id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-c3c4-fvw5-6jg3
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
[]
null
7.8
null
null
GHSA-ph2x-jpwc-wrxq
Server-Side Request Forgery (SSRF) vulnerability in Hitachi Infrastructure Analytics Advisor on Linux (Data Center Analytics, Analytics probe components), Hitachi Ops Center Analyzer on Linux (Hitachi Ops Center Analyzer detail view, Hitachi Ops Center Analyzer probe components) allows Server Side Request Forgery.
[]
null
9.8
null
null
CVE-2024-2079
The WPBakery Page Builder Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'per_line_mobile' shortcode in all versions up to, and including, 3.8.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
CVE-2021-42147
Buffer over-read vulnerability in the dtls_sha256_update function in Contiki-NG tinyDTLS through master branch 53a0d97 allows remote attackers to cause a denial of service via crafted data packet.
[ "cpe:2.3:a:contiki-ng:tinydtls:2018-08-30:*:*:*:*:*:*:*" ]
null
9.1
null
null
CVE-2022-26359
IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, "RMRR") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.
[ "cpe:2.3:o:xen:xen:-:*:*:*:*:*:x86:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*" ]
null
7.8
null
4.4
GHSA-hcrg-fc28-fcg5
parse-duration has a Regex Denial of Service that results in event loop delay and out of memory
SummaryThis report finds 2 availability issues due to the regex used in the `parse-duration` npm package:An event loop delay due to the CPU-bound operation of resolving the provided string, from a 0.5ms and up to ~50ms per one operation, with a varying size from 0.01 MB and up to 4.3 MB respectively.An out of memory that would crash a running Node.js application due to a string size of roughly 10 MB that utilizes unicode characters.PoCRefer to the following proof of concept code that provides a test case and makes use of the regular expression in the library as its test case to match against strings:The results of this on the cloud machine that I ran this on are as follows:You can note that:0.01 MB of input was enough to cause a 1ms delay (0.92ms)Ranging from either 3 MB to 4 MB of input results in almost a full second day (728ms) and 42 ms, depending on the characters used in the text passed to the library's `parse()` functionA 200 MB of input size already causes JavaScript heap out of memory crashHowever, more interestingly, if we focus on the input string case:Even though this is merely 10 MB of size (9.97 MB) it results in an out of memory issue due to the recursive nature of the regular expression matching:To note, the issue at hand may not just be the primary regex in use but rather the reliance of the various `replace` functions in the `parse()` function which create copies of the input in memory.ImpactI agree, a 200 MB (perhaps even less if we perform more tests to find the actual threshold) is a large amount of data to send over a network and hopefully is unlikely to hit common application usage.In the case of the specialized input string case that uses a UTF-8 character it is only requires up to 10 MB of request size to cause a RangeError exception for a running Node.js application, which I think is more applicable and common to allow such input sizes for POST requests and other types.Even for the smaller payloads such as 0.01 MB which aligns with Express's default of 100kb request limit size it causes a 1ms delay. Now imagine if an application is running without proper security controls such as rate limits, and attackers send 1000s of concurrent requests which quickly turn the 1ms delay into seconds worth of delay for a running application. The 3 MB payload already shows a 0.5s delay in one request.
[]
null
7.5
null
null
PYSEC-2022-68
null
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in embedding lookup operations. Both `embedding_size` and `lookup_size` are products of values provided by the user. Hence, a malicious user could trigger overflows in the multiplication. In certain scenarios, this can then result in heap OOB read/write. Users are advised to upgrade to a patched version.
[]
null
null
null
null
CVE-2018-14888
inc/plugins/thankyoulike.php in the Eldenroot Thank You/Like plugin before 3.1.0 for MyBB allows XSS via a post or thread subject.
[ "cpe:2.3:a:thank_you\\/like_project:thank_you\\/like:*:*:*:*:*:mybb:*:*" ]
null
null
6.1
4.3
CVE-2016-10321
web2py before 2.14.6 does not properly check if a host is denied before verifying passwords, allowing a remote attacker to perform brute-force attacks.
[ "cpe:2.3:a:web2py:web2py:*:*:*:*:*:*:*:*" ]
null
null
9.8
5
CVE-2014-0873
Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) Data Stewardship, (2) Business Admin, and (3) Product interfaces in IBM InfoSphere Master Data Management (MDM) Server 8.5 before 8.5.0.82, 9.0.1 before 9.0.1.38, 9.0.2 before 9.0.2.35, 10.0 before 10.0.0.0.26, and 10.1 before 10.1.0.0.15 allow remote attackers to hijack the authentication of arbitrary users.
[ "cpe:2.3:a:ibm:infosphere_master_data_management_server:8.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:infosphere_master_data_management_server:9.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:infosphere_master_data_management_server:9.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:infosphere_master_data_management_server:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:infosphere_master_data_management_server:10.1:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2019-12620
Cisco HyperFlex Software Counter Value Injection Vulnerability
A vulnerability in the statistics collection service of Cisco HyperFlex Software could allow an unauthenticated, remote attacker to inject arbitrary values on an affected device. The vulnerability is due to insufficient authentication for the statistics collection service. An attacker could exploit this vulnerability by sending properly formatted data values to the statistics collection service of an affected device. A successful exploit could allow the attacker to cause the web interface statistics view to present invalid data to users.
[ "cpe:2.3:o:cisco:hyperflex_hx220c_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:hyperflex_hx220c_m5_firmware:3.5\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:hyperflex_hx220c_m5_firmware:4.0\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:hyperflex_hx220c_m5:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:hyperflex_hx240c_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:hyperflex_hx240c_m5_firmware:3.5\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:hyperflex_hx240c_m5_firmware:4.0\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:hyperflex_hx240c_m5:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:hyperflex_hx220c_af_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:hyperflex_hx220c_af_m5_firmware:3.5\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:hyperflex_hx220c_af_m5_firmware:4.0\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:hyperflex_hx220c_af_m5:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:hyperflex_hx240c_af_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:hyperflex_hx240c_af_m5_firmware:3.5\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:hyperflex_hx240c_af_m5_firmware:4.0\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:hyperflex_hx240c_af_m5:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:hyperflex_hx220c_edge_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:hyperflex_hx220c_edge_m5_firmware:3.5\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:hyperflex_hx220c_edge_m5_firmware:4.0\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:hyperflex_hx220c_edge_m5:-:*:*:*:*:*:*:*" ]
null
null
5.3
null
CVE-2002-1796
ChaiVM EZloader for HP color LaserJet 4500 and 4550 and HP LaserJet 4100 and 8150 does not properly verify JAR signatures for new services, which allows local users to load unauthorized Chai services.
[ "cpe:2.3:a:hp:chaivm_ezloader:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_4100:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_4500:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_4550:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_8150:-:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
RHSA-2012:0569
Red Hat Security Advisory: php53 security update
php: command line arguments injection when run in CGI mode (VU#520827)
[ "cpe:/o:redhat:rhel_eus:5.6" ]
null
null
null
null
CVE-2006-5965
PassGo SSO Plus 2.1.0.32, and probably earlier versions, uses insecure permissions (Everyone/Full Control) for the PassGo Technologies directory, which allows local users to gain privileges by modifying critical programs.
[ "cpe:2.3:a:passgo:sso_plus:2.1.0.32:*:*:*:*:*:*:*" ]
null
null
null
4.6
GHSA-56pr-74v5-7m5w
Brave Software Inc. Brave version version 0.22.810 to 0.24.0 contains a Other/Unknown vulnerability in function ContentSettingsObserver::AllowScript() in content_settings_observer.cc that can result in Websites can run inline JavaScript even if script is blocked, making attackers easier to track users. This attack appear to be exploitable via the victim must visit a specially crafted website. This vulnerability appears to have been fixed in 0.25.2.
[]
null
null
4.3
null
CVE-2014-6243
Cross-site scripting (XSS) vulnerability in the EWWW Image Optimizer plugin before 2.0.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the error parameter in the ewww-image-optimizer.php page to wp-admin/options-general.php, which is not properly handled in a pngout error message.
[ "cpe:2.3:a:ewww_image_optimizer_plugin_project:ewww_image_optimizer_plugin:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:ewww_image_optimizer_plugin_project:ewww_image_optimizer_plugin:2.0.0:*:*:*:*:wordpress:*:*" ]
null
null
null
4.3
CVE-2019-0238
SAP Commerce (previously known as SAP Hybris Commerce), before version 6.7, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.
[ "cpe:2.3:a:sap:hybris:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
GHSA-r49f-h295-cg9m
File Upload vulnerability in Zimbra ZCS 8.8.15 allows an authenticated privileged user to execute arbitrary code and obtain sensitive information via the ClientUploader function.
[]
null
8.8
null
null
GHSA-r3px-vhhx-qhqr
Windows Kernel Elevation of Privilege Vulnerability
[]
null
6.7
null
null
GHSA-hxcm-q7m2-7qhp
Varnish Cache before 7.6.2 and Varnish Enterprise before 6.0.13r10 allow client-side desync via HTTP/1 requests.
[]
null
5.4
null
null
GHSA-7r3q-r8vw-83vp
A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type `ssize_t`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
[]
null
3.3
null
null
GHSA-gcff-f9p7-hmfg
A flaw was found in the "Routing decision" classifier in the Linux kernel's Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
[]
null
7.8
null
null
CVE-2013-7405
The Ad Hoc Reporting feature in GE Healthcare Centricity DMS 4.2 has a password of Never!Mind for the Administrator user, which has unspecified impact and attack vectors. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value.
[ "cpe:2.3:a:gehealthcare:centricity_dms:4.2:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-xg5g-x87g-4w37
Unspecified vulnerability in the Management Console in IBM Tivoli Federated Identity Manager (TFIM) 6.2.0 before 6.2.0.9 and Tivoli Federated Identity Manager Business Gateway (TFIMBG) 6.2.0 before 6.2.0.9 has unknown impact and attack vectors, aka APAR IV03050.
[]
null
null
null
null
CVE-2005-0211
Buffer overflow in wccp.c in Squid 2.5 before 2.5.STABLE7 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long WCCP packet, which is processed by a recvfrom function call that uses an incorrect length parameter.
[ "cpe:2.3:a:squid-cache:squid:2.5.stable1:*:*:*:*:*:*:*", "cpe:2.3:a:squid-cache:squid:2.5.stable2:*:*:*:*:*:*:*", "cpe:2.3:a:squid-cache:squid:2.5.stable3:*:*:*:*:*:*:*", "cpe:2.3:a:squid-cache:squid:2.5.stable4:*:*:*:*:*:*:*", "cpe:2.3:a:squid-cache:squid:2.5.stable5:*:*:*:*:*:*:*", "cpe:2.3:a:squid-cache:squid:2.5.stable6:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-mcpg-92rm-rc27
A vulnerability classified as critical has been found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6. This affects an unknown part of the component Web Service. The manipulation leads to denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227655.
[]
null
null
7.5
null
GHSA-mp2w-hjcj-f5g9
libexpat through 2.5.0 allows recursive XML Entity Expansion if XML_DTD is undefined at compile time.
[]
null
5.5
null
null
CVE-2017-10868
H2O version 2.2.2 and earlier allows remote attackers to cause a denial of service in the server via specially crafted HTTP/1 header.
[ "cpe:2.3:a:dena:h2o:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-j8hw-49gg-vq3w
Malicious Package in retcodelog
All versions of `retcodelog` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.RecommendationAny computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[]
null
9.8
null
null
GHSA-c3jm-vwq8-2rp9
Cross-site request forgery (CSRF) vulnerability in the command/user.cgi in Sony SNC CH140, SNC CH180, SNC CH240, SNC CH280, SNC DH140, SNC DH140T, SNC DH180, SNC DH240, SNC DH240T, SNC DH280, and possibly other camera models allows remote attackers to hijack the authentication of administrators for requests that add users.
[]
null
null
null
null
GHSA-p4c3-4p45-qjfp
X-Cart 3.4.3 allows remote attackers to gain sensitive information via a mode parameter with (1) phpinfo command or (2) perlinfo command.
[]
null
null
null
null
RHSA-2016:2837
Red Hat Security Advisory: Red Hat CloudForms 3.x - 90 day End Of Life Notice
This is the 90 day notification for the End of Production Phase 2 of Red Hat CloudForms 3.x.
[ "cpe:/a:redhat:cloudforms:3.0" ]
null
null
null
null
CVE-2024-51827
WordPress Boombox Shortcode plugin <= 1.0.0 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Boombox Boombox Shortcode allows DOM-Based XSS.This issue affects Boombox Shortcode: from n/a through 1.0.0.
[]
null
6.5
null
null
GHSA-h567-88r9-48gj
The Netskope client service, v57 before 57.2.0.219 and v60 before 60.2.0.214, running with NT\SYSTEM privilege, accepts network connections from localhost. The connection handling function in this service suffers from command injection vulnerability. Local users can use this vulnerability to execute code with NT\SYSTEM privilege.
[]
null
7.8
null
null
GHSA-w8c7-26w6-xx7c
SQL injection vulnerability in the Management Server in Symantec Embedded Security: Critical System Protection (SES:CSP) 1.0.x before 1.0 MP5, Embedded Security: Critical System Protection for Controllers and Devices (SES:CSP) 6.5.0 before MP1, Critical System Protection (SCSP) before 5.2.9 MP6, Data Center Security: Server Advanced Server (DCS:SA) 6.x before 6.5 MP1 and 6.6 before MP1, and Data Center Security: Server Advanced Server and Agents (DCS:SA) through 6.6 MP1 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.
[]
null
8.8
null
null
CVE-2021-0054
Improper buffer restrictions in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:o:intel:nuc_m15_laptop_kit_lapbc510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_m15_laptop_kit_lapbc510:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_m15_laptop_kit_lapbc710_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_m15_laptop_kit_lapbc710:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebc4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebc4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi38w_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi38w:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi58w_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi58w:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi716w_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi716w:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi5:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki5:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_11_performance_mini_pc_nuc11paqi50wa_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_11_performance_mini_pc_nuc11paqi50wa:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_11_performance_mini_pc_nuc11paqi70qa_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_11_performance_mini_pc_nuc11paqi70qa:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbi3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbi3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbi5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbi5:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbi7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbi7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi30l_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi30l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi30p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi30p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi5:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi50l_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi50l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi50w_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi50w:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi70l_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi70l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi70q_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi70q:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnki3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnki3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnki5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnki5:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnki7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnki7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_11_enthusiast_kit_nuc11phki7c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_11_enthusiast_kit_nuc11phki7c:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_11_enthusiast_mini_pc_nuc11phki7caa_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_11_enthusiast_mini_pc_nuc11phki7caa:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnh:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnhf_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnhf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnk_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnh:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhf_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhj_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhj:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnk_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnkp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnkp:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnh:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnhc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnhc:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnk_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnkp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnkp:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i3fnhfa_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i3fnhfa:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i3fnhja_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i3fnhja:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnhca_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnhca:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnhja_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnhja:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnkpa_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnkpa:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnhaa_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnhaa:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnhja_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnhja:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnkpa_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnkpa:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_9_pro_compute_element_nuc9v7qnb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_9_pro_compute_element_nuc9v7qnb:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_9_pro_compute_element_nuc9vxqnb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_9_pro_compute_element_nuc9vxqnb:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_9_pro_kit_nuc9v7qnx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_9_pro_kit_nuc9v7qnx:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_9_pro_kit_nuc9vxqnx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_9_pro_kit_nuc9vxqnx:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_8_business\\,_a_mini_pc_with_windows_10_nuc8i7hnkqc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_8_business\\,_a_mini_pc_with_windows_10_nuc8i7hnkqc:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_8_enthusiast\\,_a_mini_pc_with_windows_10_nuc8i7hvkva_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_8_enthusiast\\,_a_mini_pc_with_windows_10_nuc8i7hvkva:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_8_enthusiast\\,_a_mini_pc_with_windows_10_nuc8i7hvkvaw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_8_enthusiast\\,_a_mini_pc_with_windows_10_nuc8i7hvkvaw:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_kit_nuc8i7hnk_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_kit_nuc8i7hvk_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_kit_nuc8i7hvk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_board_nuc8cchb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_8_compute_element_cm8ccb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_8_compute_element_cm8ccb:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_8_compute_element_cm8i3cb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_8_compute_element_cm8i3cb:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_8_compute_element_cm8i5cb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_8_compute_element_cm8i5cb:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_8_compute_element_cm8i7cb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_8_compute_element_cm8i7cb:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_8_compute_element_cm8pcb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_8_compute_element_cm8pcb:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_8_pro_board_nuc8i3pnb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_8_pro_board_nuc8i3pnb:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnh:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnk_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i5inh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i5inh:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i7inh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i7inh:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_7_essential\\,_a_mini_pc_with_windows_10_nuc7cjysal_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_7_essential\\,_a_mini_pc_with_windows_10_nuc7cjysal:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_kit_nuc7cjyh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_kit_nuc7cjyh:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_kit_nuc7pjyh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_kit_nuc7pjyh:-:*:*:*:*:*:*:*" ]
null
6.7
null
4.6
CVE-2013-5708
Coursemill Learning Management System (LMS) 6.8 constructs secret tokens based on time values, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via vectors related to cookies, a different vulnerability than CVE-2013-3605.
[ "cpe:2.3:a:trivantis:coursemill_learning_management_system:6.8:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2022-46144
A vulnerability has been identified in SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions < V2.3), SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions < V2.3), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions < V2.3), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions < V2.3), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions < V2.3), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions < V2.3), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions < V2.0.0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) (All versions < V2.0.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions < V2.0.0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) (All versions < V2.0.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions < V2.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions < V2.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions < V2.0.0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) (All versions < V2.0.0), SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0) (All versions < V2.0.0). Affected devices do not properly process CLI commands after a user forcefully quitted the SSH connection. This could allow an authenticated attacker to make the CLI via SSH or serial interface irresponsive.
[ "cpe:2.3:o:siemens:6gk5622-2gs00-2ac2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6gk5622-2gs00-2ac2:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:6gk5626-2gs00-2ac2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6gk5626-2gs00-2ac2:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:6gk5632-2gs00-2ac2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6gk5632-2gs00-2ac2:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:6gk5636-2gs00-2ac2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6gk5636-2gs00-2ac2:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:6gk5642-2gs00-2ac2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6gk5642-2gs00-2ac2:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:6gk5646-2gs00-2ac2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6gk5646-2gs00-2ac2:-:*:*:*:*:*:*:*" ]
7.1
6.5
null
null
CVE-2008-2143
Unspecified versions of Microsoft Outlook Web Access (OWA) use the Cache-Control: no-cache HTTP directive instead of no-store, which might cause web browsers that follow RFC-2616 to cache sensitive information.
[ "cpe:2.3:a:microsoft:outlook_web_access:*:*:*:*:*:*:*:*" ]
null
null
null
1.9
GHSA-qj53-4gp5-43vf
The Passcode Lock implementation in Apple iOS before 6 does not properly manage the lock state, which allows physically proximate attackers to bypass an intended passcode requirement via unspecified vectors.
[]
null
null
null
null
CVE-2024-24293
A Prototype Pollution issue in MiguelCastillo @bit/loader v.10.0.3 allows an attacker to execute arbitrary code via the M function e argument in index.js.
[ "cpe:2.3:a:miguelcastillo:bit-loader:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-p59h-7g7v-xp8x
In BnAudioPolicyService::onTransact of IAudioPolicyService.cpp, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
null
6.2
null
null
RHSA-2020:5649
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.1.11 security update
golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs
[ "cpe:/a:redhat:service_mesh:1.1::el8" ]
null
7.5
null
null
GHSA-5hm5-4qp7-8rcf
It is found that there is a command injection vulnerability in the delParentalRules interface in TOTOlink A7100RU (v7.4cu.2313_b20191024) router, which allows an attacker to execute arbitrary commands through a carefully constructed payload.
[]
null
9.8
null
null
CVE-2011-2914
Off-by-one error in the CSoundFile::ReadDSM function in src/load_dms.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a crafted DSM file with a large number of samples.
[ "cpe:2.3:a:konstanty_bialkowski:libmodplug:*:*:*:*:*:*:*:*", "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8:*:*:*:*:*:*:*", "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8.2:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2007-3755
Mail in Apple iPhone 1.1.1 allows remote user-assisted attackers to force the iPhone user to make calls to arbitrary telephone numbers via a "tel:" link, which does not prompt the user before dialing the number.
[ "cpe:2.3:h:apple:iphone:1.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2020-3161
Cisco IP Phones Web Server Remote Code Execution and Denial of Service Vulnerability
A vulnerability in the web server for Cisco IP Phones could allow an unauthenticated, remote attacker to execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web server of a targeted device. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a DoS condition.
[ "cpe:2.3:o:cisco:ip_phone_8865_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8865_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8865_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8851_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8851_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8851_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_7841_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_7821_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8811_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8811_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8811_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8861_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8861_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8861_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8845_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8845_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8845_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_7861_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8841_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8841_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8841_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_7811_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8821_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8821_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8821_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8821-ex_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8821-ex_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8821-ex_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ip_phone_8821-ex:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:8831_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:8831_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:8831_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:8831:-:*:*:*:*:*:*:*" ]
null
null
9.8
null
GHSA-c65v-98gj-rwxh
Complete Supplier Management System v1.0 is vulnerable to SQL Injection via /Supply_Management_System/admin/edit_category.php?id=.
[]
null
7.2
null
null
CVE-2021-46343
There is an Assertion 'context_p->token.type == LEXER_LITERAL' failed at /jerry-core/parser/js/js-parser-expr.c in JerryScript 3.0.0.
[ "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
CVE-2021-20164
Trendnet AC2600 TEW-827DRU version 2.08B01 improperly discloses credentials for the smb functionality of the device. Usernames and passwords for all smb users are revealed in plaintext on the smbserver.asp page.
[ "cpe:2.3:o:trendnet:tew-827dru_firmware:2.08b01:*:*:*:*:*:*:*", "cpe:2.3:h:trendnet:tew-827dru:2.0:*:*:*:*:*:*:*" ]
null
4.9
null
4
GHSA-gf34-2fpp-vmc4
Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU and/or memory by flooding it with crafted valid or invalid HTTP/2 traffic. This issue affects BIND 9 versions 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, and 9.18.11-S1 through 9.18.32-S1.
[]
null
7.5
null
null
CVE-2014-2619
Unspecified vulnerability in HP Intelligent Management Center (iMC) before 7.0 E02020P03 and Branch Intelligent Management System (BIMS) before 7.0 E0201P02 allows remote attackers to obtain sensitive information via unknown vectors, aka ZDI-CAN-2088.
[ "cpe:2.3:a:hp:imc_branch_intelligent_management_system_software_module:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.0:*:*:*:*:*:*:*" ]
null
null
null
7.8
CVE-2019-8026
Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2021-24461
FAQ Builder < 1.3.6 - Authenticated Blind SQL Injections
The get_faqs() function in the FAQ Builder AYS WordPress plugin before 1.3.6 did not use whitelist or validate the orderby parameter before using it in SQL statements passed to the get_results() DB calls, leading to SQL injection issues in the admin dashboard
[ "cpe:2.3:a:ays-pro:faq_builder:*:*:*:*:*:wordpress:*:*" ]
null
8.8
null
6.5
GHSA-mvmq-p5xj-8vj6
The ThirstyAffiliates Affiliate Link Manager WordPress plugin before 3.10.5 does not have authorisation and CSRF checks when creating affiliate links, which could allow any authenticated user, such as subscriber to create arbitrary affiliate links, which could then be used to redirect users to an arbitrary website
[]
null
5.4
null
null
ICSA-23-131-02
Siemens SCALANCE W1750D
The IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target's MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target's original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client's pairwise encryption key.
[]
null
8.4
null
null
CVE-2020-1254
An elevation of privilege vulnerability exists when Windows Modules Installer Service improperly handles class object members.A locally authenticated attacker could run arbitrary code with elevated system privileges, aka 'Windows Modules Installer Service Elevation of Privilege Vulnerability'.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
RHSA-2020:5139
Red Hat Security Advisory: firefox security update
Mozilla: Write side effects in MCallGetProperty opcode not accounted for
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
null
8.8
null
CVE-2017-0938
Denial of Service attack in airMAX < 8.3.2 , airMAX < 6.0.7 and EdgeMAX < 1.9.7 allow attackers to use the Discovery Protocol in amplification attacks.
[ "cpe:2.3:o:ui:airos:*:*:*:*:*:*:*:*", "cpe:2.3:h:ui:airmax_ac:-:*:*:*:*:*:*:*", "cpe:2.3:o:ui:edgemax_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ui:edgemax:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2007-5519
Unspecified vulnerability in the Oracle Portal component in Oracle Application Server 9.0.4.3 and 10.1.2.0.2, and Collaboration Suite 10.1.2, has unknown impact and remote attack vectors, aka AS04.
[ "cpe:2.3:a:oracle:application_server:9.0.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:collaboration_suite:10.1.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-r344-4jmp-54g4
Pound before 2.8 allows HTTP request smuggling, a related issue to CVE-2016-10711.
[]
null
null
null
null
CVE-2024-22370
In JetBrains YouTrack before 2023.3.22666 stored XSS via markdown was possible
[ "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*" ]
null
4.6
null
null
CVE-2017-10001
Vulnerability in the Oracle Hospitality Simphony First Edition component of Oracle Hospitality Applications (subcomponent: Core). The supported version that is affected is 1.7.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Simphony First Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality Simphony First Edition accessible data as well as unauthorized update, insert or delete access to some of Oracle Hospitality Simphony First Edition accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Hospitality Simphony First Edition. CVSS 3.0 Base Score 7.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:H).
[ "cpe:2.3:a:oracle:hospitality_simphony:1.7.1:*:*:*:first:*:*:*" ]
null
null
7.6
6
CVE-2013-2341
Unspecified vulnerability on the HP ProCurve JC###A, JC###B, JD###A, JD###B, JE###A, JF###A, JF###B, JF###C, JG###A, 658250-B21, and 658247-B21; HP 3COM routers and switches; and HP H3C routers and switches allows remote authenticated users to execute arbitrary code or obtain sensitive information via unknown vectors.
[ "cpe:2.3:h:hp:3com_baseline_plus_switch:2900:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_baseline_plus_switch:2900g:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_baseline_plus_switch:2900g-28hpwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_baseline_plus_switch:2900g-28pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:3012:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:3013:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:3016:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:3018:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:3036:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:3040:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:3041:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:5009:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:5012:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:5231:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:5232:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:5640:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:5642:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:5642_taa:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:5680:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:5682:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:6040:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:6080:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:jg005a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:ss4_5500g-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4200g:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4200g-ntg:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4200g_pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4210:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4210-24g:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4210-48g:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4210_pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4210_pwr_9p_taa:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4500:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4500_pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4510g:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4510g_pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4800g:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:5500g-ei_sfp:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:e4210-24g-poe:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:e4510-24g:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:ss4_5500-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:ss4_5500-ei-pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:ss4_5500-si:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:ss4_5500g-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:ss4_5500g-ei-pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:ss4_switch_5500g-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch_taa_compliant:5500g-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch_taa_compliant:5500g-ei-pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch_taa_compliant:5500g-ei-sfp:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_taa_switch:5500-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5500-28c-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5500-28c-ei-dc:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5500-28c-pwr-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5500-28c-pwr-si:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5500-28c-si:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5500-28f-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5500-52c-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5500-52c-pwr-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5500-52c-pwr-si:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5500-52c-si:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5600-26c:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5600-26c-pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5600-26f:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5600-50c:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5600-50c-pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s7502e:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s7503e:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s7503e-s:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s7506e:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s7506e-v:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s7510e:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_high_performance_main_processing_unit:msr_50_3ge:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_processing_module:msr_50_g2:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_processor_module:msr_50:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-10:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-11:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-12:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-12_t1:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-13:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-13_w:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-15:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-15_a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-15_a_w:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-15_iw:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-20:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-21:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-40:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_30-10:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_30-20:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_30-20_poe:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_30-20_rtvz33020as:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_30-40:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_30-40_poe:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_30-60:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_30-60_poe:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_50-40:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_50-60:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_900:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_920:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_3010:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_3016:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_3016_poe:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr5040-dc-ovs-h3c:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2011-ac-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2012-ac-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2012-ac-ovs-s-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2012-ac-ovs-w-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2012-t-ac-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2013-ac-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2013-ac-ovs-w-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2015-ac-ovs-a-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2015-ac-ovs-aw-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2015-ac-ovs-i-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2015-ac-ovs-iw-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2020-ac-ovs-h3c:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2040-ac-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2040-ac-ovs-h3c:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3011-ac-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3016-ac-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3016-ac-poe-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3020-ac-poe-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3020-dc-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3040-ac-ovs-as-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3040-ac-ovs-h:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3040-ac-poe-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3060-ac-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3060-ac-poe-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3060-dc-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr5060-ac-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:sr_20-12_w:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:sr8802:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:sr8805:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:sr8808:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:sr8812:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_routing_switch:s9505e:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_routing_switch:s9508e-v:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_routing_switch:s9512e:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_routing_switch:s12508:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_routing_switch:s12518:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3100-8c-si_ls-s3100-8c-si-ac-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3100-8c-si_ls-s3100-8c-si-dc-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3100-8t-si_ls-s3100-8t-si-ac-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3100-16c-si_ls-s3100-16c-si-ac-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3100-16c-si_ls-s3100-16c-si-dc-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3100-16t-si_ls-s3100-16t-si-ac-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3100-26c-si_ls-s3100-26c-si-ac-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3100-26c-si_ls-s3100-26c-si-dc-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3100-26t-si_ls-s3100-26t-si-ac-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3100-52p_ls-3100-52p-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3600-28f-ei_ls-3600-28f-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3600-28p-ei_ls-3600-28p-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3600-28p-pwr-ei_ls-3600-28p-pwr-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3600-28p-pwr-si_ls-3600-28p-pwr-si-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3600-28p-si_ls-3600-28p-si-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3600-28tp-si_ls-3600-28tp-si-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3600-52p-ei_ls-3600-52p-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3600-52p-pwr-ei_ls-3600-52p-pwr-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3600-52p-pwr-si_ls-3600-52p-pwr-si-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3600-52p-si_ls-3600-52p-si-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3610-28f_ls-3610-28f-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3610-28p_ls-3610-28p-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3610-28tp_ls-3610-28tp-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3610-52p_ls-3610-52p-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-8p-ei_ls-5100-8p-ei-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-8p-pwr-ei_ls-5100-8p-pwr-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-8p-si_ls-5100-8p-si-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-16p-ei_ls-5100-16p-ei-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-16p-pwr-ei_ls-5100-16p-pwr-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-16p-si_ls-5100-16p-si-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-24p-ei_ls-5100-24p-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-24p-si_ls-5100-24p-si-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-26c-ei_ls-5100-26c-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-26c-pwr-ei_ls-5100-26c-pwr-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-48p-ei_ls-5100-48p-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-48p-si_ls-5100-48p-si-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-50c-ei_ls-5100-50c-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-50c-pwr-ei_ls-5100-50c-pwr-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-20p-si:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-24p-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-28c-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-28c-pwr-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-28p-hpwr-si:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-28p-pwr-si:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-28p-si:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-48p-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-52c-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-52c-pwr-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-52p-si:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5800-32c:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5800-32c-pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5800-32f:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5800-56c:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5800-56c-pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5800-60c-pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5820x-28c:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5820x-28s:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s7502e:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s7503e:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s7503e-s:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s7506e:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s7506e-v:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s9505e:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s9508e-v:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s12508:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s12518:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jc147a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jc147b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jc148a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jc148b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jc149a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jc149b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jc150a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jc150b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd429b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd431a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd432a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd433a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd653a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd655a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd656a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd662a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd663a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd663b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd664a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd916a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd917a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd918a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd921a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd922a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd923a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd935a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd943a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd944a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd945a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd946a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd967a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd972a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf182a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf183a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf184a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf228a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf229a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf230a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf231a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf233a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf234a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf235a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf236a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf237a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf238a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf239a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf240a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf241a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf283a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf284a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf285a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf287a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf640a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf800a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf801a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf802a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf803a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf804a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf806a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf807a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf808a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf809a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf812a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf813a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf814a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf815a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf816a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf817a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:658247-b21:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:658250-b21:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc085a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc086a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc099a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc100a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc101a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc102a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc103a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc104a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc105a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc106a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc124a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc124b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc125a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc125b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc474a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc474b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc611a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc612a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc613a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc652a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc653a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc654a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc655a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc691a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc694a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc748a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd007a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd008a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd009a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd010a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd011a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd238a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd238b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd239a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd239b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd240a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd240b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd241a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd241b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd242a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd242b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd243a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd243b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd302a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd303a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd304a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd305a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd306a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd307a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd308a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd309a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd310a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd313b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd317a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd318b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd319b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd320b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd325a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd326a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd327a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd328a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd329a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd330a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd331a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd332a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd333a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd334a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd335a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd336a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd337a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd338a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd344a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd345a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd346a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd347a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd348a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd349a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd350a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd351a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd352a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd353a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd354a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd355a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd356a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd357a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd369a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd370a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd371a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd372a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd373a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd374a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd375a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd376a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd377a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd378a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd379a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd391a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd392a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd393a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd394a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd395a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je005a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je006a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je007a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je008a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je009a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je015a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je016a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je017a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je018a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je019a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je020a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je021a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je022a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je023a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je024a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je025a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je026a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je027a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je028a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je029a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je030a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je031a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je032a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je033a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je045a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je046a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je047a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je048a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je066a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je067a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je068a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je069a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je070a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je071a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je072a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je073a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je074a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je088a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je089a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je090a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je091a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je092a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je093a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je094a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je095a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je096a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je097a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je099a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je100a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je101a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je102a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je104a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je105a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je106a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je107a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je108a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je109a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je110a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je164a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je165a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je166a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je167a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je168a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je169a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf427a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf428a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf430a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf430b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf430c:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf431a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf431b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf431c:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf551a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf552a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf553a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf844a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf845a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf846a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf847a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg091a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg092a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg219a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg221a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg222a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg223a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg225a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg236a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg237a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg238a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg239a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg240a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg241a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg242a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg243a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg245a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg246a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg247a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg248a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg249a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg250a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg251a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg252a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg253a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg254a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg255a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg256a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg257a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg258a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg259a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg299a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg300a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg301a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg302a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg303a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg304a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg305a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg306a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg307a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg311a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg312a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg315a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg316a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg348a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg349a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg350a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg374a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:vpn_firewall_appliance:jd270a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:vpn_firewall_appliance:jd271a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:vpn_firewall_appliance:jg213a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:vpn_firewall_appliance:jg214a:*:*:*:*:*:*:*" ]
null
null
null
7.1
GHSA-pqx5-mp9c-hm3r
Multiple file upload restriction bypass vulnerabilities in Sentrifugo 3.2 could allow authenticated users to execute arbitrary code via a webshell.
[]
null
8.8
null
null
GHSA-9pmh-r27r-8vx3
The LMS5xx uses weak hash generation methods, resulting in the creation of insecure hashs. If an attacker manages to retrieve the hash, it could lead to collision attacks and the potential retrieval of the password.
[]
null
7.5
null
null
GHSA-x486-4h5g-3687
PDFResurrect before 0.20 lack of header validation checks causes heap-buffer-overflow in pdf_get_version().
[]
null
null
null
null
CVE-2017-6616
A vulnerability in the web-based GUI of Cisco Integrated Management Controller (IMC) 3.0(1c) could allow an authenticated, remote attacker to execute arbitrary code on an affected system. The vulnerability exists because the affected software does not sufficiently sanitize specific values that are received as part of a user-supplied HTTP request. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected software. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the user on the affected system. Cisco Bug IDs: CSCvd14578.
[ "cpe:2.3:a:cisco:integrated_management_controller_supervisor:3.0\\(1c\\):*:*:*:*:*:*:*" ]
null
null
8.8
9
GHSA-m9rv-9j45-vx77
Phpgurukul Vehicle Record Management System v1.0 is vulnerable to Cross Site Scripting (XSS) in /admin/profile.php via the name, email, and mobile parameters.
[]
null
6.1
null
null
GHSA-5q5w-mqp6-g2gh
Unrestricted Upload of File with Dangerous Type in jsdecena/laracom
jsdecena/laracom prior to version 2.0.9 is vulnerable to Unrestricted Upload of File with Dangerous Type.
[]
null
5.4
null
null
CVE-2006-4083
PHP remote file inclusion vulnerability in viewevent.php in myWebland myEvent 1.x allows remote attackers to execute arbitrary PHP code via a URL in the myevent_path parameter, a different vector than CVE-2006-4040. NOTE: the provenance of this information is unknown; the details are obtained from third party information.
[ "cpe:2.3:a:mywebland:myevent:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mywebland:myevent:1.3:*:*:*:*:*:*:*" ]
null
null
null
7.5
RHSA-2020:2972
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) OpenJDK: Unexpected exception raised by DerInputStream (Libraries, 8237731) OpenJDK: Unexpected exception raised by DerValue.equals() (Libraries, 8237736) OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136)
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.3
null
null
GHSA-c7pf-gfcw-v5h4
Unspecified vulnerability in the mobile app in Oracle Business Intelligence Enterprise Edition in Oracle Fusion Middleware before 11.1.1.7.0 (11.6.39) allows remote authenticated users to affect integrity via unknown vectors related to Mobile - iPad.
[]
null
null
null
null
CVE-2021-26461
malloc, realloc and memalign implementations are vulnerable to integer wrap-arounds
Apache Nuttx Versions prior to 10.1.0 are vulnerable to integer wrap-around in functions malloc, realloc and memalign. This improper memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution.
[ "cpe:2.3:a:apache:nuttx:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2016-9576
The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 4.8.14 does not properly restrict the type of iterator, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
CVE-2019-1216
An information disclosure vulnerability exists when DirectX improperly handles objects in memory, aka 'DirectX Information Disclosure Vulnerability'.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
CVE-2022-33909
DMA transactions which are targeted at input buffers used for the HddPassword software SMI handler could cause SMRAM corruption through a TOCTOU attack. DMA transactions which are targeted at input buffers used for the software SMI handler used by the HddPassword driver could cause SMRAM corruption through a TOCTOU attack..This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. Fixed in kernel Kernel 5.2: 05.27.23, Kernel 5.3: 05.36.23, Kernel 5.4: 05.44.23, Kernel 5.5: 05.52.23 https://www.insyde.com/security-pledge/SA-2022051
[ "cpe:2.3:a:insyde:kernel:*:*:*:*:*:*:*:*" ]
null
7
null
null
CVE-2006-4342
The kernel in Red Hat Enterprise Linux 3, when running on SMP systems, allows local users to cause a denial of service (deadlock) by running the shmat function on an shm at the same time that shmctl is removing that shm (IPC_RMID), which prevents a spinlock from being unlocked.
[ "cpe:2.3:o:redhat:enterprise_linux:3.0:*:*:*:*:*:*:*" ]
null
5.5
null
4
RHSA-2015:2548
Red Hat Security Advisory: Red Hat JBoss Web Server 3.0.1 commons-collections security update
apache-commons-collections: InvokerTransformer code execution during deserialisation
[ "cpe:/a:redhat:jboss_enterprise_web_server:3.0" ]
null
null
null
null
CVE-2005-1423
Directory traversal vulnerability in the mail program in 602LAN SUITE 2004.0.05.0413 allows remote attackers to cause a denial of service and determine the presence of arbitrary files via .. sequences in the A parameter.
[ "cpe:2.3:a:software602:602lan_suite:2004.0.05.0413:*:*:*:*:*:*:*" ]
null
null
null
6.4
GHSA-vx2g-v3f9-m6mw
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php where_in() function.
[]
null
9.8
null
null
CVE-2024-24741
Missing Authorization check in SAP Master Data Governance Material
SAP Master Data Governance for Material Data - versions 618, 619, 620, 621, 622, 800, 801, 802, 803, 804, does not perform necessary authorization check for an authenticated user, resulting in escalation of privileges. This could allow an attacker to read some sensitive information but no impact to integrity and availability.
[ "cpe:2.3:a:sap:master_data_governance_for_material_data:618:*:*:*:*:*:*:*", "cpe:2.3:a:sap:master_data_governance_for_material_data:619:*:*:*:*:*:*:*", "cpe:2.3:a:sap:master_data_governance_for_material_data:620:*:*:*:*:*:*:*", "cpe:2.3:a:sap:master_data_governance_for_material_data:621:*:*:*:*:*:*:*", "cpe:2.3:a:sap:master_data_governance_for_material_data:622:*:*:*:*:*:*:*", "cpe:2.3:a:sap:master_data_governance_for_material_data:800:*:*:*:*:*:*:*", "cpe:2.3:a:sap:master_data_governance_for_material_data:801:*:*:*:*:*:*:*", "cpe:2.3:a:sap:master_data_governance_for_material_data:802:*:*:*:*:*:*:*", "cpe:2.3:a:sap:master_data_governance_for_material_data:803:*:*:*:*:*:*:*", "cpe:2.3:a:sap:master_data_governance_for_material_data:804:*:*:*:*:*:*:*" ]
null
4.3
null
null
CVE-2023-26547
The InputMethod module has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation.
[ "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2022-0189
WP RSS Aggregator < 4.20 - Reflected Cross-Site Scripting (XSS)
The WP RSS Aggregator WordPress plugin before 4.20 does not sanitise and escape the id parameter in the wprss_fetch_items_row_action AJAX action before outputting it back in the response, leading to a Reflected Cross-Site Scripting
[ "cpe:2.3:a:wprssaggregator:wp_rss_aggregator:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
4.3
GHSA-4hvm-x6v7-c64m
Wi-Fi in Apple iOS before 10.3.1 does not prevent CVE-2017-6956 stack buffer overflow exploitation via a crafted access point. NOTE: because an operating system could potentially isolate itself from CVE-2017-6956 exploitation without patching Broadcom firmware functions, there is a separate CVE ID for the operating-system behavior.
[]
null
null
6.8
null
GHSA-jmpj-w6q2-9wpp
The Limit Login Attempts (Spam Protection) plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 5.3. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restrictions. Attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged and can be used to bypass settings that may have blocked out an IP address or country from logging in.
[]
null
5.3
null
null
GHSA-5vqg-4pw8-x3vj
SQL injection vulnerability in admin/index.php in NeLogic Nephp Publisher Enterprise 3.5.9 and 4.5 allows remote attackers to execute arbitrary SQL commands via the Username field.
[]
null
null
null
null
GHSA-2xgw-64w9-83wm
A vulnerability was found in FastCMS 0.1.0. It has been classified as critical. Affected is an unknown function of the component Template Management. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-220038 is the identifier assigned to this vulnerability.
[]
5.3
9.8
null
null
CVE-2024-42094
net/iucv: Avoid explicit cpumask var allocation on stack
In the Linux kernel, the following vulnerability has been resolved: net/iucv: Avoid explicit cpumask var allocation on stack For CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask variable on stack is not recommended since it can cause potential stack overflow. Instead, kernel code should always use *cpumask_var API(s) to allocate cpumask var in config-neutral way, leaving allocation strategy to CONFIG_CPUMASK_OFFSTACK. Use *cpumask_var API(s) to address it.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
7.1
null
null
CVE-2025-49579
Citizen allows stored XSS in menu heading message
Citizen is a MediaWiki skin that makes extensions part of the cohesive experience. All system messages in menu headings using the Menu.mustache template are inserted as raw HTML, allowing anybody who can edit those messages to insert arbitrary HTML into the DOM. This impacts wikis where a group has the `editinterface` but not the `editsitejs` user right. This vulnerability is fixed in 3.3.1.
[]
null
6.5
null
null
GHSA-v567-q267-phpg
pimcore is vulnerable to Cross-site Scripting
pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
[]
null
5.4
null
null
CVE-2018-13212
The sell function of a smart contract implementation for EthereumLegit, an Ethereum token, has an integer overflow in which "amount * sellPrice" can be zero, consequently reducing a seller's assets.
[ "cpe:2.3:a:ethereumlegit_project:ethereumlegit:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
RHSA-2025:8349
Red Hat Security Advisory: varnish security update
varnish: request smuggling attacks
[ "cpe:/a:redhat:rhel_eus:9.4::appstream", "cpe:/a:redhat:rhel_eus:9.4::crb" ]
null
8.1
null
null
CVE-2023-2424
DedeCMS config.php UpDateMemberModCache unrestricted upload
A vulnerability was found in DedeCMS 5.7.106 and classified as critical. Affected by this issue is the function UpDateMemberModCache of the file uploads/dede/config.php. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-227750 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:dedecms:dedecms:5.7.106:*:*:*:*:*:*:*" ]
null
6.3
6.3
6.5
GHSA-69fh-p4p6-4vwc
Insertion of Sensitive Information Into Sent Data vulnerability in ZealousWeb Accept Stripe Payments Using Contact Form 7 allows Retrieve Embedded Sensitive Data. This issue affects Accept Stripe Payments Using Contact Form 7: from n/a through 3.0.
[]
null
5.3
null
null
GHSA-mxwh-28p4-8rr7
?Softneta MedDream PACS stores usernames and passwords in plaintext. The plaintext storage could be abused by attackers to leak legitimate user’s credentials.
[]
null
6.1
null
null
GHSA-vx7m-hm5r-82w3
Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows forgery of SSH host certificates in some situations.
[]
null
9.8
null
null
RHSA-2004:156
Red Hat Security Advisory: mailman security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es" ]
null
null
null
null
GHSA-gvfm-vv3m-pgfr
A vulnerability was found in HumHub 0.20.1/1.0.0-beta.3. It has been classified as critical. This affects an unknown part. The manipulation leads to privilege escalation. It is possible to initiate the attack remotely. Upgrading to version 1.0.0 is able to address this issue. It is recommended to upgrade the affected component.
[]
null
9.8
null
null
GHSA-m63x-ghq3-c527
The ftlserver component of TIBCO Software Inc.'s TIBCO FTL - Community Edition, TIBCO FTL - Developer Edition, TIBCO FTL - Enterprise Edition, TIBCO FTL - Enterprise Edition, TIBCO eFTL - Community Edition, TIBCO eFTL - Developer Edition, TIBCO eFTL - Enterprise Edition, and TIBCO eFTL - Enterprise Edition contains a difficult to exploit vulnerability that allows a low privileged attacker with local access to obtain user credentials to the affected system. Affected releases are TIBCO Software Inc.'s TIBCO FTL - Community Edition: versions 6.0.0 through 6.8.0, TIBCO FTL - Developer Edition: versions 6.0.1 through 6.8.0, TIBCO FTL - Enterprise Edition: versions 6.0.0 through 6.7.3, TIBCO FTL - Enterprise Edition: version 6.8.0, TIBCO eFTL - Community Edition: versions 6.0.0 through 6.8.0, TIBCO eFTL - Developer Edition: versions 6.0.1 through 6.8.0, TIBCO eFTL - Enterprise Edition: versions 6.0.0 through 6.7.3, and TIBCO eFTL - Enterprise Edition: version 6.8.0.
[]
null
7.8
null
null