id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-c3c4-fvw5-6jg3 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability | [] | null | 7.8 | null | null |
|
GHSA-ph2x-jpwc-wrxq | Server-Side Request Forgery (SSRF) vulnerability in Hitachi Infrastructure Analytics Advisor on Linux (Data Center Analytics, Analytics probe components), Hitachi Ops Center Analyzer on Linux (Hitachi Ops Center Analyzer detail view, Hitachi Ops Center Analyzer probe components) allows Server Side Request Forgery. | [] | null | 9.8 | null | null |
|
CVE-2024-2079 | The WPBakery Page Builder Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'per_line_mobile' shortcode in all versions up to, and including, 3.8.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
CVE-2021-42147 | Buffer over-read vulnerability in the dtls_sha256_update function in Contiki-NG tinyDTLS through master branch 53a0d97 allows remote attackers to cause a denial of service via crafted data packet. | [
"cpe:2.3:a:contiki-ng:tinydtls:2018-08-30:*:*:*:*:*:*:*"
] | null | 9.1 | null | null |
|
CVE-2022-26359 | IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, "RMRR") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption. | [
"cpe:2.3:o:xen:xen:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.4 |
|
GHSA-hcrg-fc28-fcg5 | parse-duration has a Regex Denial of Service that results in event loop delay and out of memory | SummaryThis report finds 2 availability issues due to the regex used in the `parse-duration` npm package:An event loop delay due to the CPU-bound operation of resolving the provided string, from a 0.5ms and up to ~50ms per one operation, with a varying size from 0.01 MB and up to 4.3 MB respectively.An out of memory that would crash a running Node.js application due to a string size of roughly 10 MB that utilizes unicode characters.PoCRefer to the following proof of concept code that provides a test case and makes use of the regular expression in the library as its test case to match against strings:The results of this on the cloud machine that I ran this on are as follows:You can note that:0.01 MB of input was enough to cause a 1ms delay (0.92ms)Ranging from either 3 MB to 4 MB of input results in almost a full second day (728ms) and 42 ms, depending on the characters used in the text passed to the library's `parse()` functionA 200 MB of input size already causes JavaScript heap out of memory crashHowever, more interestingly, if we focus on the input string case:Even though this is merely 10 MB of size (9.97 MB) it results in an out of memory issue due to the recursive nature of the regular expression matching:To note, the issue at hand may not just be the primary regex in use but rather the reliance of the various `replace` functions in the `parse()` function which create copies of the input in memory.ImpactI agree, a 200 MB (perhaps even less if we perform more tests to find the actual threshold) is a large amount of data to send over a network and hopefully is unlikely to hit common application usage.In the case of the specialized input string case that uses a UTF-8 character it is only requires up to 10 MB of request size to cause a RangeError exception for a running Node.js application, which I think is more applicable and common to allow such input sizes for POST requests and other types.Even for the smaller payloads such as 0.01 MB which aligns with Express's default of 100kb request limit size it causes a 1ms delay. Now imagine if an application is running without proper security controls such as rate limits, and attackers send 1000s of concurrent requests which quickly turn the 1ms delay into seconds worth of delay for a running application. The 3 MB payload already shows a 0.5s delay in one request. | [] | null | 7.5 | null | null |
PYSEC-2022-68 | null | Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in embedding lookup operations. Both `embedding_size` and `lookup_size` are products of values provided by the user. Hence, a malicious user could trigger overflows in the multiplication. In certain scenarios, this can then result in heap OOB read/write. Users are advised to upgrade to a patched version. | [] | null | null | null | null |
CVE-2018-14888 | inc/plugins/thankyoulike.php in the Eldenroot Thank You/Like plugin before 3.1.0 for MyBB allows XSS via a post or thread subject. | [
"cpe:2.3:a:thank_you\\/like_project:thank_you\\/like:*:*:*:*:*:mybb:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2016-10321 | web2py before 2.14.6 does not properly check if a host is denied before verifying passwords, allowing a remote attacker to perform brute-force attacks. | [
"cpe:2.3:a:web2py:web2py:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 5 |
|
CVE-2014-0873 | Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) Data Stewardship, (2) Business Admin, and (3) Product interfaces in IBM InfoSphere Master Data Management (MDM) Server 8.5 before 8.5.0.82, 9.0.1 before 9.0.1.38, 9.0.2 before 9.0.2.35, 10.0 before 10.0.0.0.26, and 10.1 before 10.1.0.0.15 allow remote attackers to hijack the authentication of arbitrary users. | [
"cpe:2.3:a:ibm:infosphere_master_data_management_server:8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_master_data_management_server:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_master_data_management_server:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_master_data_management_server:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_master_data_management_server:10.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2019-12620 | Cisco HyperFlex Software Counter Value Injection Vulnerability | A vulnerability in the statistics collection service of Cisco HyperFlex Software could allow an unauthenticated, remote attacker to inject arbitrary values on an affected device. The vulnerability is due to insufficient authentication for the statistics collection service. An attacker could exploit this vulnerability by sending properly formatted data values to the statistics collection service of an affected device. A successful exploit could allow the attacker to cause the web interface statistics view to present invalid data to users. | [
"cpe:2.3:o:cisco:hyperflex_hx220c_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:hyperflex_hx220c_m5_firmware:3.5\\(2a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:hyperflex_hx220c_m5_firmware:4.0\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:hyperflex_hx220c_m5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:hyperflex_hx240c_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:hyperflex_hx240c_m5_firmware:3.5\\(2a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:hyperflex_hx240c_m5_firmware:4.0\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:hyperflex_hx240c_m5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:hyperflex_hx220c_af_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:hyperflex_hx220c_af_m5_firmware:3.5\\(2a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:hyperflex_hx220c_af_m5_firmware:4.0\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:hyperflex_hx220c_af_m5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:hyperflex_hx240c_af_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:hyperflex_hx240c_af_m5_firmware:3.5\\(2a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:hyperflex_hx240c_af_m5_firmware:4.0\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:hyperflex_hx240c_af_m5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:hyperflex_hx220c_edge_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:hyperflex_hx220c_edge_m5_firmware:3.5\\(2a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:hyperflex_hx220c_edge_m5_firmware:4.0\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:hyperflex_hx220c_edge_m5:-:*:*:*:*:*:*:*"
] | null | null | 5.3 | null |
CVE-2002-1796 | ChaiVM EZloader for HP color LaserJet 4500 and 4550 and HP LaserJet 4100 and 8150 does not properly verify JAR signatures for new services, which allows local users to load unauthorized Chai services. | [
"cpe:2.3:a:hp:chaivm_ezloader:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_4100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_4500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_4550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_8150:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
RHSA-2012:0569 | Red Hat Security Advisory: php53 security update | php: command line arguments injection when run in CGI mode (VU#520827) | [
"cpe:/o:redhat:rhel_eus:5.6"
] | null | null | null | null |
CVE-2006-5965 | PassGo SSO Plus 2.1.0.32, and probably earlier versions, uses insecure permissions (Everyone/Full Control) for the PassGo Technologies directory, which allows local users to gain privileges by modifying critical programs. | [
"cpe:2.3:a:passgo:sso_plus:2.1.0.32:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
GHSA-56pr-74v5-7m5w | Brave Software Inc. Brave version version 0.22.810 to 0.24.0 contains a Other/Unknown vulnerability in function ContentSettingsObserver::AllowScript() in content_settings_observer.cc that can result in Websites can run inline JavaScript even if script is blocked, making attackers easier to track users. This attack appear to be exploitable via the victim must visit a specially crafted website. This vulnerability appears to have been fixed in 0.25.2. | [] | null | null | 4.3 | null |
|
CVE-2014-6243 | Cross-site scripting (XSS) vulnerability in the EWWW Image Optimizer plugin before 2.0.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the error parameter in the ewww-image-optimizer.php page to wp-admin/options-general.php, which is not properly handled in a pngout error message. | [
"cpe:2.3:a:ewww_image_optimizer_plugin_project:ewww_image_optimizer_plugin:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:ewww_image_optimizer_plugin_project:ewww_image_optimizer_plugin:2.0.0:*:*:*:*:wordpress:*:*"
] | null | null | null | 4.3 |
|
CVE-2019-0238 | SAP Commerce (previously known as SAP Hybris Commerce), before version 6.7, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. | [
"cpe:2.3:a:sap:hybris:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-r49f-h295-cg9m | File Upload vulnerability in Zimbra ZCS 8.8.15 allows an authenticated privileged user to execute arbitrary code and obtain sensitive information via the ClientUploader function. | [] | null | 8.8 | null | null |
|
GHSA-r3px-vhhx-qhqr | Windows Kernel Elevation of Privilege Vulnerability | [] | null | 6.7 | null | null |
|
GHSA-hxcm-q7m2-7qhp | Varnish Cache before 7.6.2 and Varnish Enterprise before 6.0.13r10 allow client-side desync via HTTP/1 requests. | [] | null | 5.4 | null | null |
|
GHSA-7r3q-r8vw-83vp | A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type `ssize_t`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. | [] | null | 3.3 | null | null |
|
GHSA-gcff-f9p7-hmfg | A flaw was found in the "Routing decision" classifier in the Linux kernel's Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. | [] | null | 7.8 | null | null |
|
CVE-2013-7405 | The Ad Hoc Reporting feature in GE Healthcare Centricity DMS 4.2 has a password of Never!Mind for the Administrator user, which has unspecified impact and attack vectors. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value. | [
"cpe:2.3:a:gehealthcare:centricity_dms:4.2:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-xg5g-x87g-4w37 | Unspecified vulnerability in the Management Console in IBM Tivoli Federated Identity Manager (TFIM) 6.2.0 before 6.2.0.9 and Tivoli Federated Identity Manager Business Gateway (TFIMBG) 6.2.0 before 6.2.0.9 has unknown impact and attack vectors, aka APAR IV03050. | [] | null | null | null | null |
|
CVE-2005-0211 | Buffer overflow in wccp.c in Squid 2.5 before 2.5.STABLE7 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long WCCP packet, which is processed by a recvfrom function call that uses an incorrect length parameter. | [
"cpe:2.3:a:squid-cache:squid:2.5.stable1:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:2.5.stable2:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:2.5.stable3:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:2.5.stable4:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:2.5.stable5:*:*:*:*:*:*:*",
"cpe:2.3:a:squid-cache:squid:2.5.stable6:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-mcpg-92rm-rc27 | A vulnerability classified as critical has been found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6. This affects an unknown part of the component Web Service. The manipulation leads to denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227655. | [] | null | null | 7.5 | null |
|
GHSA-mp2w-hjcj-f5g9 | libexpat through 2.5.0 allows recursive XML Entity Expansion if XML_DTD is undefined at compile time. | [] | null | 5.5 | null | null |
|
CVE-2017-10868 | H2O version 2.2.2 and earlier allows remote attackers to cause a denial of service in the server via specially crafted HTTP/1 header. | [
"cpe:2.3:a:dena:h2o:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-j8hw-49gg-vq3w | Malicious Package in retcodelog | All versions of `retcodelog` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.RecommendationAny computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [] | null | 9.8 | null | null |
GHSA-c3jm-vwq8-2rp9 | Cross-site request forgery (CSRF) vulnerability in the command/user.cgi in Sony SNC CH140, SNC CH180, SNC CH240, SNC CH280, SNC DH140, SNC DH140T, SNC DH180, SNC DH240, SNC DH240T, SNC DH280, and possibly other camera models allows remote attackers to hijack the authentication of administrators for requests that add users. | [] | null | null | null | null |
|
GHSA-p4c3-4p45-qjfp | X-Cart 3.4.3 allows remote attackers to gain sensitive information via a mode parameter with (1) phpinfo command or (2) perlinfo command. | [] | null | null | null | null |
|
RHSA-2016:2837 | Red Hat Security Advisory: Red Hat CloudForms 3.x - 90 day End Of Life Notice | This is the 90 day notification for the End of Production Phase 2 of
Red Hat CloudForms 3.x. | [
"cpe:/a:redhat:cloudforms:3.0"
] | null | null | null | null |
CVE-2024-51827 | WordPress Boombox Shortcode plugin <= 1.0.0 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Boombox Boombox Shortcode allows DOM-Based XSS.This issue affects Boombox Shortcode: from n/a through 1.0.0. | [] | null | 6.5 | null | null |
GHSA-h567-88r9-48gj | The Netskope client service, v57 before 57.2.0.219 and v60 before 60.2.0.214, running with NT\SYSTEM privilege, accepts network connections from localhost. The connection handling function in this service suffers from command injection vulnerability. Local users can use this vulnerability to execute code with NT\SYSTEM privilege. | [] | null | 7.8 | null | null |
|
GHSA-w8c7-26w6-xx7c | SQL injection vulnerability in the Management Server in Symantec Embedded Security: Critical System Protection (SES:CSP) 1.0.x before 1.0 MP5, Embedded Security: Critical System Protection for Controllers and Devices (SES:CSP) 6.5.0 before MP1, Critical System Protection (SCSP) before 5.2.9 MP6, Data Center Security: Server Advanced Server (DCS:SA) 6.x before 6.5 MP1 and 6.6 before MP1, and Data Center Security: Server Advanced Server and Agents (DCS:SA) through 6.6 MP1 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors. | [] | null | 8.8 | null | null |
|
CVE-2021-0054 | Improper buffer restrictions in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:o:intel:nuc_m15_laptop_kit_lapbc510_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_m15_laptop_kit_lapbc510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_m15_laptop_kit_lapbc710_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_m15_laptop_kit_lapbc710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_11_compute_element_cm11ebc4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_11_compute_element_cm11ebc4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi38w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi38w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi58w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi58w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi716w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi716w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_11_performance_mini_pc_nuc11paqi50wa_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_11_performance_mini_pc_nuc11paqi50wa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_11_performance_mini_pc_nuc11paqi70qa_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_11_performance_mini_pc_nuc11paqi70qa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbi3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbi3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbi5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbi5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbi7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbi7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi30l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi30l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi30p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi30p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi50l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi50l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi50w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi50w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi70l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi70l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi70q_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi70q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnki3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnki3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnki5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnki5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnki7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnki7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_11_enthusiast_kit_nuc11phki7c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_11_enthusiast_kit_nuc11phki7c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_11_enthusiast_mini_pc_nuc11phki7caa_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_11_enthusiast_mini_pc_nuc11phki7caa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnhf_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnhf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhf_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhj_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhj:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnkp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnkp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnhc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnhc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnkp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnkp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i3fnhfa_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i3fnhfa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i3fnhja_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i3fnhja:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnhca_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnhca:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnhja_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnhja:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnkpa_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnkpa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnhaa_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnhaa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnhja_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnhja:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnkpa_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnkpa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_9_pro_compute_element_nuc9v7qnb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_9_pro_compute_element_nuc9v7qnb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_9_pro_compute_element_nuc9vxqnb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_9_pro_compute_element_nuc9vxqnb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_9_pro_kit_nuc9v7qnx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_9_pro_kit_nuc9v7qnx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_9_pro_kit_nuc9vxqnx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_9_pro_kit_nuc9vxqnx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_8_business\\,_a_mini_pc_with_windows_10_nuc8i7hnkqc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_8_business\\,_a_mini_pc_with_windows_10_nuc8i7hnkqc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_8_enthusiast\\,_a_mini_pc_with_windows_10_nuc8i7hvkva_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_8_enthusiast\\,_a_mini_pc_with_windows_10_nuc8i7hvkva:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_8_enthusiast\\,_a_mini_pc_with_windows_10_nuc8i7hvkvaw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_8_enthusiast\\,_a_mini_pc_with_windows_10_nuc8i7hvkvaw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc8i7hnk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc8i7hvk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc8i7hvk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_board_nuc8cchb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_8_compute_element_cm8ccb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_8_compute_element_cm8ccb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_8_compute_element_cm8i3cb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_8_compute_element_cm8i3cb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_8_compute_element_cm8i5cb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_8_compute_element_cm8i5cb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_8_compute_element_cm8i7cb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_8_compute_element_cm8i7cb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_8_compute_element_cm8pcb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_8_compute_element_cm8pcb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_8_pro_board_nuc8i3pnb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_8_pro_board_nuc8i3pnb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i5inh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i5inh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i7inh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i7inh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_7_essential\\,_a_mini_pc_with_windows_10_nuc7cjysal_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_7_essential\\,_a_mini_pc_with_windows_10_nuc7cjysal:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc7cjyh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc7cjyh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc7pjyh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc7pjyh:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | 4.6 |
|
CVE-2013-5708 | Coursemill Learning Management System (LMS) 6.8 constructs secret tokens based on time values, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via vectors related to cookies, a different vulnerability than CVE-2013-3605. | [
"cpe:2.3:a:trivantis:coursemill_learning_management_system:6.8:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2022-46144 | A vulnerability has been identified in SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions < V2.3), SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions < V2.3), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions < V2.3), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions < V2.3), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions < V2.3), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions < V2.3), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions < V2.0.0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) (All versions < V2.0.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions < V2.0.0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) (All versions < V2.0.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions < V2.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions < V2.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions < V2.0.0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) (All versions < V2.0.0), SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0) (All versions < V2.0.0). Affected devices do not properly process CLI commands after a user forcefully quitted the SSH connection. This could allow an authenticated attacker to make the CLI via SSH or serial interface irresponsive. | [
"cpe:2.3:o:siemens:6gk5622-2gs00-2ac2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5622-2gs00-2ac2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5626-2gs00-2ac2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5626-2gs00-2ac2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5632-2gs00-2ac2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5632-2gs00-2ac2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5636-2gs00-2ac2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5636-2gs00-2ac2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5642-2gs00-2ac2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5642-2gs00-2ac2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5646-2gs00-2ac2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5646-2gs00-2ac2:-:*:*:*:*:*:*:*"
] | 7.1 | 6.5 | null | null |
|
CVE-2008-2143 | Unspecified versions of Microsoft Outlook Web Access (OWA) use the Cache-Control: no-cache HTTP directive instead of no-store, which might cause web browsers that follow RFC-2616 to cache sensitive information. | [
"cpe:2.3:a:microsoft:outlook_web_access:*:*:*:*:*:*:*:*"
] | null | null | null | 1.9 |
|
GHSA-qj53-4gp5-43vf | The Passcode Lock implementation in Apple iOS before 6 does not properly manage the lock state, which allows physically proximate attackers to bypass an intended passcode requirement via unspecified vectors. | [] | null | null | null | null |
|
CVE-2024-24293 | A Prototype Pollution issue in MiguelCastillo @bit/loader v.10.0.3 allows an attacker to execute arbitrary code via the M function e argument in index.js. | [
"cpe:2.3:a:miguelcastillo:bit-loader:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-p59h-7g7v-xp8x | In BnAudioPolicyService::onTransact of IAudioPolicyService.cpp, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | [] | null | 6.2 | null | null |
|
RHSA-2020:5649 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.1.11 security update | golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs | [
"cpe:/a:redhat:service_mesh:1.1::el8"
] | null | 7.5 | null | null |
GHSA-5hm5-4qp7-8rcf | It is found that there is a command injection vulnerability in the delParentalRules interface in TOTOlink A7100RU (v7.4cu.2313_b20191024) router, which allows an attacker to execute arbitrary commands through a carefully constructed payload. | [] | null | 9.8 | null | null |
|
CVE-2011-2914 | Off-by-one error in the CSoundFile::ReadDSM function in src/load_dms.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a crafted DSM file with a large number of samples. | [
"cpe:2.3:a:konstanty_bialkowski:libmodplug:*:*:*:*:*:*:*:*",
"cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8.2:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2007-3755 | Mail in Apple iPhone 1.1.1 allows remote user-assisted attackers to force the iPhone user to make calls to arbitrary telephone numbers via a "tel:" link, which does not prompt the user before dialing the number. | [
"cpe:2.3:h:apple:iphone:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2020-3161 | Cisco IP Phones Web Server Remote Code Execution and Denial of Service Vulnerability | A vulnerability in the web server for Cisco IP Phones could allow an unauthenticated, remote attacker to execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web server of a targeted device. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a DoS condition. | [
"cpe:2.3:o:cisco:ip_phone_8865_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8865_firmware:11.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8865_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8851_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8851_firmware:11.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8851_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_7841_firmware:11.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_7821_firmware:11.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8811_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8811_firmware:11.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8811_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8861_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8861_firmware:11.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8861_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8845_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8845_firmware:11.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8845_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_7861_firmware:11.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8841_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8841_firmware:11.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8841_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_7811_firmware:11.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8821_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8821_firmware:11.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8821_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8821-ex_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8821-ex_firmware:11.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8821-ex_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ip_phone_8821-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:8831_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:8831_firmware:11.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:8831_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:8831:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | null |
GHSA-c65v-98gj-rwxh | Complete Supplier Management System v1.0 is vulnerable to SQL Injection via /Supply_Management_System/admin/edit_category.php?id=. | [] | null | 7.2 | null | null |
|
CVE-2021-46343 | There is an Assertion 'context_p->token.type == LEXER_LITERAL' failed at /jerry-core/parser/js/js-parser-expr.c in JerryScript 3.0.0. | [
"cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
CVE-2021-20164 | Trendnet AC2600 TEW-827DRU version 2.08B01 improperly discloses credentials for the smb functionality of the device. Usernames and passwords for all smb users are revealed in plaintext on the smbserver.asp page. | [
"cpe:2.3:o:trendnet:tew-827dru_firmware:2.08b01:*:*:*:*:*:*:*",
"cpe:2.3:h:trendnet:tew-827dru:2.0:*:*:*:*:*:*:*"
] | null | 4.9 | null | 4 |
|
GHSA-gf34-2fpp-vmc4 | Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU and/or memory by flooding it with crafted valid or invalid HTTP/2 traffic.
This issue affects BIND 9 versions 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, and 9.18.11-S1 through 9.18.32-S1. | [] | null | 7.5 | null | null |
|
CVE-2014-2619 | Unspecified vulnerability in HP Intelligent Management Center (iMC) before 7.0 E02020P03 and Branch Intelligent Management System (BIMS) before 7.0 E0201P02 allows remote attackers to obtain sensitive information via unknown vectors, aka ZDI-CAN-2088. | [
"cpe:2.3:a:hp:imc_branch_intelligent_management_system_software_module:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.0:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
CVE-2019-8026 | Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2021-24461 | FAQ Builder < 1.3.6 - Authenticated Blind SQL Injections | The get_faqs() function in the FAQ Builder AYS WordPress plugin before 1.3.6 did not use whitelist or validate the orderby parameter before using it in SQL statements passed to the get_results() DB calls, leading to SQL injection issues in the admin dashboard | [
"cpe:2.3:a:ays-pro:faq_builder:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | 6.5 |
GHSA-mvmq-p5xj-8vj6 | The ThirstyAffiliates Affiliate Link Manager WordPress plugin before 3.10.5 does not have authorisation and CSRF checks when creating affiliate links, which could allow any authenticated user, such as subscriber to create arbitrary affiliate links, which could then be used to redirect users to an arbitrary website | [] | null | 5.4 | null | null |
|
ICSA-23-131-02 | Siemens SCALANCE W1750D | The IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target's MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target's original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client's pairwise encryption key. | [] | null | 8.4 | null | null |
CVE-2020-1254 | An elevation of privilege vulnerability exists when Windows Modules Installer Service improperly handles class object members.A locally authenticated attacker could run arbitrary code with elevated system privileges, aka 'Windows Modules Installer Service Elevation of Privilege Vulnerability'. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
RHSA-2020:5139 | Red Hat Security Advisory: firefox security update | Mozilla: Write side effects in MCallGetProperty opcode not accounted for | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | null | 8.8 | null |
CVE-2017-0938 | Denial of Service attack in airMAX < 8.3.2 , airMAX < 6.0.7 and EdgeMAX < 1.9.7 allow attackers to use the Discovery Protocol in amplification attacks. | [
"cpe:2.3:o:ui:airos:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:airmax_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ui:edgemax_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:edgemax:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2007-5519 | Unspecified vulnerability in the Oracle Portal component in Oracle Application Server 9.0.4.3 and 10.1.2.0.2, and Collaboration Suite 10.1.2, has unknown impact and remote attack vectors, aka AS04. | [
"cpe:2.3:a:oracle:application_server:9.0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:collaboration_suite:10.1.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-r344-4jmp-54g4 | Pound before 2.8 allows HTTP request smuggling, a related issue to CVE-2016-10711. | [] | null | null | null | null |
|
CVE-2024-22370 | In JetBrains YouTrack before 2023.3.22666 stored XSS via markdown was possible | [
"cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*"
] | null | 4.6 | null | null |
|
CVE-2017-10001 | Vulnerability in the Oracle Hospitality Simphony First Edition component of Oracle Hospitality Applications (subcomponent: Core). The supported version that is affected is 1.7.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Simphony First Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality Simphony First Edition accessible data as well as unauthorized update, insert or delete access to some of Oracle Hospitality Simphony First Edition accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Hospitality Simphony First Edition. CVSS 3.0 Base Score 7.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:H). | [
"cpe:2.3:a:oracle:hospitality_simphony:1.7.1:*:*:*:first:*:*:*"
] | null | null | 7.6 | 6 |
|
CVE-2013-2341 | Unspecified vulnerability on the HP ProCurve JC###A, JC###B, JD###A, JD###B, JE###A, JF###A, JF###B, JF###C, JG###A, 658250-B21, and 658247-B21; HP 3COM routers and switches; and HP H3C routers and switches allows remote authenticated users to execute arbitrary code or obtain sensitive information via unknown vectors. | [
"cpe:2.3:h:hp:3com_baseline_plus_switch:2900:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_baseline_plus_switch:2900g:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_baseline_plus_switch:2900g-28hpwr:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_baseline_plus_switch:2900g-28pwr:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_router:3012:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_router:3013:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_router:3016:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_router:3018:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_router:3036:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_router:3040:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_router:3041:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_router:5009:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_router:5012:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_router:5231:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_router:5232:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_router:5640:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_router:5642:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_router:5642_taa:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_router:5680:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_router:5682:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_router:6040:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_router:6080:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_router:jg005a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_router:ss4_5500g-ei:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_switch:4200g:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_switch:4200g-ntg:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_switch:4200g_pwr:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_switch:4210:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_switch:4210-24g:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_switch:4210-48g:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_switch:4210_pwr:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_switch:4210_pwr_9p_taa:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_switch:4500:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_switch:4500_pwr:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_switch:4510g:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_switch:4510g_pwr:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_switch:4800g:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_switch:5500g-ei_sfp:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_switch:e4210-24g-poe:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_switch:e4510-24g:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_switch:ss4_5500-ei:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_switch:ss4_5500-ei-pwr:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_switch:ss4_5500-si:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_switch:ss4_5500g-ei:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_switch:ss4_5500g-ei-pwr:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_switch:ss4_switch_5500g-ei:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_switch_taa_compliant:5500g-ei:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_switch_taa_compliant:5500g-ei-pwr:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_switch_taa_compliant:5500g-ei-sfp:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3com_taa_switch:5500-ei:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_ethernet_switch:s5500-28c-ei:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_ethernet_switch:s5500-28c-ei-dc:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_ethernet_switch:s5500-28c-pwr-ei:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_ethernet_switch:s5500-28c-pwr-si:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_ethernet_switch:s5500-28c-si:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_ethernet_switch:s5500-28f-ei:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_ethernet_switch:s5500-52c-ei:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_ethernet_switch:s5500-52c-pwr-ei:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_ethernet_switch:s5500-52c-pwr-si:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_ethernet_switch:s5500-52c-si:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_ethernet_switch:s5600-26c:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_ethernet_switch:s5600-26c-pwr:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_ethernet_switch:s5600-26f:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_ethernet_switch:s5600-50c:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_ethernet_switch:s5600-50c-pwr:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_ethernet_switch:s7502e:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_ethernet_switch:s7503e:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_ethernet_switch:s7503e-s:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_ethernet_switch:s7506e:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_ethernet_switch:s7506e-v:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_ethernet_switch:s7510e:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_high_performance_main_processing_unit:msr_50_3ge:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_processing_module:msr_50_g2:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_processor_module:msr_50:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:msr_20-10:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:msr_20-11:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:msr_20-12:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:msr_20-12_t1:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:msr_20-13:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:msr_20-13_w:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:msr_20-15:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:msr_20-15_a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:msr_20-15_a_w:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:msr_20-15_iw:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:msr_20-20:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:msr_20-21:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:msr_20-40:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:msr_30-10:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:msr_30-20:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:msr_30-20_poe:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:msr_30-20_rtvz33020as:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:msr_30-40:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:msr_30-40_poe:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:msr_30-60:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:msr_30-60_poe:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:msr_50-40:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:msr_50-60:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:msr_900:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:msr_920:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:msr_3010:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:msr_3016:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:msr_3016_poe:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:msr5040-dc-ovs-h3c:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:rt-msr2011-ac-ovs-h3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:rt-msr2012-ac-ovs-h3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:rt-msr2012-ac-ovs-s-h3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:rt-msr2012-ac-ovs-w-h3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:rt-msr2012-t-ac-ovs-h3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:rt-msr2013-ac-ovs-h3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:rt-msr2013-ac-ovs-w-h3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:rt-msr2015-ac-ovs-a-h3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:rt-msr2015-ac-ovs-aw-h3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:rt-msr2015-ac-ovs-i-h3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:rt-msr2015-ac-ovs-iw-h3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:rt-msr2020-ac-ovs-h3c:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:rt-msr2040-ac-ovs-h3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:rt-msr2040-ac-ovs-h3c:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:rt-msr3011-ac-ovs-h3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:rt-msr3016-ac-ovs-h3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:rt-msr3016-ac-poe-ovs-h3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:rt-msr3020-ac-poe-ovs-h3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:rt-msr3020-dc-ovs-h3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:rt-msr3040-ac-ovs-as-h3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:rt-msr3040-ac-ovs-h:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:rt-msr3040-ac-poe-ovs-h3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:rt-msr3060-ac-ovs-h3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:rt-msr3060-ac-poe-ovs-h3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:rt-msr3060-dc-ovs-h3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:rt-msr5060-ac-ovs-h3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:sr_20-12_w:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:sr8802:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:sr8805:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:sr8808:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_router:sr8812:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_routing_switch:s9505e:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_routing_switch:s9508e-v:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_routing_switch:s9512e:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_routing_switch:s12508:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_routing_switch:s12518:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s3100-8c-si_ls-s3100-8c-si-ac-ovs:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s3100-8c-si_ls-s3100-8c-si-dc-ovs:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s3100-8t-si_ls-s3100-8t-si-ac-ovs:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s3100-16c-si_ls-s3100-16c-si-ac-ovs:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s3100-16c-si_ls-s3100-16c-si-dc-ovs:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s3100-16t-si_ls-s3100-16t-si-ac-ovs:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s3100-26c-si_ls-s3100-26c-si-ac-ovs:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s3100-26c-si_ls-s3100-26c-si-dc-ovs:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s3100-26t-si_ls-s3100-26t-si-ac-ovs:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s3100-52p_ls-3100-52p-ovs-h3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s3600-28f-ei_ls-3600-28f-ei-ovs:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s3600-28p-ei_ls-3600-28p-ei-ovs:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s3600-28p-pwr-ei_ls-3600-28p-pwr-ei-ovs:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s3600-28p-pwr-si_ls-3600-28p-pwr-si-ovs:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s3600-28p-si_ls-3600-28p-si-ovs:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s3600-28tp-si_ls-3600-28tp-si-ovs:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s3600-52p-ei_ls-3600-52p-ei-ovs:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s3600-52p-pwr-ei_ls-3600-52p-pwr-ei-ovs:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s3600-52p-pwr-si_ls-3600-52p-pwr-si-ovs:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s3600-52p-si_ls-3600-52p-si-ovs:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s3610-28f_ls-3610-28f-ovs:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s3610-28p_ls-3610-28p-ovs:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s3610-28tp_ls-3610-28tp-ovs:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s3610-52p_ls-3610-52p-ovs:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5100-8p-ei_ls-5100-8p-ei-ovs-h3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5100-8p-pwr-ei_ls-5100-8p-pwr-ei-ovs:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5100-8p-si_ls-5100-8p-si-ovs-h3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5100-16p-ei_ls-5100-16p-ei-ovs-h3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5100-16p-pwr-ei_ls-5100-16p-pwr-ei-ovs:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5100-16p-si_ls-5100-16p-si-ovs-h3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5100-24p-ei_ls-5100-24p-ei-ovs:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5100-24p-si_ls-5100-24p-si-ovs-h3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5100-26c-ei_ls-5100-26c-ei-ovs:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5100-26c-pwr-ei_ls-5100-26c-pwr-ei-ovs:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5100-48p-ei_ls-5100-48p-ei-ovs:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5100-48p-si_ls-5100-48p-si-ovs-h3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5100-50c-ei_ls-5100-50c-ei-ovs:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5100-50c-pwr-ei_ls-5100-50c-pwr-ei-ovs:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5120-20p-si:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5120-24p-ei:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5120-28c-ei:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5120-28c-pwr-ei:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5120-28p-hpwr-si:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5120-28p-pwr-si:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5120-28p-si:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5120-48p-ei:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5120-52c-ei:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5120-52c-pwr-ei:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5120-52p-si:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5800-32c:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5800-32c-pwr:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5800-32f:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5800-56c:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5800-56c-pwr:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5800-60c-pwr:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5820x-28c:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s5820x-28s:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s7502e:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s7503e:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s7503e-s:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s7506e:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s7506e-v:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s9505e:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s9508e-v:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s12508:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:h3c_switch:s12518:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jc147a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jc147b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jc148a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jc148b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jc149a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jc149b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jc150a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jc150b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jd429b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jd431a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jd432a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jd433a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jd653a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jd655a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jd656a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jd662a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jd663a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jd663b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jd664a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jd916a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jd917a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jd918a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jd921a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jd922a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jd923a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jd935a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jd943a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jd944a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jd945a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jd946a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jd967a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jd972a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf182a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf183a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf184a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf228a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf229a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf230a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf231a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf233a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf234a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf235a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf236a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf237a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf238a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf239a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf240a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf241a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf283a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf284a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf285a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf287a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf640a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf800a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf801a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf802a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf803a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf804a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf806a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf807a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf808a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf809a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf812a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf813a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf814a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf815a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf816a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_router:jf817a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:658247-b21:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:658250-b21:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jc085a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jc086a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jc099a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jc100a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jc101a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jc102a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jc103a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jc104a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jc105a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jc106a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jc124a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jc124b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jc125a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jc125b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jc474a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jc474b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jc611a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jc612a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jc613a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jc652a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jc653a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jc654a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jc655a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jc691a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jc694a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jc748a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd007a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd008a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd009a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd010a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd011a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd238a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd238b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd239a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd239b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd240a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd240b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd241a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd241b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd242a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd242b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd243a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd243b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd302a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd303a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd304a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd305a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd306a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd307a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd308a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd309a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd310a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd313b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd317a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd318b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd319b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd320b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd325a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd326a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd327a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd328a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd329a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd330a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd331a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd332a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd333a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd334a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd335a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd336a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd337a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd338a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd344a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd345a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd346a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd347a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd348a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd349a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd350a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd351a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd352a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd353a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd354a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd355a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd356a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd357a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd369a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd370a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd371a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd372a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd373a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd374a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd375a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd376a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd377a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd378a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd379a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd391a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd392a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd393a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd394a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jd395a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je005a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je006a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je007a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je008a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je009a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je015a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je016a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je017a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je018a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je019a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je020a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je021a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je022a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je023a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je024a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je025a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je026a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je027a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je028a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je029a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je030a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je031a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je032a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je033a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je045a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je046a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je047a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je048a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je066a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je067a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je068a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je069a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je070a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je071a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je072a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je073a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je074a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je088a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je089a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je090a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je091a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je092a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je093a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je094a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je095a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je096a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je097a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je099a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je100a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je101a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je102a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je104a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je105a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je106a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je107a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je108a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je109a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je110a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je164a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je165a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je166a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je167a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je168a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:je169a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jf427a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jf428a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jf430a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jf430b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jf430c:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jf431a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jf431b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jf431c:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jf551a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jf552a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jf553a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jf844a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jf845a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jf846a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jf847a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg091a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg092a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg219a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg221a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg222a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg223a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg225a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg236a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg237a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg238a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg239a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg240a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg241a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg242a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg243a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg245a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg246a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg247a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg248a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg249a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg250a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg251a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg252a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg253a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg254a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg255a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg256a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg257a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg258a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg259a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg299a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg300a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg301a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg302a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg303a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg304a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg305a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg306a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg307a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg311a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg312a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg315a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg316a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg348a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg349a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg350a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch:jg374a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:vpn_firewall_appliance:jd270a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:vpn_firewall_appliance:jd271a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:vpn_firewall_appliance:jg213a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:vpn_firewall_appliance:jg214a:*:*:*:*:*:*:*"
] | null | null | null | 7.1 |
|
GHSA-pqx5-mp9c-hm3r | Multiple file upload restriction bypass vulnerabilities in Sentrifugo 3.2 could allow authenticated users to execute arbitrary code via a webshell. | [] | null | 8.8 | null | null |
|
GHSA-9pmh-r27r-8vx3 | The LMS5xx uses weak hash generation methods, resulting in the creation of insecure hashs. If an attacker manages to retrieve the hash, it could lead to collision attacks and the potential retrieval of the password. | [] | null | 7.5 | null | null |
|
GHSA-x486-4h5g-3687 | PDFResurrect before 0.20 lack of header validation checks causes heap-buffer-overflow in pdf_get_version(). | [] | null | null | null | null |
|
CVE-2017-6616 | A vulnerability in the web-based GUI of Cisco Integrated Management Controller (IMC) 3.0(1c) could allow an authenticated, remote attacker to execute arbitrary code on an affected system. The vulnerability exists because the affected software does not sufficiently sanitize specific values that are received as part of a user-supplied HTTP request. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected software. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the user on the affected system. Cisco Bug IDs: CSCvd14578. | [
"cpe:2.3:a:cisco:integrated_management_controller_supervisor:3.0\\(1c\\):*:*:*:*:*:*:*"
] | null | null | 8.8 | 9 |
|
GHSA-m9rv-9j45-vx77 | Phpgurukul Vehicle Record Management System v1.0 is vulnerable to Cross Site Scripting (XSS) in /admin/profile.php via the name, email, and mobile parameters. | [] | null | 6.1 | null | null |
|
GHSA-5q5w-mqp6-g2gh | Unrestricted Upload of File with Dangerous Type in jsdecena/laracom | jsdecena/laracom prior to version 2.0.9 is vulnerable to Unrestricted Upload of File with Dangerous Type. | [] | null | 5.4 | null | null |
CVE-2006-4083 | PHP remote file inclusion vulnerability in viewevent.php in myWebland myEvent 1.x allows remote attackers to execute arbitrary PHP code via a URL in the myevent_path parameter, a different vector than CVE-2006-4040. NOTE: the provenance of this information is unknown; the details are obtained from third party information. | [
"cpe:2.3:a:mywebland:myevent:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mywebland:myevent:1.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2020:2972 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) OpenJDK: Unexpected exception raised by DerInputStream (Libraries, 8237731) OpenJDK: Unexpected exception raised by DerValue.equals() (Libraries, 8237736) OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136) | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
GHSA-c7pf-gfcw-v5h4 | Unspecified vulnerability in the mobile app in Oracle Business Intelligence Enterprise Edition in Oracle Fusion Middleware before 11.1.1.7.0 (11.6.39) allows remote authenticated users to affect integrity via unknown vectors related to Mobile - iPad. | [] | null | null | null | null |
|
CVE-2021-26461 | malloc, realloc and memalign implementations are vulnerable to integer wrap-arounds | Apache Nuttx Versions prior to 10.1.0 are vulnerable to integer wrap-around in functions malloc, realloc and memalign. This improper memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution. | [
"cpe:2.3:a:apache:nuttx:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
CVE-2016-9576 | The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 4.8.14 does not properly restrict the type of iterator, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
CVE-2019-1216 | An information disclosure vulnerability exists when DirectX improperly handles objects in memory, aka 'DirectX Information Disclosure Vulnerability'. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
CVE-2022-33909 | DMA transactions which are targeted at input buffers used for the HddPassword software SMI handler could cause SMRAM corruption through a TOCTOU attack. DMA transactions which are targeted at input buffers used for the software SMI handler used by the HddPassword driver could cause SMRAM corruption through a TOCTOU attack..This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. Fixed in kernel Kernel 5.2: 05.27.23, Kernel 5.3: 05.36.23, Kernel 5.4: 05.44.23, Kernel 5.5: 05.52.23 https://www.insyde.com/security-pledge/SA-2022051 | [
"cpe:2.3:a:insyde:kernel:*:*:*:*:*:*:*:*"
] | null | 7 | null | null |
|
CVE-2006-4342 | The kernel in Red Hat Enterprise Linux 3, when running on SMP systems, allows local users to cause a denial of service (deadlock) by running the shmat function on an shm at the same time that shmctl is removing that shm (IPC_RMID), which prevents a spinlock from being unlocked. | [
"cpe:2.3:o:redhat:enterprise_linux:3.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4 |
|
RHSA-2015:2548 | Red Hat Security Advisory: Red Hat JBoss Web Server 3.0.1 commons-collections security update | apache-commons-collections: InvokerTransformer code execution during deserialisation | [
"cpe:/a:redhat:jboss_enterprise_web_server:3.0"
] | null | null | null | null |
CVE-2005-1423 | Directory traversal vulnerability in the mail program in 602LAN SUITE 2004.0.05.0413 allows remote attackers to cause a denial of service and determine the presence of arbitrary files via .. sequences in the A parameter. | [
"cpe:2.3:a:software602:602lan_suite:2004.0.05.0413:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
GHSA-vx2g-v3f9-m6mw | B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php where_in() function. | [] | null | 9.8 | null | null |
|
CVE-2024-24741 | Missing Authorization check in SAP Master Data Governance Material | SAP Master Data Governance for Material Data - versions 618, 619, 620, 621, 622, 800, 801, 802, 803, 804, does not perform necessary authorization check for an authenticated user, resulting in escalation of privileges. This could allow an attacker to read some sensitive information but no impact to integrity and availability.
| [
"cpe:2.3:a:sap:master_data_governance_for_material_data:618:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:master_data_governance_for_material_data:619:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:master_data_governance_for_material_data:620:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:master_data_governance_for_material_data:621:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:master_data_governance_for_material_data:622:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:master_data_governance_for_material_data:800:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:master_data_governance_for_material_data:801:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:master_data_governance_for_material_data:802:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:master_data_governance_for_material_data:803:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:master_data_governance_for_material_data:804:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
CVE-2023-26547 | The InputMethod module has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation. | [
"cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2022-0189 | WP RSS Aggregator < 4.20 - Reflected Cross-Site Scripting (XSS) | The WP RSS Aggregator WordPress plugin before 4.20 does not sanitise and escape the id parameter in the wprss_fetch_items_row_action AJAX action before outputting it back in the response, leading to a Reflected Cross-Site Scripting | [
"cpe:2.3:a:wprssaggregator:wp_rss_aggregator:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | 4.3 |
GHSA-4hvm-x6v7-c64m | Wi-Fi in Apple iOS before 10.3.1 does not prevent CVE-2017-6956 stack buffer overflow exploitation via a crafted access point. NOTE: because an operating system could potentially isolate itself from CVE-2017-6956 exploitation without patching Broadcom firmware functions, there is a separate CVE ID for the operating-system behavior. | [] | null | null | 6.8 | null |
|
GHSA-jmpj-w6q2-9wpp | The Limit Login Attempts (Spam Protection) plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 5.3. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restrictions. Attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged and can be used to bypass settings that may have blocked out an IP address or country from logging in. | [] | null | 5.3 | null | null |
|
GHSA-5vqg-4pw8-x3vj | SQL injection vulnerability in admin/index.php in NeLogic Nephp Publisher Enterprise 3.5.9 and 4.5 allows remote attackers to execute arbitrary SQL commands via the Username field. | [] | null | null | null | null |
|
GHSA-2xgw-64w9-83wm | A vulnerability was found in FastCMS 0.1.0. It has been classified as critical. Affected is an unknown function of the component Template Management. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-220038 is the identifier assigned to this vulnerability. | [] | 5.3 | 9.8 | null | null |
|
CVE-2024-42094 | net/iucv: Avoid explicit cpumask var allocation on stack | In the Linux kernel, the following vulnerability has been resolved:
net/iucv: Avoid explicit cpumask var allocation on stack
For CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask
variable on stack is not recommended since it can cause potential stack
overflow.
Instead, kernel code should always use *cpumask_var API(s) to allocate
cpumask var in config-neutral way, leaving allocation strategy to
CONFIG_CPUMASK_OFFSTACK.
Use *cpumask_var API(s) to address it. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 7.1 | null | null |
CVE-2025-49579 | Citizen allows stored XSS in menu heading message | Citizen is a MediaWiki skin that makes extensions part of the cohesive experience. All system messages in menu headings using the Menu.mustache template are inserted as raw HTML, allowing anybody who can edit those messages to insert arbitrary HTML into the DOM. This impacts wikis where a group has the `editinterface` but not the `editsitejs` user right. This vulnerability is fixed in 3.3.1. | [] | null | 6.5 | null | null |
GHSA-v567-q267-phpg | pimcore is vulnerable to Cross-site Scripting | pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | [] | null | 5.4 | null | null |
CVE-2018-13212 | The sell function of a smart contract implementation for EthereumLegit, an Ethereum token, has an integer overflow in which "amount * sellPrice" can be zero, consequently reducing a seller's assets. | [
"cpe:2.3:a:ethereumlegit_project:ethereumlegit:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
RHSA-2025:8349 | Red Hat Security Advisory: varnish security update | varnish: request smuggling attacks | [
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/a:redhat:rhel_eus:9.4::crb"
] | null | 8.1 | null | null |
CVE-2023-2424 | DedeCMS config.php UpDateMemberModCache unrestricted upload | A vulnerability was found in DedeCMS 5.7.106 and classified as critical. Affected by this issue is the function UpDateMemberModCache of the file uploads/dede/config.php. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-227750 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:dedecms:dedecms:5.7.106:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6.5 |
GHSA-69fh-p4p6-4vwc | Insertion of Sensitive Information Into Sent Data vulnerability in ZealousWeb Accept Stripe Payments Using Contact Form 7 allows Retrieve Embedded Sensitive Data. This issue affects Accept Stripe Payments Using Contact Form 7: from n/a through 3.0. | [] | null | 5.3 | null | null |
|
GHSA-mxwh-28p4-8rr7 | ?Softneta MedDream PACS stores usernames and passwords in plaintext. The plaintext storage could be abused by attackers to leak legitimate user’s credentials. | [] | null | 6.1 | null | null |
|
GHSA-vx7m-hm5r-82w3 | Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows forgery of SSH host certificates in some situations. | [] | null | 9.8 | null | null |
|
RHSA-2004:156 | Red Hat Security Advisory: mailman security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es"
] | null | null | null | null |
GHSA-gvfm-vv3m-pgfr | A vulnerability was found in HumHub 0.20.1/1.0.0-beta.3. It has been classified as critical. This affects an unknown part. The manipulation leads to privilege escalation. It is possible to initiate the attack remotely. Upgrading to version 1.0.0 is able to address this issue. It is recommended to upgrade the affected component. | [] | null | 9.8 | null | null |
|
GHSA-m63x-ghq3-c527 | The ftlserver component of TIBCO Software Inc.'s TIBCO FTL - Community Edition, TIBCO FTL - Developer Edition, TIBCO FTL - Enterprise Edition, TIBCO FTL - Enterprise Edition, TIBCO eFTL - Community Edition, TIBCO eFTL - Developer Edition, TIBCO eFTL - Enterprise Edition, and TIBCO eFTL - Enterprise Edition contains a difficult to exploit vulnerability that allows a low privileged attacker with local access to obtain user credentials to the affected system. Affected releases are TIBCO Software Inc.'s TIBCO FTL - Community Edition: versions 6.0.0 through 6.8.0, TIBCO FTL - Developer Edition: versions 6.0.1 through 6.8.0, TIBCO FTL - Enterprise Edition: versions 6.0.0 through 6.7.3, TIBCO FTL - Enterprise Edition: version 6.8.0, TIBCO eFTL - Community Edition: versions 6.0.0 through 6.8.0, TIBCO eFTL - Developer Edition: versions 6.0.1 through 6.8.0, TIBCO eFTL - Enterprise Edition: versions 6.0.0 through 6.7.3, and TIBCO eFTL - Enterprise Edition: version 6.8.0. | [] | null | 7.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.