id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2021-41497
Null pointer reference in CMS_Conservative_increment_obj in RaRe-Technologies bounter version 1.01 and 1.10, allows attackers to conduct Denial of Service attacks by inputting a huge width of hash bucket.
[ "cpe:2.3:a:rare-technologies:bounter:1.01:*:*:*:*:*:*:*", "cpe:2.3:a:rare-technologies:bounter:1.10:*:*:*:*:*:*:*" ]
null
7.5
null
5
RHSA-2024:1934
Red Hat Security Advisory: thunderbird security update
Mozilla: Permission prompt input delay could expire when not in focus Mozilla: Denial of Service using HTTP/2 CONTINUATION frames Mozilla: GetBoundName in the JIT returned the wrong object Mozilla: Out-of-bounds-read after mis-optimized switch statement Mozilla: Incorrect JITting of arguments led to use-after-free during garbage collection Mozilla: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer Mozilla: Potential use-after-free due to AlignedBuffer self-move Mozilla: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
7.5
null
null
GHSA-w4vc-26qw-m4wv
Memory leak in the LDAP service in Active Directory on Microsoft Windows 2000 SP4 and Server 2003 SP2, and Active Directory Application Mode (ADAM) on Windows XP SP2 and SP3 and Server 2003 SP2, allows remote attackers to cause a denial of service (memory consumption and service outage) via (1) LDAP or (2) LDAPS requests with unspecified OID filters, aka "Active Directory Memory Leak Vulnerability."
[]
null
null
null
null
CVE-2019-6731
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the conversion of HTML files to PDF. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7369.
[ "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
CVE-2023-45641
WordPress Caret Country Access Limit Plugin <= 1.0.2 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in Caret Inc. Caret Country Access Limit plugin <= 1.0.2 versions.
[ "cpe:2.3:a:ca-ret:country_access_limit:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
RHSA-2017:2907
Red Hat Security Advisory: wpa_supplicant security update
wpa_supplicant: Reinstallation of the pairwise key in the 4-way handshake wpa_supplicant: Reinstallation of the group key in the 4-way handshake wpa_supplicant: Reinstallation of the group key in the group key handshake wpa_supplicant: Accepting a retransmitted FT Reassociation Request and reinstalling the pairwise key while processing it wpa_supplicant: reinstallation of the Tunneled Direct-Link Setup (TDLS) PeerKey (TPK) key in the TDLS handshake wpa_supplicant: reinstallation of the group key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame wpa_supplicant: reinstallation of the integrity group key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.1
null
CVE-2009-0208
Unspecified vulnerability in HP Virtual Rooms Client before 7.0.1, when running on Windows, allows remote attackers to execute arbitrary code via unknown vectors.
[ "cpe:2.3:a:hp:virtual_rooms:*:*:*:*:*:*:*:*", "cpe:2.3:a:hp:virtual_rooms:6.0:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2023-34968
Samba: spotlight server-side share path disclosure
A path disclosure vulnerability was found in Samba. As part of the Spotlight protocol, Samba discloses the server-side absolute path of shares, files, and directories in the results for search queries. This flaw allows a malicious client or an attacker with a targeted RPC request to view the information that is part of the disclosed path.
[ "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:storage:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos", "cpe:/o:redhat:rhev_hypervisor:4.4::el8", "cpe:/o:redhat:rhel_eus:8.6::baseos", "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb", "cpe:/a:redhat:rhel_eus:8.8::crb", "cpe:/o:redhat:rhel_eus:8.8::baseos", "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::resilientstorage", "cpe:/o:redhat:enterprise_linux:6", "cpe:/o:redhat:enterprise_linux:7", "cpe:/a:redhat:storage:3" ]
null
5.3
null
null
GHSA-fg9m-gw92-f74h
Tufin SecureTrack < R20-2 GA contains reflected + stored XSS (as in, the value is reflected back to the user, but is also stored within the DB and can be later triggered again by the same victim, or also later by different users). Both stored, and reflected payloads are triggerable by admin, so malicious non-authenticated user could get admin level access. Even malicious low-privileged user can inject XSS, which can be executed by admin, potentially elevating privileges and obtaining admin access. (issue 2 of 3)
[]
null
null
null
null
GHSA-xq89-553h-3j4m
In all versions of GitLab CE/EE since version 8.0, access tokens created as part of admin's impersonation of a user are not cleared at the end of impersonation which may lead to unnecessary sensitive info disclosure.
[]
null
4.9
null
null
GHSA-833c-xh79-p429
A potential risk in clusternet which can be leveraged to make a cluster-level privilege escalation
Summary:A potential risk in clusternet which can be leveraged to make a cluster-level privilege escalation.Detailed analysis:The clusternet has a deployment called cluster-hub inside the clusternet-system Kubernetes namespace, which runs on worker nodes randomly. The deployment has a service account called clusternet-hub, which has a cluster role called clusternet:hub via cluster role binding. The clusternet:hub cluster role has "*" verbs of "*.*" resources. Thus, if a malicious user can access the worker node which runs the clusternet, he/she can leverage the service account to do malicious actions to critical system resources. For example, he/she can leverage the service account to get ALL secrets in the entire cluster, resulting in cluster-level privilege escalation.
[]
null
6.7
null
null
GHSA-p89j-rm47-9qxx
Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/edit_page.php?link_id=1
[]
null
7.1
null
null
GHSA-5rg9-ph4r-3frg
The Open Hours – Easy Opening Hours plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'open-hours-current-status' shortcode in all versions up to, and including, 1.0.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
CVE-2023-46929
An issue discovered in GPAC 2.3-DEV-rev605-gfc9e29089-master in MP4Box in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55 allows attackers to crash the application.
[ "cpe:2.3:a:gpac:gpac:2.3-dev-rev605-gfc9e29089-master:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-vrw2-q2cc-chx3
Multiple untrusted search path vulnerabilities in updater.exe in Mozilla Updater in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, and Thunderbird ESR 17.x before 17.0.8 on Windows 7, Windows Server 2008 R2, Windows 8, and Windows Server 2012 allow local users to gain privileges via a Trojan horse DLL in (1) the update directory or (2) the current working directory.
[]
null
null
null
null
PYSEC-2018-90
null
The mpatch_decode function in mpatch.c in Mercurial before 4.6.1 mishandles certain situations where there should be at least 12 bytes remaining after the current position in the patch data, but actually are not, aka OVE-20180430-0001.
[]
null
null
null
null
GHSA-ph92-8cwc-4cwc
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[]
null
4.9
null
null
GHSA-8g9m-gx79-xjrc
Cross-site scripting (XSS) vulnerability in Textpattern CMS before 4.5.7 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to setup/index.php.
[]
null
null
null
null
GHSA-5j2c-m7w9-79w6
Cross-site scripting (XSS) vulnerability in search_results.php in ABK-Soft AbleDating 2.4 allows remote attackers to inject arbitrary web script or HTML via the keyword parameter.
[]
null
null
null
null
CVE-2024-48019
Apache Doris: allows admin users to read arbitrary files through the REST API
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Files or Directories Accessible to External Parties vulnerability in Apache Doris. Application administrators can read arbitrary files from the server filesystem through path traversal. Users are recommended to upgrade to version 2.1.8, 3.0.3 or later, which fixes the issue.
[]
null
5.4
null
null
CVE-2019-16206
The authentication mechanism, in Brocade SANnav versions before v2.0, logs plaintext account credentials at the ‘trace’ and the 'debug' logging level; which could allow a local authenticated attacker to access sensitive information.
[ "cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
GHSA-qhcw-hxmc-xmhx
IrfanView version 4.44 (32bit) might allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .rle file, related to an "Invalid Handle starting at wow64!Wow64NotifyDebugger+0x000000000000001d."
[]
null
null
7.8
null
CVE-2023-50253
laf logs leak
Laf is a cloud development platform. In the Laf version design, the log uses communication with k8s to quickly retrieve logs from the container without the need for additional storage. However, in version 1.0.0-beta.13 and prior, this interface does not verify the permissions of the pod, which allows authenticated users to obtain any pod logs under the same namespace through this method, thereby obtaining sensitive information printed in the logs. As of time of publication, no known patched versions exist.
[ "cpe:2.3:a:laf:laf:0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.4.13:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.4.14:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.4.15:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.4.16:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.4.17:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.4.18:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.4.19:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.4.20:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.4.21:alpha0:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.5.0:-:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.5.0:alpha0:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.5.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.5.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.5.0:alpha3:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.5.1:-:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.5.1:alpha0:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.5.2:-:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.5.2:alpha0:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.5.4:-:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.5.4:alpha0:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.5.5:-:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.5.5:alpha0:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.5.7:-:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.5.7:alpha0:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.5.8:alpha0:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.0:-:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.0:alpha0:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.0:alpha10:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.0:alpha3:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.0:alpha4:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.0:alpha5:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.0:alpha6:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.0:alpha7:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.0:alpha8:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.0:alpha9:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.9:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.10:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.11:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.12:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.13:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.14:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.15:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.16:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.17:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.18:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.19:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.20:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.21:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.22:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.6.23:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.7.8:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.7.9:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.7.10:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.7.11:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.8.0:-:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.8.0:alpha0:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.8.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.8.0:alpha10:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.8.0:alpha11:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.8.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.8.0:alpha3:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.8.0:alpha4:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.8.0:alpha5:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.8.0:alpha6:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.8.0:alpha7:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.8.0:alpha8:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.8.0:alpha9:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.8.5:-:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.8.5:alpha0:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.8.7:-:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.8.7:alpha0:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.8.7:alpha1:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.8.7:alpha2:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.8.7:alpha3:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.8.8:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.8.9:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.8.10:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.8.11:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.8.12:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:0.8.13:*:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:1.0.0:alpha0:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:1.0.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:1.0.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:1.0.0:alpha3:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:1.0.0:alpha4:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:1.0.0:alpha5:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:1.0.0:alpha6:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:1.0.0:beta0:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:1.0.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:1.0.0:beta10:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:1.0.0:beta11:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:1.0.0:beta12:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:1.0.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:1.0.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:1.0.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:1.0.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:1.0.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:1.0.0:beta7:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:1.0.0:beta8:*:*:*:*:*:*", "cpe:2.3:a:laf:laf:1.0.0:beta9:*:*:*:*:*:*" ]
null
9.7
null
null
CVE-2018-8429
An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory, aka "Microsoft Excel Information Disclosure Vulnerability." This affects Microsoft Excel Viewer, Microsoft Office, Microsoft Excel.
[ "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel_viewer:2007:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2016:*:*:*:click-to-run:*:*:*", "cpe:2.3:a:microsoft:office_compatibility_pack:-:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_for_mac:2016:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
CVE-2022-33183
A vulnerability in Brocade Fabric OS CLI before Brocade Fabric OS v9.1.0, 9.0.1e, 8.2.3c, 8.2.0cbn5, 7.4.2.j could allow a remote authenticated attacker to perform stack buffer overflow using in “firmwaredownload” and “diagshow” commands.
[ "cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2020-3692
u'Possible buffer overflow while updating output buffer for IMEI and Gateway Address due to lack of check of input validation for parameters received from server' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in Agatti, Kamorta, Nicobar, QCM6125, QCS610, Rennell, SA415M, Saipan, SC7180, SC8180X, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR2130
[ "cpe:2.3:o:qualcomm:agatti_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:agatti:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:kamorta_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:kamorta:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:nicobar_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:nicobar:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa415m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa415m:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:saipan_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:saipan:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sc7180_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sc7180:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sc8180x:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*" ]
null
9.8
null
10
CVE-2018-5401
The Auto-Maskin DCU 210E, RP-210E, and Marine Pro Observer Android App transmit sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors
The Auto-Maskin DCU 210E, RP-210E, and Marine Pro Observer Android App transmit sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors. The devices transmit process control information via unencrypted Modbus communications. Impact: An attacker can exploit this vulnerability to observe information about configurations, settings, what sensors are present and in use, and other information to aid in crafting spoofed messages. Requires access to the network. Affected releases are Auto-Maskin DCU-210E, RP-210E, and Marine Pro Observer Android App. Versions prior to 3.7 on ARMv7.
[ "cpe:2.3:o:auto-maskin:rp_210e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:arm:arm7:*:*:*:*:*:*:*:*", "cpe:2.3:h:auto-maskin:rp_210e:-:*:*:*:*:*:*:*", "cpe:2.3:o:auto-maskin:dcu_210e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:auto-maskin:dcu_210e:-:*:*:*:*:*:*:*", "cpe:2.3:a:auto-maskin:marine_pro_observer:-:*:*:*:*:android:*:*" ]
null
null
9.1
null
CVE-2015-7357
Cross-site scripting (XSS) vulnerability in the uDesign (aka U-Design) theme 2.3.0 before 2.7.10 for WordPress allows remote attackers to inject arbitrary web script or HTML via a fragment identifier, as demonstrated by #<svg onload=alert(1)>.
[ "cpe:2.3:a:udesign_project:udesign:2.3.0:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.3.1:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.4.0:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.4.1:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.4.2:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.4.3:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.4.4:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.4.5:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.4.6:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.4.7:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.4.8:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.4.9:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.4.10:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.4.11:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.4.12:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.4.13:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.4.14:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.4.15:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.4.16:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.4.17:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.4.18:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.4.19:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.5.0:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.5.1:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.5.2:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.5.3:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.5.4:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.5.5:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.5.6:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.6.0:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.7.0:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.7.1:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.7.2:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.7.3:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.7.4:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.7.5:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.7.6:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.7.7:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.7.8:*:*:*:*:wordpress:*:*", "cpe:2.3:a:udesign_project:udesign:2.7.9:*:*:*:*:wordpress:*:*" ]
null
null
6.1
4.3
CVE-2024-47121
Weak Passwords Requirements in goTenna Pro
The goTenna Pro App uses a weak password for sharing encryption keys via the key broadcast method. If the broadcasted encryption key is captured over RF, and password is cracked via brute force attack, it is possible to decrypt it and use it to decrypt all future and past messages sent via encrypted broadcast with that particular key. This only applies when the key is broadcasted over RF. This is an optional feature, so it is recommended to use local QR encryption key sharing for additional security on this and previous versions.
[ "cpe:2.3:a:gotenna:gotenna_pro:*:*:*:*:*:android:*:*", "cpe:2.3:a:gotenna:gotenna_pro:*:*:*:*:*:iphone_os:*:*" ]
6
5.3
null
null
GHSA-cx27-88fx-8jw8
An issue was discovered in zzcms 2019. There is a SQL injection Vulnerability in /dl/dl_sendsms.php (when the attacker has dls_print authority) via a dlid cookie.
[]
null
8.8
null
null
RHSA-2025:1086
Red Hat Security Advisory: ovn22.12 security update
ovn: egress ACLs may be bypassed via specially crafted UDP packet
[ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ]
null
8.1
null
null
GHSA-2988-m58c-m55p
OS command injection vulnerability in Nintendo Wi-Fi Network Adaptor WAP-001 All versions allows an attacker with an administrative privilege to execute arbitrary OS commands via unspecified vectors.
[]
null
7.2
null
null
GHSA-f5c2-3w4r-7h7c
Foxit PDF Reader JPG2000 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PDF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14812.
[]
null
null
7.8
null
CVE-2008-0502
PHP remote file inclusion vulnerability in templates/Official/part_userprofile.php in Connectix Boards 0.8.2 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the template_path parameter.
[ "cpe:2.3:a:connectix:connectix_boards:*:*:*:*:*:*:*:*", "cpe:2.3:a:connectix:connectix_boards:0.8.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-84jr-whrm-qphm
Authenticated (contributor or higher user role) Stored Cross-Site Scripting (XSS) vulnerability in Chinmoy Paul's Testimonials plugin <= 3.0.1 at WordPress.
[]
null
5.4
null
null
GHSA-2cxw-wgvv-24jj
VMware ESXi contains an arbitrary write vulnerability. A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox.
[]
null
8.2
null
null
CVE-2021-46825
Symantec Advanced Secure Gateway (ASG) and ProxySG are susceptible to an HTTP desync vulnerability. When a remote unauthenticated attacker and other web clients communicate through the proxy with the same web server, the attacker can send crafted HTTP requests and cause the proxy to forward web server responses to unintended clients. Severity/CVSSv3: High / 8.1 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
[ "cpe:2.3:a:broadcom:advanced_secure_gateway:6.7:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:advanced_secure_gateway:7.3:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:proxysg:6.7:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:proxysg:7.3:*:*:*:*:*:*:*" ]
null
9.1
null
6.4
CVE-2009-3075
Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.2, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to use of mutable strings in the js_StringReplaceHelper function in js/src/jsstr.cpp, and unknown vectors.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9_rc:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-w73f-r889-xrx8
AFP Server in Apple Mac OS X 10.5.8 and 10.6.x before 10.6.5 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon restart) via crafted reconnect authentication packets.
[]
null
null
null
null
GHSA-7v7g-vx57-pg3r
Directory Traversal vulnerability in FME Modules customfields v.2.2.7 and before allows a remote attacker to obtain sensitive information via the Custom Checkout Fields, Add Custom Fields to Checkout parameter of the ajax.php
[]
null
7.5
null
null
CVE-2022-39834
A stored XSS vulnerability was discovered in adminweb/ra/viewendentity.jsp in PrimeKey EJBCA through 7.9.0.2. A low-privilege user can store JavaScript in order to exploit a higher-privilege user.
[ "cpe:2.3:a:keyfactor:primekey_ejbca:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
PYSEC-2024-88
null
A vulnerability was found in MicroPython 1.23.0. It has been rated as critical. Affected by this issue is the function mpz_as_bytes of the file py/objint.c. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The patch is identified as 908ab1ceca15ee6fd0ef82ca4cba770a3ec41894. It is recommended to apply a patch to fix this issue. In micropython objint component, converting zero from int to bytes leads to heap buffer-overflow-write at mpz_as_bytes.
[]
null
7.5
null
null
CVE-2008-2066
Cross-site scripting (XSS) vulnerability in bb_admin.php in miniBB 2.2a allows remote attackers to inject arbitrary web script or HTML via the whatus parameter in a searchusers2 action. NOTE: it was later reported that other versions before 3.0.1 are also vulnerable.
[ "cpe:2.3:a:minibb:minibb:2.2a:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-p48c-42m5-8gmw
Shopkit v2.7 contains a reflective cross-site scripting (XSS) vulnerability in the /account/register component, which allows attackers to hijack user credentials via a crafted payload in the E-Mail text field.
[]
null
null
null
null
GHSA-2fw8-6c95-mmp8
Uninitialized data in endianness conversion in the XEvent handling of the X.Org X Server before 2017-06-19 allowed authenticated malicious users to access potentially privileged data from the X server.
[]
null
null
6.5
null
GHSA-jq5g-xxg4-vw6h
Delta Electronics DIAEnergie Version 1.7.5 and prior may allow an attacker to add a new administrative user without being authenticated or authorized, which may allow the attacker to log in and use the device with administrative privileges.
[]
null
9.8
null
null
RHSA-2014:1060
Red Hat Security Advisory: Transition Red Hat Network Classic Hosted to Red Hat Subscription Management
This is the 3-year notification of the target date to migrate systems from Red Hat Network Classic Hosted to Red Hat Subscription Management. All systems using Red Hat Network Classic Hosted must be migrated to Red Hat Subscription Management.
[]
null
null
null
null
CVE-2015-6513
Multiple SQL injection vulnerabilities in the J2Store (com_j2store) extension before 3.1.7 for Joomla! allow remote attackers to execute arbitrary SQL commands via the (1) sortby or (2) manufacturer_ids[] parameter to index.php.
[ "cpe:2.3:a:j2store:j2store:*:*:*:*:*:joomla\\!:*:*" ]
null
null
null
7.5
CVE-2018-3682
BMC Firmware in Intel server boards, compute modules, and systems potentially allow an attacker with administrative privileges to make unauthorized read\writes to the SMBUS.
[ "cpe:2.3:o:intel:bmc_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:bbs7200ap:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:bbs7200apl:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:dbs2600cw2r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:dbs2600cw2sr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:dbs2600cwtr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:dbs2600cwtsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600kpfr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600kpr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600tp24r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600tp24sr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600tp24str:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600tpfr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600tpnr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600tpr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns7200ap:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns7200apl:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns7200apr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns7200aprl:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r1208wt2gsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r1208wttgsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r1304wt2gsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r1304wttgsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2208wt2ysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2208wttyc1r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2208wttysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2224wttysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2308wttysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2312wttysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600kpfr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600kpr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600kptr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600tpfr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600tpnr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600tpr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600tptr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600wfo:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600wt2r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600wttr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600wtts1r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s7200apr:-:*:*:*:*:*:*:*" ]
null
null
8.2
4.6
CVE-2021-27320
Blind SQL injection in contactus.php in Doctor Appointment System 1.0 allows an unauthenticated attacker to insert malicious SQL queries via firstname parameter.
[ "cpe:2.3:a:doctor_appointment_system_project:doctor_appointment_system:1.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-wm9j-fw55-hv9g
A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to arbitrary code execution.
[]
null
null
null
null
GHSA-q29j-3f7p-x46x
Unspecified vulnerability in the login page redirection logic in the Cache' Server Page (CSP) implementation in InterSystems Cache' 2007.1.0.369.0 and 2007.1.1.420.0 allows remote authenticated users to modify data on a server, related to encoding of certain parameter values by this redirection logic, aka MAK2116.
[]
null
null
null
null
cisco-sa-20190821-nfv-filewrite
Cisco Enterprise Network Functions Virtualization Infrastructure Software Arbitrary File Write Vulnerability
A vulnerability in Cisco Enterprise Network Functions Virtualization Infrastructure Software (NFVIS) could allow an authenticated, remote attacker with administrator privileges to overwrite files on the underlying operating system (OS) of an affected device. The vulnerability is due to improper input validation in an NFVIS file-system command. An attacker could exploit this vulnerability by using crafted variables during the execution of an affected command. A successful exploit could allow the attacker to overwrite arbitrary files on the underlying OS. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-nfv-filewrite ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-nfv-filewrite"]
[]
null
null
6.5
null
GHSA-x785-m5vp-jc3c
The report-generation web interface in the Solution Engine in Cisco Secure Access Control Server (ACS) 5.7(0.15) allows remote authenticated users to bypass intended RBAC restrictions, and read report or status information, by visiting an unspecified web page.
[]
null
null
null
null
CVE-2019-3811
A vulnerability was found in sssd. If a user was configured with no home directory set, sssd would return '/' (the root directory) instead of '' (the empty string / no home directory). This could impact services that restrict the user's filesystem access to within their home directory through chroot() etc. All versions before 2.1 are vulnerable.
[ "cpe:2.3:a:fedoraproject:sssd:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:-:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" ]
null
null
4.1
null
RHSA-2024:0247
Red Hat Security Advisory: OpenJDK 21.0.2 security update
OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547)
[ "cpe:/a:redhat:openjdk:21" ]
null
7.4
null
null
CVE-2012-2926
Atlassian JIRA before 5.0.1; Confluence before 3.5.16, 4.0 before 4.0.7, and 4.1 before 4.1.10; FishEye and Crucible before 2.5.8, 2.6 before 2.6.8, and 2.7 before 2.7.12; Bamboo before 3.3.4 and 3.4.x before 3.4.5; and Crowd before 2.0.9, 2.1 before 2.1.2, 2.2 before 2.2.9, 2.3 before 2.3.7, and 2.4 before 2.4.1 do not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.
[ "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:confluence:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*" ]
null
9.1
null
6.4
CVE-2019-11137
Insufficient input validation in system firmware for Intel(R) Xeon(R) Scalable Processors, Intel(R) Xeon(R) Processors D Family, Intel(R) Xeon(R) Processors E5 v4 Family, Intel(R) Xeon(R) Processors E7 v4 Family and Intel(R) Atom(R) processor C Series may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.
[ "cpe:2.3:o:intel:xeon_platinum_8253_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8256_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8260_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8276_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8276m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8276m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8276l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8280l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8260l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8280m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8280m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8260m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8260m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8280_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8260y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8268_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8270_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8274_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8274:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8284_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8284:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_9242_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_9282_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8153_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8156_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8158_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8176_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8160_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8164_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8168_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8170_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8180_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8160t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8160f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8176f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6210u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6244_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6212u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6240_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5218_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6230_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5222_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6238t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6248_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6252_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6242_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6240y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5217_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6238m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6238m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5218n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6226_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6254_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5220_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6238l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5218b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6240l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6238_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6240m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6240m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5220s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5215_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6222v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6252n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5215m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5215m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6246_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5215l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5218t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5220t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6209u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6262v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5122_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6138_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6148_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5120t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6136_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6152_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6128_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5118_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6134_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6126_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5120_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5115_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6154_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6140_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6140m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6140m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6132_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6138t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6142f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6130t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6138f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6130f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6126t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6126f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6148f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6146_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6144_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4209t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4214_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4214y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4215_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4208_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4216_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4116_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4109t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4114_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4112_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4108_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4110_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_bronze_3204_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_bronze_3106_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_bronze_3104_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1602_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1653n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1622_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1623n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1627_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1637_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1633n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1649n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2191_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2191:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1533n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1513n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1543n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1523n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1553n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1539_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1529_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1559_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1557_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1567_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1577_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1528_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1541_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1518_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1521_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1531_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1548_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1527_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1537_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1520_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1540_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2699a_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2699a_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4627_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4627_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4610_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4610_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4620_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4620_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4628l_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4628l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4660_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4660_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4640_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4640_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4669_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4669_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4667_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4667_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4655_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4655_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4650_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4650_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1660_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1660_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1630_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1630_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1620_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1620_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1680_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1680_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1650_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1650_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2687w_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2687w_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2695_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2695_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2690_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2690_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2699_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2699_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2650l_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2650l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2658_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2658_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2698_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2698_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2660_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2660_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2680_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2680_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2697_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2697_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2683_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2683_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2628l_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2628l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2650_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2650_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2697a_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2697a_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2648l_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2648l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2620_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2620_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2630l_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2630l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2608l_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2608l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2667_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2667_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2643_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2643_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2623_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2623_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2609_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2609_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2630_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2630_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2618l_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2618l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2637_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2637_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2603_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2603_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2640_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2640_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8894_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8894_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8893_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8893_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8891_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8891_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8890_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8890_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8880_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8880_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8870_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8870_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8867_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8867_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8860_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8860_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4850_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4850_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4830_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4830_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4820_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4820_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4809_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4809_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3308_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3308:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3336_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3336:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3338_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3338:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3508_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3508:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3538_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3538:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3558_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3558:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3708_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3708:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3750_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3750:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3758_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3758:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3808_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3808:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3850:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3858_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3858:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3830_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3830:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3950_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3950:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3955_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3955:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3958_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3958:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c2758_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c2758:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c2738_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c2738:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c2718_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c2718:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c2558_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c2558:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c2538_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c2538:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c2518_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c2518:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c2508_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c2508:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c2358_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c2358:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c2338_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c2338:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c2308_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c2308:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c2750_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c2750:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c2730_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c2730:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c2550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c2550:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c2530_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c2530:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c2516_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c2516:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c2350_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c2350:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c2316_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c2316:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:apollo_4200_gen10_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_bl460c_gen10_server_blade_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_dl580_gen10_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_dl560_gen10_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_dl380_gen10_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_dl360_gen10_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_dl180_gen10_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_dl160_gen10_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_dl120_gen10_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_ml350_gen10_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_ml110_gen10_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_xl450_gen10_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_xl270d_gen10_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_xl230k_gen10_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_xl190r_gen10_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_xl170r_gen10_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_e910_server_blade_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:synergy_660_gen10_compute_module_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:synergy_660_gen10_compute_module:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:synergy_480_gen10_compute_module_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:synergy_480_gen10_compute_module:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_bl660c_gen9_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_bl660c_gen9_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_bl460c_gen9_server_blade_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_bl460c_gen9_server_blade:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_dl580_gen9_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_dl580_gen9_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_dl560_gen9_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_dl560_gen9_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_dl380_gen9_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_dl380_gen9_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_dl360_gen9_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_dl360_gen9_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_dl180_gen9_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_dl180_gen9_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_dl160_gen9_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_dl160_gen9_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_dl120_gen9_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_dl120_gen9_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_dl80_gen9_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_dl80_gen9_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_dl60_gen9_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_dl60_gen9_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_xl730f_gen9_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_xl730f_gen9_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_xl450_gen9_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_xl450_gen9_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_xl250a_gen9_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_xl250a_gen9_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_xl230a_gen9_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_xl230a_gen9_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_xl190r_gen9_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_xl190r_gen9_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_xl170r_gen9_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_xl170r_gen9_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:synergy_680_gen9_compute_module_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:synergy_680_gen9_compute_module:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:synergy_620_gen9_compute_module_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:synergy_620_gen9_compute_module:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:synergy_480_gen9_compute_module_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:synergy_480_gen9_compute_module:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_ml150_gen9_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_ml150_gen9_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_ml110_gen9_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_ml110_gen9_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:apollo_4200_gen9_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:apollo_4200_gen9_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_ml350_gen9_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_ml350_gen9_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:proliant_ws460c_gen9_graphics_server_blade_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_ws460c_gen9_graphics_server_blade:-:*:*:*:*:*:*:*" ]
null
8.2
null
4.6
CVE-2020-25727
The Reset Password add-on before 1.2.0 for Alfresco suffers from CMIS-SQL Injection, which allows a malicious user to inject a query within the email input field.
[ "cpe:2.3:a:flexsolution:reset_password:*:*:*:*:*:alfresco:*:*" ]
null
7.5
null
5
CVE-2017-9684
In all Qualcomm products with Android releases from CAF using the Linux kernel, a race condition in a USB driver can lead to a Use After Free condition.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
7
7.6
CVE-2020-26625
A SQL injection vulnerability was discovered in Gila CMS 1.15.4 and earlier which allows a remote attacker to execute arbitrary web scripts via the 'user_id' parameter after the login portal.
[ "cpe:2.3:a:gilacms:gila_cms:*:*:*:*:*:*:*:*" ]
null
3.8
null
null
GHSA-gcgc-85pr-q5j6
A vulnerability was found in Fancy Gallery Plugin 1.5.12. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file class.options.php of the component Options Page. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.5.13 is able to address this issue. The name of the patch is fdf1f9e5a1ec738900f962e69c6fa4ec6055ed8d. It is recommended to upgrade the affected component. The identifier VDB-225349 was assigned to this vulnerability.
[]
null
6.1
null
null
RHSA-2024:3270
Red Hat Security Advisory: sssd security update
sssd: Race condition during authorization leads to GPO policies functioning inconsistently
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.1
null
null
GHSA-c33c-6hj9-gf9j
Use After Free in GitHub repository vim/vim prior to 9.0.0359.
[]
null
7.8
null
null
CVE-2021-47395
mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap
In the Linux kernel, the following vulnerability has been resolved: mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap Limit max values for vht mcs and nss in ieee80211_parse_tx_radiotap routine in order to fix the following warning reported by syzbot: WARNING: CPU: 0 PID: 10717 at include/net/mac80211.h:989 ieee80211_rate_set_vht include/net/mac80211.h:989 [inline] WARNING: CPU: 0 PID: 10717 at include/net/mac80211.h:989 ieee80211_parse_tx_radiotap+0x101e/0x12d0 net/mac80211/tx.c:2244 Modules linked in: CPU: 0 PID: 10717 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:ieee80211_rate_set_vht include/net/mac80211.h:989 [inline] RIP: 0010:ieee80211_parse_tx_radiotap+0x101e/0x12d0 net/mac80211/tx.c:2244 RSP: 0018:ffffc9000186f3e8 EFLAGS: 00010216 RAX: 0000000000000618 RBX: ffff88804ef76500 RCX: ffffc900143a5000 RDX: 0000000000040000 RSI: ffffffff888f478e RDI: 0000000000000003 RBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000000100 R10: ffffffff888f46f9 R11: 0000000000000000 R12: 00000000fffffff8 R13: ffff88804ef7653c R14: 0000000000000001 R15: 0000000000000004 FS: 00007fbf5718f700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2de23000 CR3: 000000006a671000 CR4: 00000000001506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: ieee80211_monitor_select_queue+0xa6/0x250 net/mac80211/iface.c:740 netdev_core_pick_tx+0x169/0x2e0 net/core/dev.c:4089 __dev_queue_xmit+0x6f9/0x3710 net/core/dev.c:4165 __bpf_tx_skb net/core/filter.c:2114 [inline] __bpf_redirect_no_mac net/core/filter.c:2139 [inline] __bpf_redirect+0x5ba/0xd20 net/core/filter.c:2162 ____bpf_clone_redirect net/core/filter.c:2429 [inline] bpf_clone_redirect+0x2ae/0x420 net/core/filter.c:2401 bpf_prog_eeb6f53a69e5c6a2+0x59/0x234 bpf_dispatcher_nop_func include/linux/bpf.h:717 [inline] __bpf_prog_run include/linux/filter.h:624 [inline] bpf_prog_run include/linux/filter.h:631 [inline] bpf_test_run+0x381/0xa30 net/bpf/test_run.c:119 bpf_prog_test_run_skb+0xb84/0x1ee0 net/bpf/test_run.c:663 bpf_prog_test_run kernel/bpf/syscall.c:3307 [inline] __sys_bpf+0x2137/0x5df0 kernel/bpf/syscall.c:4605 __do_sys_bpf kernel/bpf/syscall.c:4691 [inline] __se_sys_bpf kernel/bpf/syscall.c:4689 [inline] __x64_sys_bpf+0x75/0xb0 kernel/bpf/syscall.c:4689 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x4665f9
[]
null
null
null
null
CVE-2021-37544
In JetBrains TeamCity before 2020.2.4, there was an insecure deserialization.
[ "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-xwxh-r5pc-7pp9
Heap-based buffer overflow in Google Chrome before 17.0.963.56 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted Matroska video (aka MKV) file.
[]
null
null
null
null
GHSA-h6q7-7vwg-44hq
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Wp Enhanced Free Downloads EDD allows DOM-Based XSS. This issue affects Free Downloads EDD: from n/a through 1.0.4.
[]
null
6.5
null
null
GHSA-33pg-m6jh-5237
Docker Swarm encrypted overlay network traffic may be unencrypted
[Moby](https://mobyproject.org/) is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as [moby/moby](https://github.com/moby/moby) is commonly referred to as *Docker*.Swarm Mode, which is compiled in and delivered by default in `dockerd` and is thus present in most major Moby downstreams, is a simple, built-in container orchestrator that is implemented through a combination of [SwarmKit](https://github.com/moby/swarmkit) and supporting network code.The `overlay` network driver is a core feature of Swarm Mode, providing isolated virtual LANs that allow communication between containers and services across the cluster. This driver is an implementation/user of [VXLAN](https://en.wikipedia.org/wiki/Virtual_Extensible_LAN), which encapsulates link-layer (Ethernet) frames in UDP datagrams that tag the frame with a VXLAN Network ID (VNI) that identifies the originating overlay network. In addition, the overlay network driver supports an optional, off-by-default encrypted mode, which is especially useful when VXLAN packets traverses an untrusted network between nodes.Encrypted overlay networks function by encapsulating the VXLAN datagrams through the use of the [IPsec Encapsulating Security Payload](https://en.wikipedia.org/wiki/IPsec#Encapsulating_Security_Payload) protocol in [Transport mode](https://en.wikipedia.org/wiki/IPsec#Transport_mode). By deploying IPSec encapsulation, encrypted overlay networks gain the additional properties of source authentication through cryptographic proof, data integrity through check-summing, and confidentiality through encryption.When setting an endpoint up on an encrypted overlay network, Moby installs three [iptables](https://www.netfilter.org/projects/iptables/index.html) (Linux kernel firewall) rules that enforce both incoming and outgoing IPSec. These rules rely on the `u32` iptables extension provided by the `xt_u32` kernel module to directly filter on a VXLAN packet's VNI field, so that IPSec guarantees can be enforced on encrypted overlay networks without interfering with other overlay networks or other users of VXLAN.An [iptables rule](https://github.com/moby/libnetwork/blob/d9fae4c73daf76c3b0f77e14b45b8bf612ba764d/drivers/overlay/encryption.go#L205-L207) designates outgoing VXLAN datagrams with a VNI that corresponds to an encrypted overlay network for IPsec encapsulation.On Red Hat Enterprise Linux and derivatives such as CentOS and Rocky, the `xt_u32` module has been:[moved to the kernel-modules-extra package and no longer installed by default in RHEL 8.3](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/rhel-8-3-0-release#technology-preview_networking)[officially deprecated in RHEL 8.6](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/deprecated_functionality#deprecated-functionality_networking)[removed completely in RHEL 9](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/considerations_in_adopting_rhel_9/assembly_networking_considerations-in-adopting-rhel-9#ref_firewall-networking_assembly_networking)This rule is not created when `xt_u32` is unavailable, even though the container is still attached to the network.ImpactEncrypted overlay networks on affected platforms silently transmit unencrypted data. As a result, `overlay` networks may appear to be functional, passing traffic as expected, but without any of the expected confidentiality or data integrity guarantees.It is possible for an attacker sitting in a trusted position on the network to read all of the application traffic that is moving across the overlay network, resulting in unexpected secrets or user data disclosure. Thus, because many database protocols, internal APIs, etc. are not protected by a second layer of encryption, a user may rely on Swarm encrypted overlay networks to provide confidentiality, which due to this vulnerability is no longer guaranteed.PatchesPatches are available in Moby releases 23.0.3, and 20.10.24. As Mirantis Container Runtime's 20.10 releases are numbered differently, users of that platform should update to 20.10.16.WorkaroundsClose the VXLAN port (by default, UDP port 4789) to outgoing traffic at the Internet boundary (see [GHSA-vwm3-crmr-xfxw](https://github.com/moby/moby/security/advisories/GHSA-vwm3-crmr-xfxw)) in order to prevent unintentionally leaking unencrypted traffic over the Internet.Ensure that the `xt_u32` kernel module is available on all nodes of the Swarm cluster.Background[#43382 ](https://github.com/moby/moby/issues/43382)partially discussed this concern, but did not consider the security implications.Mirantis FIELD-5788 essentially duplicates [#43382](https://github.com/moby/moby/issues/43382), and was created six months earlier; it similarly overlooked the security implications.[#45118](https://github.com/moby/moby/pull/45118) is the ancestor of the final patches, and was where the security implications were discovered.Related[CVE-2023-28840: Encrypted overlay network may be unauthenticated](https://github.com/moby/moby/security/advisories/GHSA-232p-vwff-86mp)[CVE-2023-28842: Encrypted overlay network with a single endpoint is unauthenticated](https://github.com/moby/moby/security/advisories/GHSA-6wrf-mxfj-pf5p)[GHSA-vwm3-crmr-xfxw: The Swarm VXLAN port may be exposed to attack due to ambiguous documentation](https://github.com/moby/moby/security/advisories/GHSA-vwm3-crmr-xfxw)[GHSA-gvm4-2qqg-m333: Security issues in encrypted overlay networks](https://github.com/moby/libnetwork/security/advisories/GHSA-gvm4-2qqg-m333) (libnetwork)
[]
null
6.8
null
null
CVE-2010-0375
SQL injection vulnerability in product_list.php in JCE-Tech PHP Calendars, downloaded 2010-01-11, allows remote attackers to execute arbitrary SQL commands via the cat parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:jce-tech:php_calendars_script:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
RHSA-2024:3576
Red Hat Security Advisory: Red Hat build of Keycloak 24.0.5 Images enhancement and security update
keycloak: exposure of sensitive information in Pushed Authorization Requests (PAR) KC_RESTART cookie
[ "cpe:/a:redhat:build_keycloak:24::el9" ]
null
7.5
null
null
CVE-2024-4871
Foreman: host ssh key not being checked in remote execution
A vulnerability was found in Satellite. When running a remote execution job on a host, the host's SSH key is not being checked. When the key changes, the Satellite still connects it because it uses "-o StrictHostKeyChecking=no". This flaw can lead to a man-in-the-middle attack (MITM), denial of service, leaking of secrets the remote execution job contains, or other issues that may arise from the attacker's ability to forge an SSH key. This issue does not directly allow unauthorized remote execution on the Satellite, although it can leak secrets that may lead to it.
[ "cpe:/a:redhat:satellite_capsule:6.15::el8", "cpe:/a:redhat:satellite:6.15::el8", "cpe:/a:redhat:satellite_utils:6.15::el8" ]
null
6.8
null
null
CVE-2021-33750
Windows DNS Snap-in Remote Code Execution Vulnerability
Windows DNS Snap-in Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2061:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2061:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2061:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2061:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1679:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1679:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1679:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1110:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1110:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1110:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1110:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1110:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1110:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1110:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1110:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19003:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19003:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4530:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:6.1.7601.25661:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_7:6.1.7601.25661:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20069:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20069:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20069:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21167:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21167:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008_r2:6.1.7601.25661:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23409:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20069:*:*:*:*:*:x64:*" ]
null
8.8
null
null
GHSA-4gq7-5cc3-mw48
A NoSQL injection vulnerability has been identified in the listEmojiCustom method call within Rocket.Chat. This can be exploited by unauthenticated users when there is at least one custom emoji uploaded to the Rocket.Chat instance. The vulnerability causes a delay in the server response, with the potential for limited impact.
[]
null
5.3
null
null
CVE-2022-30557
Foxit PDF Reader and PDF Editor before 11.2.2 have a Type Confusion issue that causes a crash because of Unsigned32 mishandling during JavaScript execution.
[ "cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2014-0803
Directory traversal vulnerability in the tetra filer application 2.3.1 and earlier for Android 4.0.3, tetra filer free application 2.3.1 and earlier for Android 4.0.3, tetra filer application 1.5.1 and earlier for Android before 4.0.3, and tetra filer free application 1.5.1 and earlier for Android before 4.0.3 allows attackers to overwrite or create arbitrary files via unspecified vectors.
[ "cpe:2.3:a:yuichiro_okuyama:tetra_filer:*:-:-:*:-:android:*:*", "cpe:2.3:a:yuichiro_okuyama:tetra_filer_free:*:-:-:*:-:android:*:*", "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*" ]
null
null
null
5.8
CVE-2011-3374
It was found that apt-key in apt, all versions, do not correctly validate gpg keys with the master keyring, leading to a potential man-in-the-middle attack.
[ "cpe:2.3:a:debian:advanced_package_tool:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
3.7
null
4.3
GHSA-xgmx-762m-r89c
PHPMyChat 0.14.5 does not remove or protect setup.php3 after installation, which allows attackers to obtain sensitive information including database passwords via a direct request.
[]
null
null
null
null
GHSA-r94j-grrx-5v8c
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[]
null
4.9
null
null
CVE-2017-6223
Ruckus Wireless Zone Director Controller firmware releases ZD9.9.x, ZD9.10.x, ZD9.13.0.x less than 9.13.0.0.232 contain OS Command Injection vulnerabilities in the ping functionality that could allow local authenticated users to execute arbitrary privileged commands on the underlying operating system.
[ "cpe:2.3:o:ruckus:zonedirector_firmware:zd9.9.0.0.205:*:*:*:*:*:*:*", "cpe:2.3:o:ruckus:zonedirector_firmware:zd9.9.0.0.212:*:*:*:*:*:*:*", "cpe:2.3:o:ruckus:zonedirector_firmware:zd9.9.0.0.216:*:*:*:*:*:*:*", "cpe:2.3:o:ruckus:zonedirector_firmware:zd9.10.0.0.218:*:*:*:*:*:*:*", "cpe:2.3:o:ruckus:zonedirector_firmware:zd9.13.0.0.103:*:*:*:*:*:*:*", "cpe:2.3:o:ruckus:zonedirector_firmware:zd9.13.0.0.209:*:*:*:*:*:*:*", "cpe:2.3:h:ruckus:zonedirector:-:*:*:*:*:*:*:*" ]
null
null
8.8
9.3
CVE-2023-47679
WordPress Qi Addons For Elementor plugin <= 1.6.3 - Local File Inclusion vulnerability
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in QODE Interactive Qi Addons For Elementor allows PHP Local File Inclusion.This issue affects Qi Addons For Elementor: from n/a through 1.6.3.
[ "cpe:2.3:a:qodeinteractive:qi_addons_for_elementor:*:*:*:*:*:wordpress:*:*" ]
null
6.4
null
null
GHSA-v89w-v9jm-g4f3
A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 10.1.3.37598. A specially crafted PDF document can trigger the reuse of previously free memory, which can lead to arbitrary code execution. An attacker needs to trick the user into opening a malicious file or site to trigger this vulnerability if the browser plugin extension is enabled.
[]
null
7.8
null
null
GHSA-xq2x-gx2h-74r3
src/unit_test.c in gpsdrive (aka gpsdrive-scripts) 2.10~pre4 might allow local users to overwrite arbitrary files via a symlink attack on the /tmp/gpsdrive-unit-test/proc temporary file, a different vector than CVE-2008-4959 and CVE-2008-5380.
[]
null
null
null
null
GHSA-f47h-66wf-9744
Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin before 2.6.4 allow remote attackers to inject arbitrary web script or HTML via (1) the Username to libraries/auth/cookie.auth.lib.php or (2) the error parameter to error.php.
[]
null
null
null
null
RHSA-2016:1991
Red Hat Security Advisory: Red Hat Enterprise Linux 5.6 Advanced Mission Critical (AMC) Six-Month Notice
This is the Six-Month notification for the retirement of Red Hat Enterprise Linux 5.6 Advanced Mission Critical (AMC). This notification applies only to those customers subscribed to the Advanced Mission Critical (AMC) channel for Red Hat Enterprise Linux 5.6.
[ "cpe:/o:redhat:rhel_mission_critical:5.6" ]
null
null
null
null
GHSA-mpvh-q2vr-ww2x
The Maintenance Page plugin for WordPress is vulnerable to Basic Information Exposure in all versions up to, and including, 1.0.8 via the REST API. This makes it possible for unauthenticated attackers to view post titles and content when the site is in maintenance mode.
[]
null
5.3
null
null
CVE-2021-31805
Forced OGNL evaluation, when evaluated on raw not validated user input in tag attributes, may lead to RCE.
The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation.
[ "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-482h-p7c2-hcgc
Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1731, CVE-2015-1737, and CVE-2015-1755.
[]
null
null
null
null
CVE-2025-3521
Team Members – Best WordPress Team Plugin with Team Slider, Team Showcase & Team Builder <= 3.4.0 - Authenticated (Contributor+) Stored Cross-Site Scripting
The Team Members – Best WordPress Team Plugin with Team Slider, Team Showcase & Team Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Social Link icons in all versions up to, and including, 3.4.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
GHSA-5m6r-6p2x-4hr9
Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects DC112A before 1.0.0.52, R6400 before 1.0.1.68, RAX200 before 1.0.3.106, WNDR3400v3 before 1.0.1.38, XR300 before 1.0.3.68, R8500 before 1.0.2.144, RAX75 before 1.0.3.106, R8300 before 1.0.2.144, and RAX80 before 1.0.3.106.
[]
null
null
null
null
GHSA-p8c5-57m9-rp9f
A logic issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.6.8, macOS Monterey 12.5, Security Update 2022-005 Catalina. An archive may be able to bypass Gatekeeper.
[]
null
7.5
null
null
CVE-2024-43938
WordPress Name Directory plugin <= 1.29.0 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Jeroen Peters Name Directory allows Reflected XSS.This issue affects Name Directory: from n/a through 1.29.0.
[]
null
6.5
null
null
GHSA-vwf4-cwv7-v664
An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. The file-upload endpoint does not enforce authentication. Attackers can send an unauthenticated HTTP request to upload a custom firmware component, possibly in conjunction with command injection, to achieve arbitrary code execution.
[]
null
null
null
null
CVE-2013-2341
Unspecified vulnerability on the HP ProCurve JC###A, JC###B, JD###A, JD###B, JE###A, JF###A, JF###B, JF###C, JG###A, 658250-B21, and 658247-B21; HP 3COM routers and switches; and HP H3C routers and switches allows remote authenticated users to execute arbitrary code or obtain sensitive information via unknown vectors.
[ "cpe:2.3:h:hp:3com_baseline_plus_switch:2900:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_baseline_plus_switch:2900g:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_baseline_plus_switch:2900g-28hpwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_baseline_plus_switch:2900g-28pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:3012:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:3013:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:3016:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:3018:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:3036:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:3040:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:3041:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:5009:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:5012:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:5231:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:5232:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:5640:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:5642:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:5642_taa:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:5680:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:5682:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:6040:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:6080:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:jg005a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_router:ss4_5500g-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4200g:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4200g-ntg:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4200g_pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4210:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4210-24g:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4210-48g:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4210_pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4210_pwr_9p_taa:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4500:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4500_pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4510g:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4510g_pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:4800g:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:5500g-ei_sfp:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:e4210-24g-poe:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:e4510-24g:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:ss4_5500-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:ss4_5500-ei-pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:ss4_5500-si:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:ss4_5500g-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:ss4_5500g-ei-pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch:ss4_switch_5500g-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch_taa_compliant:5500g-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch_taa_compliant:5500g-ei-pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_switch_taa_compliant:5500g-ei-sfp:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3com_taa_switch:5500-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5500-28c-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5500-28c-ei-dc:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5500-28c-pwr-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5500-28c-pwr-si:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5500-28c-si:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5500-28f-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5500-52c-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5500-52c-pwr-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5500-52c-pwr-si:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5500-52c-si:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5600-26c:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5600-26c-pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5600-26f:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5600-50c:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s5600-50c-pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s7502e:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s7503e:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s7503e-s:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s7506e:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s7506e-v:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_ethernet_switch:s7510e:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_high_performance_main_processing_unit:msr_50_3ge:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_processing_module:msr_50_g2:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_processor_module:msr_50:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-10:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-11:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-12:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-12_t1:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-13:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-13_w:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-15:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-15_a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-15_a_w:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-15_iw:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-20:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-21:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_20-40:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_30-10:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_30-20:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_30-20_poe:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_30-20_rtvz33020as:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_30-40:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_30-40_poe:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_30-60:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_30-60_poe:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_50-40:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_50-60:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_900:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_920:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_3010:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_3016:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr_3016_poe:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:msr5040-dc-ovs-h3c:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2011-ac-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2012-ac-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2012-ac-ovs-s-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2012-ac-ovs-w-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2012-t-ac-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2013-ac-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2013-ac-ovs-w-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2015-ac-ovs-a-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2015-ac-ovs-aw-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2015-ac-ovs-i-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2015-ac-ovs-iw-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2020-ac-ovs-h3c:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2040-ac-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr2040-ac-ovs-h3c:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3011-ac-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3016-ac-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3016-ac-poe-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3020-ac-poe-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3020-dc-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3040-ac-ovs-as-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3040-ac-ovs-h:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3040-ac-poe-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3060-ac-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3060-ac-poe-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr3060-dc-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:rt-msr5060-ac-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:sr_20-12_w:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:sr8802:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:sr8805:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:sr8808:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_router:sr8812:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_routing_switch:s9505e:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_routing_switch:s9508e-v:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_routing_switch:s9512e:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_routing_switch:s12508:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_routing_switch:s12518:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3100-8c-si_ls-s3100-8c-si-ac-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3100-8c-si_ls-s3100-8c-si-dc-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3100-8t-si_ls-s3100-8t-si-ac-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3100-16c-si_ls-s3100-16c-si-ac-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3100-16c-si_ls-s3100-16c-si-dc-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3100-16t-si_ls-s3100-16t-si-ac-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3100-26c-si_ls-s3100-26c-si-ac-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3100-26c-si_ls-s3100-26c-si-dc-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3100-26t-si_ls-s3100-26t-si-ac-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3100-52p_ls-3100-52p-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3600-28f-ei_ls-3600-28f-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3600-28p-ei_ls-3600-28p-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3600-28p-pwr-ei_ls-3600-28p-pwr-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3600-28p-pwr-si_ls-3600-28p-pwr-si-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3600-28p-si_ls-3600-28p-si-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3600-28tp-si_ls-3600-28tp-si-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3600-52p-ei_ls-3600-52p-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3600-52p-pwr-ei_ls-3600-52p-pwr-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3600-52p-pwr-si_ls-3600-52p-pwr-si-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3600-52p-si_ls-3600-52p-si-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3610-28f_ls-3610-28f-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3610-28p_ls-3610-28p-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3610-28tp_ls-3610-28tp-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s3610-52p_ls-3610-52p-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-8p-ei_ls-5100-8p-ei-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-8p-pwr-ei_ls-5100-8p-pwr-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-8p-si_ls-5100-8p-si-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-16p-ei_ls-5100-16p-ei-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-16p-pwr-ei_ls-5100-16p-pwr-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-16p-si_ls-5100-16p-si-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-24p-ei_ls-5100-24p-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-24p-si_ls-5100-24p-si-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-26c-ei_ls-5100-26c-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-26c-pwr-ei_ls-5100-26c-pwr-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-48p-ei_ls-5100-48p-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-48p-si_ls-5100-48p-si-ovs-h3:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-50c-ei_ls-5100-50c-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5100-50c-pwr-ei_ls-5100-50c-pwr-ei-ovs:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-20p-si:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-24p-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-28c-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-28c-pwr-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-28p-hpwr-si:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-28p-pwr-si:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-28p-si:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-48p-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-52c-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-52c-pwr-ei:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5120-52p-si:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5800-32c:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5800-32c-pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5800-32f:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5800-56c:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5800-56c-pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5800-60c-pwr:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5820x-28c:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s5820x-28s:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s7502e:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s7503e:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s7503e-s:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s7506e:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s7506e-v:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s9505e:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s9508e-v:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s12508:*:*:*:*:*:*:*", "cpe:2.3:h:hp:h3c_switch:s12518:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jc147a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jc147b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jc148a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jc148b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jc149a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jc149b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jc150a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jc150b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd429b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd431a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd432a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd433a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd653a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd655a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd656a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd662a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd663a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd663b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd664a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd916a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd917a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd918a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd921a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd922a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd923a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd935a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd943a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd944a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd945a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd946a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd967a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jd972a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf182a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf183a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf184a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf228a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf229a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf230a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf231a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf233a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf234a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf235a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf236a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf237a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf238a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf239a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf240a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf241a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf283a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf284a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf285a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf287a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf640a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf800a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf801a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf802a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf803a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf804a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf806a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf807a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf808a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf809a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf812a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf813a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf814a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf815a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf816a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_router:jf817a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:658247-b21:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:658250-b21:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc085a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc086a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc099a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc100a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc101a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc102a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc103a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc104a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc105a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc106a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc124a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc124b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc125a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc125b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc474a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc474b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc611a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc612a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc613a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc652a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc653a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc654a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc655a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc691a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc694a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jc748a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd007a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd008a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd009a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd010a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd011a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd238a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd238b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd239a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd239b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd240a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd240b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd241a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd241b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd242a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd242b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd243a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd243b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd302a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd303a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd304a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd305a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd306a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd307a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd308a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd309a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd310a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd313b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd317a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd318b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd319b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd320b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd325a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd326a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd327a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd328a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd329a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd330a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd331a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd332a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd333a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd334a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd335a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd336a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd337a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd338a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd344a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd345a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd346a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd347a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd348a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd349a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd350a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd351a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd352a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd353a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd354a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd355a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd356a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd357a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd369a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd370a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd371a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd372a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd373a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd374a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd375a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd376a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd377a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd378a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd379a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd391a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd392a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd393a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd394a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jd395a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je005a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je006a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je007a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je008a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je009a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je015a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je016a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je017a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je018a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je019a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je020a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je021a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je022a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je023a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je024a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je025a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je026a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je027a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je028a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je029a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je030a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je031a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je032a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je033a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je045a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je046a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je047a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je048a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je066a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je067a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je068a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je069a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je070a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je071a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je072a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je073a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je074a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je088a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je089a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je090a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je091a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je092a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je093a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je094a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je095a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je096a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je097a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je099a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je100a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je101a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je102a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je104a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je105a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je106a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je107a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je108a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je109a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je110a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je164a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je165a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je166a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je167a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je168a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:je169a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf427a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf428a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf430a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf430b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf430c:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf431a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf431b:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf431c:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf551a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf552a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf553a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf844a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf845a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf846a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jf847a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg091a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg092a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg219a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg221a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg222a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg223a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg225a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg236a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg237a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg238a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg239a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg240a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg241a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg242a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg243a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg245a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg246a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg247a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg248a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg249a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg250a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg251a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg252a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg253a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg254a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg255a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg256a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg257a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg258a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg259a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg299a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg300a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg301a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg302a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg303a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg304a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg305a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg306a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg307a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg311a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg312a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg315a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg316a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg348a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg349a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg350a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch:jg374a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:vpn_firewall_appliance:jd270a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:vpn_firewall_appliance:jd271a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:vpn_firewall_appliance:jg213a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:vpn_firewall_appliance:jg214a:*:*:*:*:*:*:*" ]
null
null
null
7.1
GHSA-gjgf-fgq7-f6p3
Stack-based buffer overflow in rping in HP OpenView Network Node Manager (OV NNM) 7.53 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, possibly involving a CGI request to webappmon.exe. NOTE: this may overlap CVE-2009-1420.
[]
null
null
null
null
GHSA-7m22-9mw3-j4pp
In affected libpcap versions during the setup of a remote packet capture the internal function sock_initaddress() calls getaddrinfo() and possibly freeaddrinfo(), but does not clearly indicate to the caller function whether freeaddrinfo() still remains to be called after the function returns. This makes it possible in some scenarios that both the function and its caller call freeaddrinfo() for the same allocated memory block. A similar problem was reported in Apple libpcap, to which Apple assigned CVE-2023-40400.
[]
null
4.4
null
null
CVE-2005-2515
Quartz Composer Screen Saver in Mac OS X 10.4.2 allows local users to access links from the RSS Visualizer even when a password is required.
[ "cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*" ]
null
null
null
4.6
GHSA-j7fp-qw4v-74mr
Pointsec before 1.2 for PalmOS stores a user's PIN number in memory in plaintext, which allows a local attacker who steals an unlocked Palm to retrieve the PIN by dumping memory.
[]
null
null
null
null
CVE-2014-4881
The PartyTrack library for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:partytrack_library_project:partytrack_library:-:*:*:*:*:android:*:*" ]
null
null
null
5.4
CVE-2025-49868
WordPress Automation By Autonami plugin <= 3.6.0 - Open Redirection Vulnerability
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FunnelKit Automation By Autonami allows Phishing. This issue affects Automation By Autonami: from n/a through 3.6.0.
[]
null
4.7
null
null