
4.3
null
4
CVE-1999-0176
The Webgais program allows a remote user to execute arbitrary commands.
[ "cpe:2.3:a:webgais_development_team:webgais:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2023-32868
In display drm, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07363632; Issue ID: ALPS07363632.
[ "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*" ]
null
6.7
null
null
CVE-2021-30615
Chromium: CVE-2021-30615 Cross-origin data leak in Navigation
[ "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
CVE-2022-25217
Use of a hard-coded cryptographic key pair by the telnetd_startup service allows an attacker on the local area network to obtain a root shell on the device over telnet. The builds of telnetd_startup included in the version 22.5.9.163 of the K2 firmware, and version 32.1.15.93 of the K3C firmware (possibly amongst many other releases) included both the private and public RSA keys. The remaining versions cited here redacted the private key, but left the public key unchanged. An attacker in possession of the leaked private key may, through a scripted exchange of UDP packets, instruct telnetd_startup to spawn an unauthenticated telnet shell as root, by means of which they can then obtain complete control of the device. A consequence of the limited availablility of firmware images for testing is that models and versions not listed here may share this vulnerability.
[ "cpe:2.3:o:phicomm:k2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phicomm:k2:-:*:*:*:*:*:*:*", "cpe:2.3:o:phicomm:k3c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phicomm:k3c:-:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
CVE-2015-6498
Alcatel-Lucent Home Device Manager before 4.1.10, 4.2.x before 4.2.2 allows remote attackers to spoof and make calls as target devices.
[ "cpe:2.3:a:alcatel-lucent:home_device_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:alcatel-lucent:home_device_manager:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:alcatel-lucent:home_device_manager:4.2.1:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-2qp9-qg33-hhf9
Buffer overflow in the SYSTEM_CREATE_INSTANCE function in the SAP RFC Library 6.40 and 7.00 before 20061211 allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: This information is based upon a vague initial disclosure. Details will be updated after the grace period has ended.
[]
null
null
null
null
CVE-2021-29046
Cross-site scripting (XSS) vulnerability in the Asset module's category selector input field in Liferay Portal 7.3.5 and Liferay DXP 7.3 before fix pack 1, allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_asset_categories_admin_web_portlet_AssetCategoriesAdminPortlet_title parameter.
[ "cpe:2.3:a:liferay:dxp:7.3:-:*:*:*:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.3.5:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
CVE-2018-4904
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability is an instance of a heap overflow vulnerability. The vulnerability is triggered by crafted TIFF data within an XPS file, which causes an out of bounds memory access. An attacker can potentially leverage the vulnerability to corrupt sensitive data or execute arbitrary code.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*" ]
null
null
8.8
6.8
CVE-2020-14956
In Windows cleaning assistant 3.2, the driver file (AtpKrnl.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x223CCA.
[ "cpe:2.3:a:arswp:windows_cleanup_assistant:3.2:*:*:*:*:*:*:*" ]
null
7.8
null
6.1
GHSA-5hwq-98wj-j7h7
There is a reachable assertion abort in the function jpc_dequantize() in jpc/jpc_dec.c in JasPer 2.0.12 that will lead to a remote denial of service attack.
[]
null
7.5
null
null
CVE-2024-38143
Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability
Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*" ]
null
4.2
null
null
GHSA-9m87-6fj3-c5xh
Untrusted Search Path in PNPM
PNPM prior to v6.15.1 was discovered to contain an untrusted search path which causes the application to behave in unexpected ways when users execute PNPM commands in a directory containing malicious content. This vulnerability occurs when the application is ran on Windows OS.
[]
null
8.8
null
null
CVE-2023-29312
[FG-VD-23-004] Adobe InDesign 2023 Out-of-Bound Read Vulnerability II Notification
Adobe InDesign versions ID18.3 (and earlier) and ID17.4.1 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2015-5109
Integer overflow in Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat Reader DC Classic before 2015.006.30060, and Acrobat and Acrobat Reader DC Continuous before 2015.008.20082 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5097 and CVE-2015-5108.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
null
6.8
RHSA-2012:1418
Red Hat Security Advisory: kdelibs security update
kdelibs: Heap-based buffer overflow when parsing location of a font face source kdelibs: Heap-based buffer over-read when calculating dimensions of the canvas within the scale loop
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
CVE-2017-1000112
Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from UFO to non-UFO one, which leads to a memory corruption. In case UFO packet lengths exceeds MTU, copy = maxfraglen - skb->len becomes negative on the non-UFO path and the branch to allocate new skb is taken. This triggers fragmentation and computation of fraggap = skb_prev->len - maxfraglen. Fraggap can exceed MTU, causing copy = datalen - transhdrlen - fraggap to become negative. Subsequently skb_copy_and_csum_bits() writes out-of-bounds. A similar issue is present in IPv6 code. The bug was introduced in e89e9cf539a2 ("[IPv4/IPv6]: UFO Scatter-gather approach") on Oct 18 2005.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
7
null
6.9
CVE-2007-4510
ClamAV before 0.91.2, as used in Kolab Server 2.0 through 2.2beta1 and other products, allows remote attackers to cause a denial of service (application crash) via (1) a crafted RTF file, which triggers a NULL dereference in the cli_scanrtf function in libclamav/rtf.c; or (2) a crafted HTML document with a data: URI, which triggers a NULL dereference in the cli_html_normalise function in libclamav/htmlnorm.c. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", "cpe:2.3:a:kolab:kolab_server:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:kolab:kolab_server:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:kolab:kolab_server:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:kolab:kolab_server:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:kolab:kolab_server:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:kolab:kolab_server:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:kolab:kolab_server:2.2beta1:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2003-0945
The Web Database Manager in web-tools for SAP DB before 7.4.03.30 generates predictable session IDs, which allows remote attackers to conduct unauthorized activities.
[ "cpe:2.3:a:sap:sap_db:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
RHSA-2011:0841
Red Hat Security Advisory: systemtap security update
systemtap: does not guard against DWARF operations div-by-zero errors, which can cause a kernel panic
[ "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2019:3353
Red Hat Security Advisory: freeradius:3.0 security and bug fix update
freeradius: privilege escalation due to insecure logrotate configuration
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
6.4
null
GHSA-2pq8-vhfp-3f4x
Unspecified vulnerability in the banner module in Exponent CMS before 0.96.5 RC 1 allows "php injection" via unknown attack vectors.
[]
null
null
null
null
CVE-2009-0019
Remote Apple Events in Apple Mac OS X 10.4.11 and 10.5.6 allows remote attackers to cause a denial of service (application termination) or obtain sensitive information via unspecified vectors that trigger an out-of-bounds memory access.
[ "cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2017-15377
In Suricata before 4.x, it was possible to trigger lots of redundant checks on the content of crafted network traffic with a certain signature, because of DetectEngineContentInspection in detect-engine-content-inspection.c. The search engine doesn't stop when it should after no match is found; instead, it stops only upon reaching inspection-recursion-limit (3000 by default).
[ "cpe:2.3:a:openinfosecfoundation:suricata:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-gwmh-6579-2hjm
Multiple race conditions in (1) certain rules and (2) argument copying during VM protection, in CerbNG for FreeBSD 4.8 allow local users to defeat system call interposition and possibly gain privileges or bypass auditing, as demonstrated by modifying command lines in log-exec.cb.
[]
null
null
null
null
CVE-2022-24181
Cross-site scripting (XSS) via Host Header injection in PKP Open Journals System 2.4.8 >= 3.3 allows remote attackers to inject arbitary code via the X-Forwarded-Host Header.
[ "cpe:2.3:a:public_knowledge_project:open_journal_systems:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
GHSA-9vvw-9wr3-56v3
Unbound before 1.9.5 allows configuration injection in create_unbound_ad_servers.sh upon a successful man-in-the-middle attack against a cleartext HTTP session.
[]
null
5.9
null
null
GHSA-xmhh-xrcc-mx36
Scrypted Cross-site Scripting vulnerability
Scrypted is a home video integration and automation platform. In versions 0.55.0 and prior, a reflected cross-site scripting vulnerability exists in the plugin-http.ts file via the `owner' and 'pkg` parameters. An attacker can run arbitrary JavaScript code. As of time of publication, no known patches are available.
[]
5.3
6.1
null
null
CVE-2021-22781
Insufficiently Protected Credentials vulnerability exists in EcoStruxure Control Expert (all versions prior to V15.0 SP1, including all versions of Unity Pro), EcoStruxure Process Expert (all versions, including all versions of EcoStruxure Hybrid DCS), and SCADAPack RemoteConnect for x70, all versions, that could cause a leak of SMTP credential used for mailbox authentication when an attacker can access a project file.
[ "cpe:2.3:a:schneider-electric:ecostruxure_control_expert:*:*:*:*:*:*:*:*", "cpe:2.3:a:schneider-electric:ecostruxure_control_expert:15.0:-:*:*:*:*:*:*", "cpe:2.3:a:schneider-electric:ecostruxure_process_expert:*:*:*:*:*:*:*:*", "cpe:2.3:a:schneider-electric:remoteconnect:*:*:*:*:*:*:scadapack_x70:*" ]
null
5.5
null
2.1
GHSA-4hfv-g6pr-5qh7
osc before 0.151.0 allows remote attackers to execute arbitrary commands via shell metacharacters in a _service file.
[]
null
null
null
null
CVE-2023-25466
WordPress Who Hit The Page – Hit Counter Plugin <= 1.4.14.3 is vulnerable to Cross Site Scripting (XSS)
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Mahlamusa Who Hit The Page – Hit Counter plugin <= 1.4.14.3 versions.
[ "cpe:2.3:a:mahlamusa:who_hit_the_page_-_hit_counter:*:*:*:*:*:wordpress:*:*" ]
null
7.1
null
null
CVE-2024-24428
A reachable assertion in the oai_nas_5gmm_decode function of Open5GS <= 2.6.4 allows attackers to cause a Denial of Service (DoS) via a crafted NGAP packet.
[]
null
7.5
null
null
CVE-2014-4706
Huawei Campus S3700HI with software V200R001C00SPC300; Campus S5700 with software V200R002C00SPC100; Campus S7700 with software V200R003C00SPC300,V200R003C00SPC500; LSW S9700 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S2350 with software V200R003C00SPC300; S2750 with software V200R003C00SPC300; S5300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S5700 with software V200R001C00SPC300,V200R003C00SPC300; S6300 with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S6700 S3300HI with software V200R001C00SPC300,V200R002C00SPC100,V200R003C00SPC300; S7700 with software V200R001C00SPC300; S9300 with software V200R001C00SPC300,V200R003C00SPC300,V200R003C00SPC500; S9300E with software V200R003C00SPC300,V200R003C00SPC500 allow attackers to keep sending malformed packets to cause a denial of service (DoS) attack, aka a heap overflow.
[ "cpe:2.3:o:huawei:campus_s3700hi_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:campus_s3700hi:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s5700_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s6700_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s3300hi_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:s3300hi:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s5300_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s6300_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s7700_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:lsw_s9700_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:lsw_s9700:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:campus_s5700_firmware:v200r002c00spc100:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:campus_s5700:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s6700_firmware:v200r002c00spc100:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s5300_firmware:v200r002c00spc100:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s6300_firmware:v200r002c00spc100:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:campus_s7700_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:campus_s7700:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s9300e_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:s9300e:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s5300_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s5700_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s6300_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s6700_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s2350_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:s2350:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s2750_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:s2750:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:lsw_s9700_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:campus_s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s9300e_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:lsw_s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*" ]
null
null
7.5
7.8
CVE-2018-17008
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for wireless wlan_host_2g power.
[ "cpe:2.3:o:tp-link:tl-wr886n_firmware:6.0_2.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:tl-wr886n_firmware:7.0_1.1.0:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-wr886n:-:*:*:*:*:*:*:*" ]
null
null
6.5
4
GHSA-rrph-hg92-78p7
IBM i 7.27.3 Clustering could allow a local attacker to obtain sensitive information, caused by the use of advanced node failure detection using the REST API to interface with the HMC. An attacker could exploit this vulnerability to obtain HMC credentials. IBM X-Force ID: 162159.
[]
null
5.5
null
null
CVE-2023-6886
xnx3 wangmarket Role Management Page code injection
A vulnerability was found in xnx3 wangmarket 6.1. It has been rated as critical. Affected by this issue is some unknown functionality of the component Role Management Page. The manipulation leads to code injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-248246 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:wang.market:wangmarket:6.1:*:*:*:*:*:*:*" ]
null
4.7
4.7
5.8
CVE-2011-3803
SugarCRM 6.1.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by themes/Sugar5/layout_utils.php and certain other files.
[ "cpe:2.3:a:sugarcrm:sugarcrm:6.1.0:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2024-22441
HPE Cray Parallel Application Launch Service (PALS) is subject to an authentication bypass.
[ "cpe:2.3:o:hpe:cray_parallel_application_launch_service:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2019-0612
A security feature bypass vulnerability exists when Click2Play protection in Microsoft Edge improperly handles flash objects. By itself, this bypass vulnerability does not allow arbitrary code execution, aka 'Microsoft Edge Security Feature Bypass Vulnerability'.
[ "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
null
5.3
2.6
CVE-2019-1748
Cisco IOS and IOS XE Software Network Plug-and-Play Agent Certificate Validation Vulnerability
A vulnerability in the Cisco Network Plug-and-Play (PnP) agent of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to gain unauthorized access to sensitive data. The vulnerability exists because the affected software insufficiently validates certificates. An attacker could exploit this vulnerability by supplying a crafted certificate to an affected device. A successful exploit could allow the attacker to conduct man-in-the-middle attacks to decrypt and modify confidential information on user connections to the affected software.
[ "cpe:2.3:o:cisco:ios:12.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(1\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(1\\)t1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(1\\)xe:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(2\\)s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(2\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(2\\)t1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(2\\)xe:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(2\\)xe1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(2\\)xe3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(2\\)xe4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(2a\\)t1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(2b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(3\\)s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(3\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(3\\)t2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(3\\)t3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(3a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(3b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(3c\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(3d\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(4\\)s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(4\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(4\\)xe:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(4\\)xe2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(4a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(4b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(5\\)s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(5\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(5\\)t1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(5\\)xe:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(5\\)xe1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(5\\)xe2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(5\\)xe3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(5\\)xe4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(5\\)xe5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(5\\)xe8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(5\\)xt1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(5a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(6\\)s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(6\\)s1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(6\\)s2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(6a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(6b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(7\\)s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(7\\)s1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(7\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(7\\)t1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(7\\)t2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(7\\)t3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(7\\)xk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(7\\)xk1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(7a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(8\\)s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(8\\)s1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(8a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(8b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(9\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(9\\)s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(9\\)s8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(9\\)st:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(9a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(10\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(10\\)s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(10\\)s1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(10\\)s2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(10\\)s3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(10\\)s3b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(10\\)s4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(10\\)s5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(10\\)s6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(10\\)s7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(10\\)s8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(10\\)st:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(10\\)st1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(10\\)st2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(10a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(11\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(11\\)s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(11\\)s1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(11\\)s2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(11\\)s3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(11\\)s4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(11\\)s5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(11\\)s6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(11\\)st:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(11\\)st1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(11\\)st2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(11\\)st3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(11\\)st4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(11a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(12\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(12a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(13\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(13a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(14\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(14a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(15\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(15a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(15b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(16\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(16a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(16b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(17\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(17a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(18\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(18b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(19\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(19a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(19b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(20\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(20a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(21\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(21a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(22\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(23\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(24\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(25\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(26\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(27\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(28\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(28\\)s4a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(28a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(28b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(28c\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(28d\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(31\\)sz2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(1\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(1c\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(2\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(2b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(3\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(3\\)xi:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(3b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(4a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(4b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(4c\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(5\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(5\\)t4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(5\\)t5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(5\\)t7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(5\\)t8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(5\\)t8c:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(5\\)t9:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(5\\)t10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(5\\)t12:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(5\\)t13:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(5\\)t15:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(5\\)t17:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(5\\)t18:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(5\\)t19:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(5\\)yb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(5\\)yb2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(5a\\)e5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(5a\\)e6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(5b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(5c\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(5c\\)e11:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(5c\\)ex:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(5c\\)ex1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(5e\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(6\\)e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(6\\)e8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(6\\)e12:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2c:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(6\\)ex:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(6a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(6b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(7a\\)e5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(7b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(7c\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(8\\)ea1b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(8a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(8a\\)e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e9:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e12:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e13:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e15:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e19:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e20:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(8b\\)ex4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(8c\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(9\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(9\\)ea1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(9\\)ea1c:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(9\\)ea1d:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(9\\)ex:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(9a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(10\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(10a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(11\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(11b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(12\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(12a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(12b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(13\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(13a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(14\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(15\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(16\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(17\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(17a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(18\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(19\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(19\\)ea1b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(19\\)ea1c:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(20\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(20a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(21\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(22\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea4a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(22a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(22b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(22c\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(24\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(25\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1\\(26\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(1b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(1d\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(2\\)xb9:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(3d\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(3g\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(4\\)xl2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(5a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(5d\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(6a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(6b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(6c\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(6d\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(6e\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(6f\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(6g\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(6h\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(6i\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(6j\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(7a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(7b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(7c\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(7g\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(8\\)zb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(9\\)yo:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(9\\)yo1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(9\\)yo2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(9\\)yo3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(9\\)yo4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(10\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(10a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(10b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(10d\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(10g\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(11\\)yz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(11\\)yz1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(11\\)yz2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(11\\)yz3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(12\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(12a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(12b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(12b\\)m1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(12c\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(12d\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(12e\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(12f\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(12g\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(12h\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(12h\\)m1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(12i\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(12j\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(12k\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(12l\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(12m\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(13\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(13a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(13b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(13b\\)m1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(13b\\)m2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(13c\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(13e\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(16\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(16a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(16b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(16c\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(16f\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(17\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(17a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(17b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(17d\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(17e\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(17f\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(18\\)s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(18\\)s1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(18\\)s2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(18\\)s3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(18\\)s4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(19\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(19a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(19b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(19c\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(20\\)s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(20\\)s1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(20\\)s2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(20\\)s2a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(20\\)s3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(20\\)s4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(20\\)s4a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(20\\)s5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(20\\)s6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(21\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(21a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(21b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(22\\)s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(23\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(23a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(23c\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(23d\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(23e\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(23f\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(24\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(24a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(24b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(25\\)s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(25\\)s1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(25\\)s2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(25\\)se:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(26\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(26a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(26b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(27\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(27\\)sbk9:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(27a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(27b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(28\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(28a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(28b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(28c\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(28d\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(29\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(29a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(31\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(32\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(37\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(40\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(40a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(46\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3\\(2\\)ja3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3\\(2\\)ja4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3\\(7\\)jx9:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3\\(7\\)xi3a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3\\(8\\)jk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3\\(9\\)m0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3\\(9\\)m1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3\\(11\\)ja2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3\\(11\\)jx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3\\(11\\)jx1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3\\(11\\)yf2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(11\\)md2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(23c\\)jy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.0\\(2\\)se13:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd9:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg8a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.1\\(3\\)mra3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.1\\(3\\)svg3d:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.1\\(3\\)svi1b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.1\\(3\\)svk4b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.1\\(3\\)svk4c:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.1\\(3\\)svo1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.1\\(3\\)svo2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.1\\(3\\)svp1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(1\\)e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(1\\)e1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(1\\)e2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(1\\)e3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(1\\)ey:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy0a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2\\)e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2\\)e1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2\\)e2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2\\)e3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2\\)e4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2\\)e6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2\\)e8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2\\)e9:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2\\)e9a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2\\)e10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2\\)sc1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2\\)sc3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2\\)sc4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(2b\\)e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(3\\)e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(3\\)e1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(3\\)e2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(3\\)e3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(3\\)e4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(3\\)e5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(3\\)ea:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(3\\)ea1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(3a\\)e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(4\\)e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(4\\)e1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(4\\)e2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(4\\)e3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(4\\)e4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(4\\)e6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(4\\)jaz1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(4a\\)ea5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(4m\\)e1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(4m\\)e2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(4m\\)e3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(4n\\)e2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(4o\\)e2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(4o\\)e3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(4p\\)e1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(4q\\)e1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(4s\\)e1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(4s\\)e2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(5\\)e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2c:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(5\\)ea:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(5\\)ex:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(5b\\)e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(5c\\)e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(6\\)e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0c:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(0\\)sy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(2\\)s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(2\\)s1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(2\\)s2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jaa1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc9:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc14:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd9:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd11:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd12:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd13:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd14:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd15:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd16:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)je:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf9:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf35:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jg1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jh:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)jh1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)s1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)s1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)s2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)s2a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)s3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)s4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)s5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)s6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)s6a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)s7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)s8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)s8a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)s9:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.3\\(3\\)s10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(1\\)cg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(1\\)cg1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(1\\)s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(1\\)s1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(1\\)s2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(1\\)s3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(1\\)s4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(1\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(1\\)t1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(1\\)t2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(1\\)t3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(1\\)t4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(2\\)cg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(2\\)s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(2\\)s1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(2\\)s2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(2\\)s3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(2\\)s4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(2\\)sn:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(2\\)sn1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(2\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(2\\)t1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(2\\)t2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(2\\)t3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(2\\)t4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)m:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)m1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)m2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)m3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)m4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)m5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)m6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)m6a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)m7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)m7a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)m8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)m9:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)m10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)s0d:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)s0e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)s0f:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)s1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)s2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)s3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)s4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)s5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)s6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)s6a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)s7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)s8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)s9:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)sn1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(3\\)sn1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(1\\)s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(1\\)s1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(1\\)s2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(1\\)s3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(1\\)s4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(1\\)sn:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(1\\)sn1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(1\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(1\\)t1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(1\\)t2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(1\\)t3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(1\\)t4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(2\\)s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(2\\)s1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(2\\)s2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(2\\)s3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(2\\)s4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(2\\)sn:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(2\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(2\\)t1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(2\\)t2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(2\\)t3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(2\\)t4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(2\\)xb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)m:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)m0a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)m1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)m2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)m2a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)m3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4c:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)m5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)m5a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)m6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)m6a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)m7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)s0a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)s2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)s3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)s4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)s5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)s6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)s6a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)s6b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)s7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)s7a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)s7b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)sn:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)sn0a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(1\\)s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(1\\)s1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(1\\)s2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(1\\)s3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(1\\)s4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(1\\)sn:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(1\\)sn1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(1\\)sn2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(1\\)sn3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(1\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(1\\)t0a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(1\\)t1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(1\\)t2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(1\\)t3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(2\\)s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(2\\)s0a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(2\\)s1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(2\\)s2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(2\\)s3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(2\\)s4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(2\\)sn:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp3b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(2\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(2\\)t0a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(2\\)t1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(2\\)t2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(2\\)t3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(3\\)m:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(3\\)m0a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(3\\)m3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(3\\)m3a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(3\\)m4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(3\\)sn:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(4\\)sn:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(5\\)sn:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(6\\)sn:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.6\\(7\\)sn:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.7\\(3\\)m:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.7\\(3\\)m0a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.7\\(3\\)m1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.3.0se:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.3.0xo:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.3.1se:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.3.1xo:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.3.2se:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.3.2xo:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.3.3se:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.3.4se:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.3.5se:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.5.0e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.5.1e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.5.2e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.5.3e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.6.0ae:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.6.0be:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.6.0e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.6.1e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.6.2ae:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.6.2e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.6.3e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.6.4e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.6.5ae:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.6.5e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.6.6e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.6.7ae:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.6.7be:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.6.7e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.6.9ae:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.6.9e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.6.10e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.7.0e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.7.1e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.7.2e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.7.3e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.7.4e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.7.5e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.7.7s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.8.4e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.8.5ae:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.8.5e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.8.6e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.9.0as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.9.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.9.1as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.9.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.9.2be:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.9.2e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.9.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.0ce:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.0e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.2as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.2ts:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.5s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.6s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.7s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.8as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.8s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.9s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.10s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.11.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.11.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.11.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.11.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.11.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.12.0as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.12.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.12.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.12.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.12.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.12.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.0as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.2as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.5as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.5s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.6as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.6bs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.6s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.7as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.7s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.8s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.9s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.0as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.0bs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.4cs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.4es:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.4gs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.5as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.5bs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.6bs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.6s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.7as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.7s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.17.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.0sp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.1asp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.1bsp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.1csp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.1gsp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.1hsp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.1isp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.2asp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.2sp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.3asp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.3bsp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.3sp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.4sp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.5sp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*" ]
null
null
7.4
null
CVE-2012-0329
Cisco Digital Media Manager 5.2.2 and earlier, and 5.2.3, allows remote authenticated users to execute arbitrary code via vectors involving a URL and an administrative resource, aka Bug ID CSCts63878.
[ "cpe:2.3:a:cisco:digital_media_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:digital_media_manager:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:digital_media_manager:3.5\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:digital_media_manager:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:digital_media_manager:4.1\\(0\\)40:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:digital_media_manager:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:digital_media_manager:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:digital_media_manager:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:digital_media_manager:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:digital_media_manager:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:digital_media_manager:5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:digital_media_manager:5.2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:digital_media_manager:5.2.3:*:*:*:*:*:*:*" ]
null
null
null
9
CVE-2024-48956
Serviceware Processes 6.0 through 7.3 before 7.4 allows attackers without valid authentication to send a specially crafted HTTP request to a service endpoint resulting in remote code execution.
[]
null
9.8
null
null
GHSA-c496-q9f8-gv47
The nsXBLProtoImpl::InstallImplementation function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 does not properly check whether objects are XBL objects, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via crafted JavaScript code that accesses a non-XBL object as if it were an XBL object.
[]
null
9.8
null
null
GHSA-5gpv-qvxg-fh9v
An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly handles objects in memory, aka 'Microsoft Graphics Component Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-0982, CVE-2020-1005.
[]
null
5.5
null
null
GHSA-r9w7-3xm2-f9rp
Cross-site scripting (XSS) vulnerability in Search.do in ManageEngine Applications Manager 8.x allows remote attackers to inject arbitrary web script or HTML via the query parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
GHSA-68cw-2c7v-6c2c
A specific authentication strategy allows to learn ids of PAM users associated with certain authentication types.
[]
5.3
null
null
null
GHSA-hgm3-c8r9-w7q7
Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
5.5
null
null
GHSA-hw6h-46jp-34wm
The Coolpad Defiant (Coolpad/cp3632a/cp3632a:7.1.1/NMF26F/099480857:user/release-keys) and the T-Mobile Revvl Plus (Coolpad/alchemy/alchemy:7.1.1/143.14.171129.3701A-TMO/buildf_nj_02-206:user/release-keys) Android devices contain a pre-installed platform app with a package name of com.qualcomm.qti.telephony.extcarrierpack (versionCode=25, versionName=7.1.1) containing an exported broadcast receiver app component named com.qualcomm.qti.telephony.extcarrierpack.UiccReceiver that allows any app co-located on the device to programmatically perform a factory reset. In addition, the app initiating the factory reset does not require any permissions. A factory reset will remove all user data and apps from the device. This will result in the loss of any data that have not been backed up or synced externally. The capability to perform a factory reset is not directly available to third-party apps (those that the user installs themselves with the exception of enabled Mobile Device Management (MDM) apps), although this capability can be obtained by leveraging an unprotected app component of a pre-installed platform app.
[]
null
null
7.5
null
RHSA-2020:5119
Red Hat Security Advisory: OpenShift Container Platform 4.5.20 packages and golang security update
golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs
[ "cpe:/a:redhat:openshift:4.5::el7", "cpe:/a:redhat:openshift:4.5::el8" ]
null
7.5
null
null
GHSA-9fjw-px98-qrx4
Race condition in SSH Tectia Server 4.0.3 and 4.0.4 for Unix, when the password change plugin (ssh-passwd-plugin) is enabled, allows local users to obtain the server's private key.
[]
null
null
null
null
RHSA-2022:4892
Red Hat Security Advisory: thunderbird security update
Mozilla: Braille space character caused incorrect sender email to be shown for a digitally signed email Mozilla: Cross-Origin resource's length leaked Mozilla: Heap buffer overflow in WebGL Mozilla: Browser window spoof using fullscreen mode Mozilla: Register allocation problem in WASM on arm64 Mozilla: Uninitialized variable leads to invalid memory read Mozilla: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
9.8
6.1
null
GHSA-r633-wf8f-mpmj
In cPanel before 62.0.17, addon domain conversion did not require a package for resellers (SEC-208).
[]
null
null
2.7
null
GHSA-4rcx-c5vj-xwh2
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory, aka 'Media Foundation Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0949, CVE-2020-0950.
[]
null
null
null
null
GHSA-7qpc-4xx9-x5qw
Apache Linkis DataSource's JDBC Datasource Module with DB2 has JNDI Injection vulnerability
In Apache Linkis <=1.5.0, due to the lack of effective filteringof parameters, an attacker configuring malicious `db2` parameters in the DataSource Manager Module will result in jndi injection. Therefore, the parameters in the DB2 URL should be blacklisted.This attack requires the attacker to obtain an authorized account from Linkis before it can be carried out.Versions of Apache Linkis <=1.5.0 will be affected. We recommend users upgrade the version of Linkis to version 1.6.0.
[]
8.7
8.8
null
null
CVE-2014-5923
The Facebook Status Via (aka com.StatusViaAdvanced) application 3.5 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:statusvia:facebook_status_via:3.5:*:*:*:*:android:*:*" ]
null
null
null
5.4
CVE-2022-22461
IBM Security Verify Governance, Identity Manager information disclosure
IBM Security Verify Governance, Identity Manager 10.0.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 225007.
[ "cpe:2.3:a:ibm:security_verify_governance:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
5.9
null
null
GHSA-p98c-qx6j-cgvx
A cross-site scripting (XSS) vulnerability in Customer Support System v1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the subject parameter at /customer_support/index.php?page=new_ticket.
[]
null
5.4
null
null
CVE-2010-4154
Directory traversal vulnerability in Rhino Software, Inc. FTP Voyager 15.2.0.11, and possibly earlier, allows remote FTP servers to write arbitrary files via a "..\" (dot dot backslash) in a filename.
[ "cpe:2.3:a:rhinosoft:ftp_voyager:*:*:*:*:*:*:*:*", "cpe:2.3:a:rhinosoft:ftp_voyager:15.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:rhinosoft:ftp_voyager:15.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:rhinosoft:ftp_voyager:15.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:rhinosoft:ftp_voyager:15.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:rhinosoft:ftp_voyager:15.1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:rhinosoft:ftp_voyager:15.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:rhinosoft:ftp_voyager:15.1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:rhinosoft:ftp_voyager:15.1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:rhinosoft:ftp_voyager:15.1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:rhinosoft:ftp_voyager:15.2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:rhinosoft:ftp_voyager:15.2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:rhinosoft:ftp_voyager:15.2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:rhinosoft:ftp_voyager:15.2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:rhinosoft:ftp_voyager:15.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:rhinosoft:ftp_voyager:15.2.0.9:*:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-53jm-3hc9-fqqc
Apache Batik vulnerable to Server-Side Request Forgery
Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache XML Graphics allows an attacker to fetch external resources. This issue affects Apache XML Graphics Batik 1.14.
[]
null
5.3
null
null
GHSA-mwrq-v3xr-mmc9
In updateInfo of android_hardware_input_InputApplicationHandle.cpp, there is a possible control of code flow due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-174768985
[]
null
null
null
null
GHSA-gh4h-9fqh-2r9h
Unspecified vulnerability in certain COM objects in Microsoft Office Web Components 2000 allows user-assisted remote attackers to execute arbitrary code via a crafted URL, aka "Office Web Components URL Parsing Vulnerability."
[]
null
null
null
null
GHSA-r8cr-jx69-43ff
An issue in Lens Visual integration with Power BI v.4.0.0.3 allows a remote attacker to execute arbitrary code via the Natural language processing component
[]
null
9.8
null
null
CVE-2008-7189
Multiple unspecified vulnerabilities in Local Media Browser before 0.1 have unknown impact and attack vectors related to "Security holes."
[ "cpe:2.3:a:bastian_blumentritt:local_media_browser:*:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-1999-0200
Windows NT FTP server (WFTP) with the guest account enabled without a password allows an attacker to log into the FTP server using any username and password.
[]
null
null
null
10
PYSEC-2025-23
null
Versions of the package ray before 2.43.0 are vulnerable to Insertion of Sensitive Information into Log File where the redis password is being logged in the standard logging. If the redis password is passed as an argument, it will be logged and could potentially leak the password. This is only exploitable if: 1) Logging is enabled; 2) Redis is using password authentication; 3) Those logs are accessible to an attacker, who can reach that redis instance. **Note:** It is recommended that anyone who is running in this configuration should update to the latest version of Ray, then rotate their redis password.
[]
null
null
null
null
CVE-2024-10933
OpenBSD readdir directory traversal
In OpenBSD 7.5 before errata 009 and OpenBSD 7.4 before errata 022, exclude any '/' in readdir name validation to avoid unexpected directory traversal on untrusted file systems.
[]
4.1
5
null
null
CVE-2007-3158
download_script.asp in ASP Folder Gallery allows remote attackers to read arbitrary files via a filename in the file parameter.
[ "cpe:2.3:a:tenyearsgone:asp_folder_gallery:*:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-rr83-9h8w-qx92
D-Link DAP-2622 DDP Set IPv6 Address Secondary DNS Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.The specific flaw exists within the DDP service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20096.
[]
null
null
8.8
null
GHSA-ppjv-334w-w4vx
SQL injection vulnerability in PHPKit 1.6.1 RC2 allows remote attackers to inject arbitrary SQL commands via the catid parameter to include.php when the path parameter is set to faq/faq.php, and other unspecified vectors involving guestbook/print.php.
[]
null
null
null
null
GHSA-x273-rvp7-p6jc
Cross-site scripting (XSS) vulnerability in login.php in Jeremy Ashcraft Simplog 0.9.2 and earlier allows remote attackers to inject arbitrary web script or HTML via the btag parameter.
[]
null
null
null
null
GHSA-f287-2xwg-rrg8
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in msmitley WP Cookie Consent allows Stored XSS. This issue affects WP Cookie Consent: from n/a through 1.0.
[]
null
5.9
null
null
ICSA-23-348-04
Siemens LOGO! and SIPLUS LOGO!
Affected devices are vulnerable to an electromagnetic fault injection. This could allow an attacker to dump and debug the firmware, including the manipulation of memory. Further actions could allow to inject public keys of custom created key pairs which are then signed by the product CA. The generation of a custom certificate allows communication with, and impersonation of, any device of the same version.
[]
null
7.6
null
null
GHSA-625w-pj52-7g22
Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution.
[]
null
null
7.8
null
GHSA-j8r5-8r3h-439x
In Janitza GridVis through 9.0.66, exposed dangerous methods in the de.janitza.pasw.project.server.ServerDatabaseProject project load functionality allow remote authenticated administrative users to execute arbitrary Groovy code.
[]
null
7.2
null
null
CVE-2017-1486
IBM Cognos Business Intelligence 10.2, 10.2.1, 10.2.1.1, and 10.2.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 128624.
[ "cpe:2.3:a:ibm:cognos_business_intelligence:10.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cognos_business_intelligence:10.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cognos_business_intelligence:10.2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cognos_business_intelligence:10.2.2:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
CVE-2024-50150
usb: typec: altmode should keep reference to parent
In the Linux kernel, the following vulnerability has been resolved: usb: typec: altmode should keep reference to parent The altmode device release refers to its parent device, but without keeping a reference to it. When registering the altmode, get a reference to the parent and put it in the release function. Before this fix, when using CONFIG_DEBUG_KOBJECT_RELEASE, we see issues like this: [ 43.572860] kobject: 'port0.0' (ffff8880057ba008): kobject_release, parent 0000000000000000 (delayed 3000) [ 43.573532] kobject: 'port0.1' (ffff8880057bd008): kobject_release, parent 0000000000000000 (delayed 1000) [ 43.574407] kobject: 'port0' (ffff8880057b9008): kobject_release, parent 0000000000000000 (delayed 3000) [ 43.575059] kobject: 'port1.0' (ffff8880057ca008): kobject_release, parent 0000000000000000 (delayed 4000) [ 43.575908] kobject: 'port1.1' (ffff8880057c9008): kobject_release, parent 0000000000000000 (delayed 4000) [ 43.576908] kobject: 'typec' (ffff8880062dbc00): kobject_release, parent 0000000000000000 (delayed 4000) [ 43.577769] kobject: 'port1' (ffff8880057bf008): kobject_release, parent 0000000000000000 (delayed 3000) [ 46.612867] ================================================================== [ 46.613402] BUG: KASAN: slab-use-after-free in typec_altmode_release+0x38/0x129 [ 46.614003] Read of size 8 at addr ffff8880057b9118 by task kworker/2:1/48 [ 46.614538] [ 46.614668] CPU: 2 UID: 0 PID: 48 Comm: kworker/2:1 Not tainted 6.12.0-rc1-00138-gedbae730ad31 #535 [ 46.615391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014 [ 46.616042] Workqueue: events kobject_delayed_cleanup [ 46.616446] Call Trace: [ 46.616648] <TASK> [ 46.616820] dump_stack_lvl+0x5b/0x7c [ 46.617112] ? typec_altmode_release+0x38/0x129 [ 46.617470] print_report+0x14c/0x49e [ 46.617769] ? rcu_read_unlock_sched+0x56/0x69 [ 46.618117] ? __virt_addr_valid+0x19a/0x1ab [ 46.618456] ? kmem_cache_debug_flags+0xc/0x1d [ 46.618807] ? typec_altmode_release+0x38/0x129 [ 46.619161] kasan_report+0x8d/0xb4 [ 46.619447] ? typec_altmode_release+0x38/0x129 [ 46.619809] ? process_scheduled_works+0x3cb/0x85f [ 46.620185] typec_altmode_release+0x38/0x129 [ 46.620537] ? process_scheduled_works+0x3cb/0x85f [ 46.620907] device_release+0xaf/0xf2 [ 46.621206] kobject_delayed_cleanup+0x13b/0x17a [ 46.621584] process_scheduled_works+0x4f6/0x85f [ 46.621955] ? __pfx_process_scheduled_works+0x10/0x10 [ 46.622353] ? hlock_class+0x31/0x9a [ 46.622647] ? lock_acquired+0x361/0x3c3 [ 46.622956] ? move_linked_works+0x46/0x7d [ 46.623277] worker_thread+0x1ce/0x291 [ 46.623582] ? __kthread_parkme+0xc8/0xdf [ 46.623900] ? __pfx_worker_thread+0x10/0x10 [ 46.624236] kthread+0x17e/0x190 [ 46.624501] ? kthread+0xfb/0x190 [ 46.624756] ? __pfx_kthread+0x10/0x10 [ 46.625015] ret_from_fork+0x20/0x40 [ 46.625268] ? __pfx_kthread+0x10/0x10 [ 46.625532] ret_from_fork_asm+0x1a/0x30 [ 46.625805] </TASK> [ 46.625953] [ 46.626056] Allocated by task 678: [ 46.626287] kasan_save_stack+0x24/0x44 [ 46.626555] kasan_save_track+0x14/0x2d [ 46.626811] __kasan_kmalloc+0x3f/0x4d [ 46.627049] __kmalloc_noprof+0x1bf/0x1f0 [ 46.627362] typec_register_port+0x23/0x491 [ 46.627698] cros_typec_probe+0x634/0xbb6 [ 46.628026] platform_probe+0x47/0x8c [ 46.628311] really_probe+0x20a/0x47d [ 46.628605] device_driver_attach+0x39/0x72 [ 46.628940] bind_store+0x87/0xd7 [ 46.629213] kernfs_fop_write_iter+0x1aa/0x218 [ 46.629574] vfs_write+0x1d6/0x29b [ 46.629856] ksys_write+0xcd/0x13b [ 46.630128] do_syscall_64+0xd4/0x139 [ 46.630420] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 46.630820] [ 46.630946] Freed by task 48: [ 46.631182] kasan_save_stack+0x24/0x44 [ 46.631493] kasan_save_track+0x14/0x2d [ 46.631799] kasan_save_free_info+0x3f/0x4d [ 46.632144] __kasan_slab_free+0x37/0x45 [ 46.632474] ---truncated---
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2022-23764
TERUTEN WebCube update remote code execution vulnerability
The vulnerability causing from insufficient verification procedures for downloaded files during WebCube update. Remote attackers can bypass this verification logic to update both digitally signed and unauthorized files, enabling remote code execution.
[ "cpe:2.3:a:teruten:webcube:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-vj46-rwjp-pvr9
An issue was discovered on Sannce Smart HD Wifi Security Camera EAN 2 950004 595317 devices. It is possible (using TELNET without a password) to control the camera's pan/zoom/tilt functionality.
[]
null
7.5
null
null
CVE-2021-27494
Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior lack proper validation of user-supplied data when parsing STP files. This could result in a stack-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process.
[ "cpe:2.3:a:datakit:crosscadware:*:*:*:*:*:*:*:*", "cpe:2.3:a:luxion:keyshot:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:solid_edge_se2020_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:solid_edge_se2020:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:solid_edge_se2021_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:solid_edge_se2021:-:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
GHSA-fqqj-5wmx-j7xv
The DIRapi library in Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2448.
[]
null
null
null
null
CVE-2013-2747
The password reset feature in Courion Access Risk Management Suite Version 8 Update 9 allows remote authenticated users to bypass intended Internet Explorer usage restrictions and execute arbitrary commands by using keyboard shortcuts to navigate the file system and open a command prompt.
[ "cpe:2.3:a:courion:access_risk_management_suite:8.0:9:*:*:*:*:*:*" ]
null
null
null
6.5
GHSA-3c9x-2mx6-v84j
An elevation of privilege vulnerability exists when Microsoft Edge does not properly enforce cross-domain policies, which could allow an attacker to access information from one domain and inject it into another domain, aka "Microsoft Edge Elevation of Privilege Vulnerability." This affects Microsoft Edge.
[]
null
null
5.4
null
GHSA-7v2f-q2x7-7cpv
cPanel before 68.0.15 does not preserve permissions for local backup transport (SEC-330).
[]
null
null
3.3
null
CVE-2023-30653
Out of bounds read and write in enableTspDevice of sysinput HAL service prior to SMR Jul-2023 Release 1 allows local attackers to execute arbitrary code.
[ "cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-apr-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jan-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jun-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-mar-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-may-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-nov-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-oct-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*" ]
null
6.7
null
null
CVE-2020-29243
dhowden tag before 2020-11-19 allows "panic: runtime error: index out of range" via readAPICFrame.
[ "cpe:2.3:a:tag_project:tag:*:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
CVE-2018-14966
An issue was discovered in EMLsoft 5.4.5. The eml/upload/eml/?action=user&do=add page allows CSRF.
[ "cpe:2.3:a:emlsoft_project:emlsoft:5.4.5:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
CVE-2018-5381
The Quagga BGP daemon (bgpd) prior to version 1.2.3 has a bug in its parsing of "Capabilities" in BGP OPEN messages, in the bgp_packet.c:bgp_capability_msg_parse function. The parser can enter an infinite loop on invalid capabilities if a Multi-Protocol capability does not have a recognized AFI/SAFI, causing a denial of service.
[ "cpe:2.3:a:quagga:quagga:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ruggedcom_rox_ii_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ruggedcom_rox_ii:-:*:*:*:*:*:*:*" ]
null
null
6.5
null
GHSA-8hhc-w6w2-395c
Microsoft Exchange Server 2010 SP3, Exchange Server 2013 SP3, Exchange Server 2013 CU16, and Exchange Server 2016 CU5 allows an elevation of privilege vulnerability due to the way that Exchange Outlook Web Access (OWA) handles web requests, aka "Microsoft Exchange Cross-Site Scripting Vulnerability". This CVE ID is unique from CVE-2017-8559.
[]
null
null
6.1
null
CVE-2021-47428
powerpc/64s: fix program check interrupt emergency stack path
In the Linux kernel, the following vulnerability has been resolved: powerpc/64s: fix program check interrupt emergency stack path Emergency stack path was jumping into a 3: label inside the __GEN_COMMON_BODY macro for the normal path after it had finished, rather than jumping over it. By a small miracle this is the correct place to build up a new interrupt frame with the existing stack pointer, so things basically worked okay with an added weird looking 700 trap frame on top (which had the wrong ->nip so it didn't decode bug messages either). Fix this by avoiding using numeric labels when jumping over non-trivial macros. Before: LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA PowerNV Modules linked in: CPU: 0 PID: 88 Comm: sh Not tainted 5.15.0-rc2-00034-ge057cdade6e5 #2637 NIP: 7265677368657265 LR: c00000000006c0c8 CTR: c0000000000097f0 REGS: c0000000fffb3a50 TRAP: 0700 Not tainted MSR: 9000000000021031 <SF,HV,ME,IR,DR,LE> CR: 00000700 XER: 20040000 CFAR: c0000000000098b0 IRQMASK: 0 GPR00: c00000000006c964 c0000000fffb3cf0 c000000001513800 0000000000000000 GPR04: 0000000048ab0778 0000000042000000 0000000000000000 0000000000001299 GPR08: 000001e447c718ec 0000000022424282 0000000000002710 c00000000006bee8 GPR12: 9000000000009033 c0000000016b0000 00000000000000b0 0000000000000001 GPR16: 0000000000000000 0000000000000002 0000000000000000 0000000000000ff8 GPR20: 0000000000001fff 0000000000000007 0000000000000080 00007fff89d90158 GPR24: 0000000002000000 0000000002000000 0000000000000255 0000000000000300 GPR28: c000000001270000 0000000042000000 0000000048ab0778 c000000080647e80 NIP [7265677368657265] 0x7265677368657265 LR [c00000000006c0c8] ___do_page_fault+0x3f8/0xb10 Call Trace: [c0000000fffb3cf0] [c00000000000bdac] soft_nmi_common+0x13c/0x1d0 (unreliable) --- interrupt: 700 at decrementer_common_virt+0xb8/0x230 NIP: c0000000000098b8 LR: c00000000006c0c8 CTR: c0000000000097f0 REGS: c0000000fffb3d60 TRAP: 0700 Not tainted MSR: 9000000000021031 <SF,HV,ME,IR,DR,LE> CR: 22424282 XER: 20040000 CFAR: c0000000000098b0 IRQMASK: 0 GPR00: c00000000006c964 0000000000002400 c000000001513800 0000000000000000 GPR04: 0000000048ab0778 0000000042000000 0000000000000000 0000000000001299 GPR08: 000001e447c718ec 0000000022424282 0000000000002710 c00000000006bee8 GPR12: 9000000000009033 c0000000016b0000 00000000000000b0 0000000000000001 GPR16: 0000000000000000 0000000000000002 0000000000000000 0000000000000ff8 GPR20: 0000000000001fff 0000000000000007 0000000000000080 00007fff89d90158 GPR24: 0000000002000000 0000000002000000 0000000000000255 0000000000000300 GPR28: c000000001270000 0000000042000000 0000000048ab0778 c000000080647e80 NIP [c0000000000098b8] decrementer_common_virt+0xb8/0x230 LR [c00000000006c0c8] ___do_page_fault+0x3f8/0xb10 --- interrupt: 700 Instruction dump: XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX ---[ end trace 6d28218e0cc3c949 ]--- After: ------------[ cut here ]------------ kernel BUG at arch/powerpc/kernel/exceptions-64s.S:491! Oops: Exception in kernel mode, sig: 5 [#1] LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA PowerNV Modules linked in: CPU: 0 PID: 88 Comm: login Not tainted 5.15.0-rc2-00034-ge057cdade6e5-dirty #2638 NIP: c0000000000098b8 LR: c00000000006bf04 CTR: c0000000000097f0 REGS: c0000000fffb3d60 TRAP: 0700 Not tainted MSR: 9000000000021031 <SF,HV,ME,IR,DR,LE> CR: 24482227 XER: 00040000 CFAR: c0000000000098b0 IRQMASK: 0 GPR00: c00000000006bf04 0000000000002400 c000000001513800 c000000001271868 GPR04: 00000000100f0d29 0000000042000000 0000000000000007 0000000000000009 GPR08: 00000000100f0d29 0000000024482227 0000000000002710 c000000000181b3c GPR12: 9000000000009033 c0000000016b0000 00000000100f0d29 c000000005b22f00 GPR16: 00000000ffff0000 0000000000000001 0000000000000009 00000000100eed90 GPR20: 00000000100eed90 00000 ---truncated---
[]
null
null
null
null
CVE-2024-2784
The Plus Addons for Elementor <= 5.5.4 - Authenticated (Contibutor+) Stored Cross-Site Scripting via Hover Card
The The Plus Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Hover Card widget in all versions up to, and including, 5.5.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
CVE-2018-20751
An issue was discovered in crop_page in PoDoFo 0.9.6. For a crafted PDF document, pPage->GetObject()->GetDictionary().AddKey(PdfName("MediaBox"),var) can be problematic due to the function GetObject() being called for the pPage NULL pointer object. The value of pPage at this point is 0x0, which causes a NULL pointer dereference.
[ "cpe:2.3:a:podofo_project:podofo:0.9.6:*:*:*:*:*:*:*" ]
null
null
8.8
6.8