id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
RHSA-2025:0423 | Red Hat Security Advisory: java-17-openjdk security update for RHEL 9.0 and 9.2 | openjdk: Enhance array handling (Oracle CPU 2025-01) | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 4.8 | null | null |
GHSA-ccc7-4g5p-rggh | Buffer overflow in AIX lchangelv gives root access. | [] | null | null | null | null |
|
GHSA-x687-p66q-w3j2 | The TAR file parser in AVG Anti-Virus 10.0.0.1190, Quick Heal (aka Cat QuickHeal) 11.00, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, and Trend Micro HouseCall 9.120.0.1004 allows remote attackers to bypass malware detection via a TAR file with an appended ZIP file. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations. | [] | null | null | null | null |
|
CVE-2020-35722 | CSRF in Web Compliance Manager in Quest Policy Authority 8.1.2.200 allows remote attackers to force user modification/creation via a specially crafted link to the submitUser.jsp file. NOTE: This vulnerability only affects products that are no longer supported by the maintainer | [
"cpe:2.3:a:quest:policy_authority_for_unified_communications:8.1.2.200:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
GHSA-wv37-wm2q-wh29 | Multiple cross-site scripting (XSS) vulnerabilities in WikiTimeScale TwoZero before 2.31 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors in the (1) forum module and (2) event descriptions. NOTE: some of these details are obtained from third party information. | [] | null | null | null | null |
|
CVE-2022-20108 | In voice service, there is a possible out of bounds write due to a stack-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330702; Issue ID: DTV03330702. | [
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9215:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:*"
] | null | 6.7 | null | 4.6 |
|
CVE-2021-47584 | iocost: Fix divide-by-zero on donation from low hweight cgroup | In the Linux kernel, the following vulnerability has been resolved:
iocost: Fix divide-by-zero on donation from low hweight cgroup
The donation calculation logic assumes that the donor has non-zero
after-donation hweight, so the lowest active hweight a donating cgroup can
have is 2 so that it can donate 1 while keeping the other 1 for itself.
Earlier, we only donated from cgroups with sizable surpluses so this
condition was always true. However, with the precise donation algorithm
implemented, f1de2439ec43 ("blk-iocost: revamp donation amount
determination") made the donation amount calculation exact enabling even low
hweight cgroups to donate.
This means that in rare occasions, a cgroup with active hweight of 1 can
enter donation calculation triggering the following warning and then a
divide-by-zero oops.
WARNING: CPU: 4 PID: 0 at block/blk-iocost.c:1928 transfer_surpluses.cold+0x0/0x53 [884/94867]
...
RIP: 0010:transfer_surpluses.cold+0x0/0x53
Code: 92 ff 48 c7 c7 28 d1 ab b5 65 48 8b 34 25 00 ae 01 00 48 81 c6 90 06 00 00 e8 8b 3f fe ff 48 c7 c0 ea ff ff ff e9 95 ff 92 ff <0f> 0b 48 c7 c7 30 da ab b5 e8 71 3f fe ff 4c 89 e8 4d 85 ed 74 0
4
...
Call Trace:
<IRQ>
ioc_timer_fn+0x1043/0x1390
call_timer_fn+0xa1/0x2c0
__run_timers.part.0+0x1ec/0x2e0
run_timer_softirq+0x35/0x70
...
iocg: invalid donation weights in /a/b: active=1 donating=1 after=0
Fix it by excluding cgroups w/ active hweight < 2 from donating. Excluding
these extreme low hweight donations shouldn't affect work conservation in
any meaningful way. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2009-1307 | The view-source: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not properly implement the Same Origin Policy, which allows remote attackers to (1) bypass crossdomain.xml restrictions and connect to arbitrary web sites via a Flash file; (2) read, create, or modify Local Shared Objects via a Flash file; or (3) bypass unspecified restrictions and render content via vectors involving a jar: URI. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9_rc:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.6:*:linux:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0beta5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2018-4205 | An issue was discovered in certain Apple products. Safari before 11.1.1 is affected. The issue involves the "Safari" component. It allows remote attackers to spoof the address bar via a crafted web site. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
RHSA-2021:3042 | Red Hat Security Advisory: rust-toolset-1.52 and rust-toolset-1.52-rust security and enhancement update | rust: optimization for joining strings can cause uninitialized bytes to be exposed rust: heap-based buffer overflow in read_to_end() because it does not validate the return value from Read in an unsafe context rust: panic safety issue in Zip implementation rust: memory safety violation in Zip implementation for nested iter::Zips rust: memory safety violation in Zip implementation when next_back() and next() are used together rust: integer overflow in the Zip implementation can lead to a buffer overflow rust: double free in Vec::from_iter function if freeing the element panics | [
"cpe:/a:redhat:devtools:2021"
] | null | 9.8 | null | null |
CVE-2020-3222 | Cisco IOS XE Software Web UI Unauthenticated Proxy Service Vulnerability | A vulnerability in the web-based user interface (web UI) of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to bypass access control restrictions on an affected device. The vulnerability is due to the presence of a proxy service at a specific endpoint of the web UI. An attacker could exploit this vulnerability by connecting to the proxy service. An exploit could allow the attacker to bypass access restrictions on the network by proxying their access request through the management network of the affected device. As the proxy is reached over the management virtual routing and forwarding (VRF), this could reduce the effectiveness of the bypass. | [
"cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*"
] | null | null | 4.3 | null |
GHSA-fvqp-36vq-4jhh | The UC Browser HD (aka com.uc.browser.hd) application 3.3.1.469 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
RHSA-2008:0038 | Red Hat Security Advisory: postgresql security update | dblink allows proxying of database connections via 127.0.0.1 postgresql integer overflow in regex code postgresql DoS via infinite loop in regex NFA optimization code postgresql: tempory DoS caused by slow regex NFA cleanup PostgreSQL privilege escalation PostgreSQL privilege escalation via dblink | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
CVE-2018-5925 | A security vulnerability has been identified with certain HP Inkjet printers. A maliciously crafted file sent to an affected device can cause a static buffer overflow, which could allow remote code execution. | [
"cpe:2.3:o:hp:t8x44_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t8x44:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:3aw51a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3aw51a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:a9u28b_firmware:1828b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:a9u28b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3a82a_firmware:1828b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3a82a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:v1n08a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:v1n08a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:y5h80a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:y5h80a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d4h24b_firmware:1826a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d4h24b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f5s57a_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f5s57a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:k4t99b_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:k4t99b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:k4u04b_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:k4u04b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:t8x39_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t8x39:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:1sh08_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:1sh08:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:3aw44a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3aw44a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:a9u19a_firmware:1828b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:a9u19a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3a78b_firmware:1828b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3a78b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:4uj28b_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:4uj28b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:v1n01a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:v1n01a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:y5h60a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:y5h60a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d4h22a_firmware:1826a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d4h22a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j6u57b_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j6u57b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j9v82a_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9v82a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j9v82b_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9v82b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j9v82c_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9v82c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j9v82d_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9v82d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:y3z57_firmware:005.1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:y3z57:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:w1b33_firmware:005.1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:w1b33:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:w1b39_firmware:005.1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:w1b39:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:w1b37_firmware:005.1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:w1b37:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:w1b38_firmware:005.1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:w1b38:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j6u55a_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j6u55a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j6u55b_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j6u55b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j6u55c_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j6u55c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j6u55d_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j6u55d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:y3z45_firmware:005.1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:y3z45:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:y3z47_firmware:005.1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:y3z47:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j9v80a_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9v80a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j9v80b_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9v80b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q15a_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q15a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q15b_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q15b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q15d_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q15d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q17a_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q17a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q17c_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q17c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q17d_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q17d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:y3z46_firmware:005.1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:y3z46:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:y3z44_firmware:005.1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:y3z44:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q19a_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q19a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q19d_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q19d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q20a_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q20a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q20b_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q20b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q20c_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q20c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q20d_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q20d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q21a_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q21a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q21c_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q21c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q21d_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q21d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:k9z76a_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:k9z76a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:k9z76d_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:k9z76d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:w1b31_firmware:005.1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:w1b31:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:y3z54_firmware:005.1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:y3z54:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q16a_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q16a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q16b_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q16b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q16c_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q16c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3q16d_firmware:001.1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3q16d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cn459a_firmware:1829b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cn459a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cn463a_firmware:1829b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cn463a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cn460a_firmware:1829b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cn460a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cn461a_firmware:1829b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cn461a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cv037a_firmware:1829b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cv037a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cn598a_firmware:1829b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cn598a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:n9m07a_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:n9m07a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cq891a_firmware:1829b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cq891a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cq891b_firmware:1829b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cq891b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cq891c_firmware:1829b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cq891c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cq891ar_firmware:1829b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cq891ar:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cq890a_firmware:1829b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cq890a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cq890b_firmware:1829b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cq890b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cq890c_firmware:1829b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cq890c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cq890d_firmware:1829b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cq890d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cq890e_firmware:1829b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cq890e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cq890ar_firmware:1829b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cq890ar:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cq893a_firmware:1829b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cq893a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cq893b_firmware:1829b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cq893b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cq893c_firmware:1829b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cq893c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cq893e_firmware:1829b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cq893e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cq893ar_firmware:1829b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cq893ar:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f9a29a_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f9a29a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f9a29b_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f9a29b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:t5d66a_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t5d66a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f9a28a_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f9a28a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f9a28b_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f9a28b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:1jl02b_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:1jl02b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:1jl02a_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:1jl02a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:t5d67a_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t5d67a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j9v86a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9v86a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:t8w51a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t8w51a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:a9j41_firmware:1828b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:a9j41:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f0v64_firmware:1827b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f0v64:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j6u63_firmware:1827b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j6u63:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:w3u23_firmware:1827b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:w3u23:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f5s65a_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f5s65a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:l8l91a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:l8l91a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:m2u86_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:m2u86:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:m2u76_firmware:1831a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:m2u76:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:b9s57c_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:b9s57c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f5s60a_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f5s60a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:t0a23a_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t0a23a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:m2q28a_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:m2q28a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:p0r21a_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:p0r21a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:x3b09a_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:x3b09a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:2nd31a_firmware:1828b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:2nd31a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:a9u23_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:a9u23:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:v1n02a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:v1n02a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:y5z00a_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:y5z00a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f5s43_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f5s43:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:k9u05b_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:k9u05b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:1dt61a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:1dt61a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:3yz74a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3yz74a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:4sc29a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:4sc29a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j9v87a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9v87a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:t8w35a_firmware:1830a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t8w35a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f5r96a_firmware:1830a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f5r96a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:k7v42c_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:k7v42c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cz283a_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cz283a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cz284a_firmware:1830a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cz284a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:b4l08a_firmware:1830a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:b4l08a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f1h97_firmware:1828b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f1h97:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cz282a_firmware:1831a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cz282a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:g0v48b_firmware:1831a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:g0v48b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:g0v48c_firmware:1828b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:g0v48c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cz276a_firmware:1827a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cz276a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cq176_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cq176:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:a9t80a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:a9t80a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:a9t80b_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:a9t80b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:a9t89a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:a9t89a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d3p93a_firmware:1827b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3p93a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:k9h48_firmware:1827b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:k9h48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f0v63_firmware:1827b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f0v63:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f0v67_firmware:1827b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f0v67:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:k9t01_firmware:1827b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:k9t01:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j6u59_firmware:1827b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j6u59:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j6u69_firmware:1827b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j6u69:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:k9h57_firmware:1827b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:k9h57:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:w3u25_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:w3u25:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:m2u85_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:m2u85:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:m2u91_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:m2u91:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z4a54_firmware:1828b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z4a54:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:a9j40a_firmware:1828b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:a9j40a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d4j85b_firmware:1831a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d4j85b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:g0v47_firmware:1831a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:g0v47:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:g0450_firmware:1831a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:g0450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:k7c84_firmware:1831a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:k7c84:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:k7g86_firmware:1830b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:k7g86:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:b9s56a_firmware:1830b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:b9s56a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:b9s58a_firmware:1830b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:b9s58a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f8b05a_firmware:1830b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f8b05a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f8b13a_firmware:1830b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f8b13a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f8b04a_firmware:1830b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f8b04a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f8b06a_firmware:1830b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f8b06a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f8b12a_firmware:1830a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f8b12a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:e4w43_firmware:1829d:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:e4w43:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:k7g18a_firmware:1829d:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:k7g18a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:k7g93a_firmware:1737j:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:k7g93a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z6z11a_firmware:1805j:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z6z11a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z4b53a_firmware:1737j:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z4b53a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z6z95a_firmware:1805j:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z6z95a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z6z97a_firmware:1805j:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z6z97a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cz993a_firmware:1827a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cz993a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:l9b95a_firmware:1827a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:l9b95a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:n4l14c_firmware:1827a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:n4l14c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:n4k99c_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:n4k99c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cz992a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cz992a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:l9d57a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:l9d57a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:n4l17a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:n4l17a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:n4l18c_firmware:1826a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:n4l18c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d4h21a_firmware:1826a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d4h21a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d4h25a_firmware:1830a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d4h25a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f5r95_firmware:1830a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f5r95:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f5s00_firmware:1830a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f5s00:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:k7v35_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:k7v35:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cr771a_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cr771a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cz152a_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cz152a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cz294a_firmware:1830a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cz294a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:b4l03_firmware:1830a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:b4l03:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d4j74_firmware:1830a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d4j74:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f1h96_firmware:1830a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f1h96:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f1j00_firmware:1830a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f1j00:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f9d36_firmware:1830a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f9d36:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:k9v76_firmware:1830a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:k9v76:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:v6d27_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:v6d27:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:m2u75_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:m2u75:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:m2u81_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:m2u81:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z4b12_firmware:1830a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z4b12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:b9s76_firmware:1830a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:b9s76:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f8b09_firmware:1830a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f8b09:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:t1p36_firmware:1827a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t1p36:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:e3e03a_firmware:1827a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:e3e03a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:c9s13a_firmware:1827d:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:c9s13a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cn581a_firmware:1827d:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cn581a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cn583a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cn583a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:f0m65a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:f0m65a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:g1w52a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:g1w52a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:p4c78a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:p4c78a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:t3p03a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t3p03a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:t3p04a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t3p04a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j7k33a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j7k33a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:t0f28a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t0f28a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:t0g25a_firmware:1827a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t0g25a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cr768a_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cr768a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:g3j47a_firmware:1828b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:g3j47a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cr769a_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cr769a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:g1x85a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:g1x85a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cv136a_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cv136a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cr7770a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cr7770a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cz292a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cz292a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cz293a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cz293a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:e3e02a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:e3e02a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j2d37a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j2d37a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j7k34a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j7k34a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:t0f29a_firmware:1830a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t0f29a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:y0s18a_firmware:1830a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:y0s18a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:y0s19a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:y0s19a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:g5j38a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:g5j38a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:t1p99_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t1p99:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:t1q00_firmware:1827b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t1q00:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d9l63a_firmware:1827b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d9l63a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d9l64a_firmware:1827b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d9l64a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:t0g70a_firmware:1827b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t0g70a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j3p68a_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j3p68a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cm749a_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cm749a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cm750a_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cm750a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cn577a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cn577a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:a7f64a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:a7f64a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d7z36a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d7z36a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:e1d34a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:e1d34a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j5t77a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j5t77a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:t0k98a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t0k98a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:a7f65a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:a7f65a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d7z37a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d7z37a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:a7f66a_firmware:1828b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:a7f66a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:e2d42a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:e2d42a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:e1d36a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:e1d36a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d9l18a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d9l18a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j6x76a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j6x76a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j6x80a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j6x80a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:k7s37a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:k7s37a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:m9l65a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:m9l65a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:m9l70a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:m9l70a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:m9l81a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:m9l81a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:t0g45a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t0g45a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d9l19a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d9l19a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j7a28a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j7a28a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:j7a31a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j7a31a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:k7s34a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:k7s34a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:m9l73a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:m9l73a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:m9l80a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:m9l80a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:t0g50a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t0g50a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:t0g54a_firmware:1828a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t0g54a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:t6t77a_firmware:1827b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t6t77a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:d9l20a_firmware:1827a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d9l20a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:t0g56a_firmware:1827b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t0g56a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:k7s42a_firmware:1832a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:k7s42a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cq176a_firmware:1829b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cq176a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cq183a_firmware:1828b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cq183a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cx042_firmware:1828b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cx042:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cq761a_firmware:1829b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cq761a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cx017a_firmware:1828b:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cx017a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cz025a_firmware:1830a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cz025a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cz045a_firmware:1830a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cz045a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:cn216a_firmware:1829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cn216a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z4b07a_firmware:1737j:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z4b07a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z4b56a_firmware:1805j:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z4b56a:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
GHSA-c876-w45q-72x4 | Missing Authorization vulnerability in BAKKBONE Australia FloristPress.This issue affects FloristPress: from n/a through 7.3.0. | [] | null | 5.4 | null | null |
|
CVE-2015-8479 | Use-after-free vulnerability in the AudioOutputDevice::OnDeviceAuthorized function in media/audio/audio_output_device.cc in Google Chrome before 47.0.2526.73 allows attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by triggering access to an unauthorized audio output device. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-rvmj-pg73-4rvj | The errorExitIfAttackViaString function in Tunnelblick 3.3beta20 and earlier allows local users to delete arbitrary files by constructing a (1) symlink or (2) hard link, a different vulnerability than CVE-2012-3485. | [] | null | null | null | null |
|
CVE-2018-14289 | This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF documents. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-6221. | [
"cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
CVE-2024-40848 | A downgrade issue was addressed with additional code-signing restrictions. This issue is fixed in macOS Ventura 13.7, macOS Sonoma 14.7, macOS Sequoia 15. An attacker may be able to read sensitive information. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
RHSA-2017:0867 | Red Hat Security Advisory: Red Hat Enterprise Virtualization 3.x - 180 Day End Of Life Notice | This is the 180 day notification for the End of Production Phase 2 of
Red Hat Enterprise Virtualization 3.x. | [
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null |
CVE-2008-5742 | Multiple open redirect vulnerabilities in AIST NetCat 3.12 and earlier allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via (1) the redirect parameter in a logoff action to modules/auth/index.php or (2) the url parameter to modules/linkmanager/redirect.php. NOTE: this was reported within an "HTTP Response Splitting" section in the original disclosure. | [
"cpe:2.3:a:netcat:netcat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netcat:netcat:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netcat:netcat:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netcat:netcat:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netcat:netcat:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:netcat:netcat:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:netcat:netcat:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:netcat:netcat:3.0:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
CVE-2016-1915 | Multiple cross-site scripting (XSS) vulnerabilities in BlackBerry Enterprise Server 12 (BES12) Self-Service before 12.4 allow remote attackers to inject arbitrary web script or HTML via the locale parameter to (1) mydevice/index.jsp or (2) mydevice/loggedOut.jsp. | [
"cpe:2.3:a:blackberry:blackberry_enterprise_service:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-5rr6-459r-623v | The auto-update implementation in Cisco Adaptive Security Appliance (ASA) Software 9.0.3.6 and earlier allows remote attackers to cause a denial of service (device reload) via crafted update data, aka Bug ID CSCui33308. | [] | null | null | null | null |
|
GHSA-h5pg-7xwx-9864 | The Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘eael_event_text_color’ parameter in versions up to, and including, 5.9.17 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
CVE-2015-0677 | The XML parser in Cisco Adaptive Security Appliance (ASA) Software 8.4 before 8.4(7.28), 8.6 before 8.6(1.17), 9.0 before 9.0(4.33), 9.1 before 9.1(6), 9.2 before 9.2(3.4), and 9.3 before 9.3(3), when Clientless SSL VPN, AnyConnect SSL VPN, or AnyConnect IKEv2 VPN is used, allows remote attackers to cause a denial of service (VPN outage or device reload) via a crafted XML document, aka Bug ID CSCus95290. | [
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1.11:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.15:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.22:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.23:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.26:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.12:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.13:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.14:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2.10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.17:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.20:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.24:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.26:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.29:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.12:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.15:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.21:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2.2:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
CVE-2024-9281 | bg5sbk MiniCMS post-edit.php cross-site request forgery | A vulnerability was found in bg5sbk MiniCMS up to 1.11 and classified as problematic. This issue affects some unknown processing of the file post-edit.php. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions confusing version and file name information. The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:bg5sbk:minicms:*:*:*:*:*:*:*:*"
] | 6.9 | 4.3 | 4.3 | 5 |
RHSA-2022:5267 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak kernel: race condition in perf_event_open leads to privilege escalation kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write) kernel: buffer overflow in IPsec ESP transformation code kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root | [
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime"
] | null | 7.8 | null | null |
GHSA-c7fv-wv9f-cgjw | php-shellcommand command injection vulnerability | php-shellcommand versions before 1.6.1 have a command injection vulnerability. Successful exploitation could lead to arbitrary code execution. | [] | null | 9.8 | null | null |
GHSA-x3vj-997j-97hq | Zetetic SQLCipher 4.x before 4.4.1 has a use-after-free, related to sqlcipher_codec_pragma and sqlite3Strlen30 in sqlite3.c. A remote denial of service attack can be performed. For example, a SQL injection can be used to execute the crafted SQL command sequence. After that, some unexpected RAM data is read. | [] | null | null | null | null |
|
CVE-2012-5909 | SQL injection vulnerability in admin/modules/user/users.php in MyBB (aka MyBulletinBoard) 1.6.6 allows remote attackers to execute arbitrary SQL commands via the conditions[usergroup][] parameter in a search action to admin/index.php. | [
"cpe:2.3:a:mybb:mybb:1.6.6:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2024-8906 | Incorrect security UI in Downloads in Google Chrome prior to 129.0.6668.58 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
|
GHSA-xcfc-r834-76g4 | In the Linux kernel, the following vulnerability has been resolved:scsi: qedf: Add pointer checks in qedf_update_link_speed()The following trace was observed:[ 14.042059] Call Trace:
[ 14.042061] <IRQ>
[ 14.042068] qedf_link_update+0x144/0x1f0 [qedf]
[ 14.042117] qed_link_update+0x5c/0x80 [qed]
[ 14.042135] qed_mcp_handle_link_change+0x2d2/0x410 [qed]
[ 14.042155] ? qed_set_ptt+0x70/0x80 [qed]
[ 14.042170] ? qed_set_ptt+0x70/0x80 [qed]
[ 14.042186] ? qed_rd+0x13/0x40 [qed]
[ 14.042205] qed_mcp_handle_events+0x437/0x690 [qed]
[ 14.042221] ? qed_set_ptt+0x70/0x80 [qed]
[ 14.042239] qed_int_sp_dpc+0x3a6/0x3e0 [qed]
[ 14.042245] tasklet_action_common.isra.14+0x5a/0x100
[ 14.042250] __do_softirq+0xe4/0x2f8
[ 14.042253] irq_exit+0xf7/0x100
[ 14.042255] do_IRQ+0x7f/0xd0
[ 14.042257] common_interrupt+0xf/0xf
[ 14.042259] </IRQ>API qedf_link_update() is getting called from QED but by that time
shost_data is not initialised. This results in a NULL pointer dereference
when we try to dereference shost_data while updating supported_speeds.Add a NULL pointer check before dereferencing shost_data. | [] | null | 5.5 | null | null |
|
CVE-2018-13785 | In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service. | [
"cpe:2.3:a:libpng:libpng:1.6.34:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update201:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update191:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update181:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update201:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update191:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update181:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
CVE-2016-3104 | mongod in MongoDB 2.6, when using 2.4-style users, and 2.4 allow remote attackers to cause a denial of service (memory consumption and process termination) by leveraging in-memory database representation when authenticating against a non-existent database. | [
"cpe:2.3:a:mongodb:mongodb:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:2.6.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2011-1952 | common.php in Post Revolution before 0.8.0c-2 allows remote attackers to cause a denial of service (infinite loop) via malformed HTML markup, as demonstrated by an a< sequence. | [
"cpe:2.3:a:postrev:post_revolution:*:*:*:*:*:*:*:*",
"cpe:2.3:a:postrev:post_revolution:0.6.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:postrev:post_revolution:0.6.3:beta:*:*:*:*:*:*",
"cpe:2.3:a:postrev:post_revolution:0.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postrev:post_revolution:0.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postrev:post_revolution:0.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postrev:post_revolution:0.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:postrev:post_revolution:0.7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:postrev:post_revolution:0.7.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:postrev:post_revolution:0.7.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:postrev:post_revolution:0.8.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:postrev:post_revolution:0.8.0b:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-2mrv-739m-rgj5 | SQL injection vulnerability in the Highwood Design hwdVideoShare (com_hwdvideoshare) 1.1.3 Alpha component for Joomla! allows remote attackers to execute arbitrary SQL commands via the cat_id parameter in a viewcategory action to index.php. | [] | null | null | null | null |
|
CVE-2015-7666 | Multiple cross-site scripting (XSS) vulnerabilities in the (1) cp_updateMessageItem and (2) cp_deleteMessageItem functions in cp_ppp_admin_int_message_list.inc.php in the Payment Form for PayPal Pro plugin before 1.0.2 for WordPress allow remote attackers to inject arbitrary web script or HTML via the cal parameter. | [
"cpe:2.3:a:codepeople:payment_form_for_paypal_pro:*:*:*:*:*:wordpress:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2016-1646 | The Array.prototype.concat implementation in builtins.cc in Google V8, as used in Google Chrome before 49.0.2623.108, does not properly consider element data types, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted JavaScript code. | [
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9.3 |
|
CVE-2020-14326 | A vulnerability was found in RESTEasy, where RootNode incorrectly caches routes. This issue results in hash flooding, leading to slower requests with higher CPU time spent searching and adding the entry. This flaw allows an attacker to cause a denial of service. | [
"cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:resteasy:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-gj5q-rq38-2gcg | The NSAPI plugins for TGA and the Java Servlet proxy in HP-UX VVOS 10.24 and 11.04 allows an attacker to cause a denial of service (high CPU utilization). | [] | null | null | null | null |
|
GHSA-53jw-q7qq-mxwr | Cross-site request forgery (CSRF) vulnerability in admin/admincenter.php in webSPELL 4.01.02 allows remote attackers to assign the superadmin privilege level to arbitrary accounts as administrators via an "update member" action. | [] | null | null | null | null |
|
CVE-2024-2229 |
CWE-502: Deserialization of Untrusted Data vulnerability exists that could cause remote code
execution when a malicious project file is loaded into the application by a valid user.
| [
"cpe:2.3:a:schneider-electric:ecostruxure_power_monitoring_expert:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2023-32830 | In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03802522; Issue ID: DTV03802522. | [
"cpe:2.3:h:mediatek:mt5527:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt5598:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt5599:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt5670:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt5680:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt5806:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt5813:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt5815:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt5816:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt5833:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt5835:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt5895:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9215:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9633:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9660:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9679:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9900:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9901:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9931:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9950:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9969:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9970:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9980:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt9981:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 6.7 | null | null |
|
GHSA-f28g-86hc-823q | Tokenizer vulnerable to client brute-force of token secrets | ImpactAuthorized clients, having an `inject_processor` secret, could brute-force the secret token value by abusing the `fmt` parameter to the `Proxy-Tokenizer` header.PatchesThis was fixed in https://github.com/superfly/tokenizer/pull/8 and further mitigated in https://github.com/superfly/tokenizer/pull/9. | [] | null | null | null | null |
CVE-2021-27589 | When a user opens manipulated Scalable Vector Graphics (.SVG) format files received from untrusted sources in SAP 3D Visual Enterprise Viewer version 9, the application crashes and becomes temporarily unavailable to the user until restart of the application. | [
"cpe:2.3:a:sap:3d_visual_enterprise_viewer:9:*:*:*:*:*:*:*"
] | null | null | 4.3 | null |
|
CVE-2025-31873 | WordPress SheetDB Plugin <= 1.3.3 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in sheetdb SheetDB allows Stored XSS. This issue affects SheetDB: from n/a through 1.3.3. | [] | null | 6.5 | null | null |
CVE-2019-2073 | In libxaac there is a possible out of bounds write to missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-117100484 | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-x2jf-fqm5-8f5p | Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 44.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to uninitialized memory encountered during brotli data compression, and other vectors. | [] | null | null | 10 | null |
|
CVE-2021-36690 | A segmentation fault can occur in the sqlite3.exe command-line component of SQLite 3.36.0 via the idxGetTableInfo function when there is a crafted SQL query. NOTE: the vendor disputes the relevance of this report because a sqlite3.exe user already has full privileges (e.g., is intentionally allowed to execute commands). This report does NOT imply any problem in the SQLite library. | [
"cpe:2.3:a:sqlite:sqlite:3.36.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2022-31777 | Apache Spark XSS vulnerability in log viewer UI Javascript | A stored cross-site scripting (XSS) vulnerability in Apache Spark 3.2.1 and earlier, and 3.3.0, allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the logs which would be returned in logs rendered in the UI. | [
"cpe:2.3:a:apache:spark:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:spark:3.3.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
GHSA-vqv8-v28v-329v | Checkmk before 1.6.0p17 allows local users to obtain SYSTEM privileges via a Trojan horse shell script in the %PROGRAMDATA%\checkmk\agent\local directory. | [] | null | 7.8 | null | null |
|
GHSA-pr68-8489-pj5m | Unspecified vulnerability in the Oracle Knowledge Management component in Oracle E-Business Suite 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, and 12.2.5 allows remote attackers to affect integrity via vectors related to Search. NOTE: the previous information is from the July 2016 CPU. Oracle has not commented on third-party claims that this issue involves multiple open redirect vulnerabilities, which allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. | [] | null | null | 4.7 | null |
|
GHSA-7x36-c8q3-j2wv | IBM Sterling File Gateway 2.2.0.0 through 6.1.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 197503. | [] | null | null | null | null |
|
GHSA-92v4-w84x-g8q7 | Certain configurations of wu-ftp FTP server 2.4 use a _PATH_EXECPATH setting to a directory with dangerous commands, such as /bin, which allows remote authenticated users to gain root access via the "site exec" command. | [] | null | null | null | null |
|
GHSA-9897-6754-r6x9 | Cross-site scripting (XSS) vulnerability in cgi-bin/user-lib/topics.pl in web-app.net WebAPP before 20060515 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors in the viewnews function, related to use of doubbctopic instead of doubbc. | [] | null | null | null | null |
|
GHSA-2c63-4337-p6h8 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Spider-themes EazyDocs.This issue affects EazyDocs: from n/a through 2.5.5. | [] | null | 7.5 | null | null |
|
GHSA-37r4-xgj4-h786 | Clickhouse prior to versions v20.8.18.32-lts, v21.1.9.41-stable, v21.2.9.41-stable, v21.3.6.55-lts, v21.4.3.21-stable allows user to read any file on the host system, that clickhouse user has access to. | [] | null | 6.5 | null | null |
|
CVE-2006-1960 | Cross-site scripting (XSS) vulnerability in the appliance web user interface in Cisco CiscoWorks Wireless LAN Solution Engine (WLSE) and WLSE Express before 2.13 allows remote attackers to inject arbitrary web script or HTML, possibly via the displayMsg parameter to archiveApplyDisplay.jsp, aka bug ID CSCsc01095. | [
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.0:*:express:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.1:*:express:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.2:*:express:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.3:*:express:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.4:*:express:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.5:*:express:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.6:*:express:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.7:*:express:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.8:*:express:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.9:*:express:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.10:*:express:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.11:*:express:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.12:*:express:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.13:*:express:*:*:*:*:*"
] | null | null | null | 5.8 |
|
CVE-2010-3577 | Unspecified vulnerability in Oracle OpenSolaris allows remote attackers to affect confidentiality and integrity, related to Kernel/CIFS. | [
"cpe:2.3:o:oracle:opensolaris:*:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
CVE-2022-35707 | Adobe Bridge SGI File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability | Adobe Bridge version 12.0.2 (and earlier) and 11.1.3 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2018-5885 | While loading dynamic fonts, a buffer overflow may occur if the number of segments in the font file is out of range in Snapdragon Mobile and Snapdragon Wear. | [
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:*:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:*:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2004-1961 | blocker.php in Protector System 1.15b1 allows remote attackers to bypass SQL injection protection and execute limited SQL commands via URL-encoded "'" characters ("%27"). | [
"cpe:2.3:a:protector_system:protector_system:1.15b1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-433p-xc8c-2rxr | Phpbb3 before 3.0.11-4 for Debian GNU/Linux uses world-writable permissions for cache files, which allows local users to modify the file contents via standard filesystem write operations. | [] | null | null | null | null |
|
GHSA-3qv9-34qr-5g8r | All versions of the NVIDIA Windows GPU Display Driver contain a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape where a pointer passed from a user to the driver is not correctly validated before it is dereferenced for a write operation, may lead to denial of service or potential escalation of privileges. | [] | null | null | 7.8 | null |
|
CVE-2011-0165 | WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1. | [
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*"
] | null | null | null | 7.6 |
|
GHSA-7r63-7vx5-2c8f | Buffer overflow in a System.DirectoryServices.Protocols (S.DS.P) namespace method in Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4, and 4.5 allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application that leverages a missing array-size check during a memory copy operation, aka "S.DS.P Buffer Overflow Vulnerability." | [] | null | null | null | null |
|
CVE-2025-24882 | regclient may ignore pinned manifest digests | regclient is a Docker and OCI Registry Client in Go. A malicious registry could return a different digest for a pinned manifest without detection. This vulnerability is fixed in 0.7.1. | [] | null | 5.2 | null | null |
GHSA-h4mv-24rm-583r | Microsoft Excel Remote Code Execution Vulnerability | [] | null | 7.8 | null | null |
|
GHSA-c8p4-jpp6-3hwg | Computalynx CMail 2.4 and CMail 2.3 SP2 SMTP servers are vulnerable to a buffer overflow attack in the MAIL FROM command that may allow a remote attacker to execute arbitrary code on the server. | [] | null | null | null | null |
|
CVE-2023-5938 | Path traversal via 'zip slip' in Arc before v1.6.0 | Multiple functions use archives without properly validating the filenames therein, rendering the application vulnerable to path traversal via 'zip slip' attacks.
An administrator able to provide tampered archives to be processed by the affected versions of Arc may be able to have arbitrary files extracted to arbitrary filesystem locations. Leveraging this issue, an attacker may be able to overwrite arbitrary files on the target filesystem and cause critical impacts on the system (e.g., arbitrary command execution on the victim’s machine). | [] | 8.9 | 8 | null | null |
CVE-2024-35212 | A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected application lacks input validation due to which an attacker can gain access to the Database entries. | [
"cpe:2.3:a:siemens:sinec_traffic_analyzer:*:*:*:*:*:*:*:*"
] | 6.9 | 6.2 | null | null |
|
CVE-2016-7987 | An issue was discovered in Siemens ETA4 firmware (all versions prior to Revision 08) of the SM-2558 extension module for: SICAM AK, SICAM TM 1703, SICAM BC 1703, and SICAM AK 3. Specially crafted packets sent to Port 2404/TCP could cause the affected device to go into defect mode. A cold start might be required to recover the system, a Denial-of-Service Vulnerability. | [
"cpe:2.3:o:siemens:eta4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sicam_ak:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sicam_ak_3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sicam_bc_1703:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sicam_tm_1703:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:eta2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sicam_bc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sicam_tm:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.8 |
|
GHSA-h289-vmhx-86f3 | Heap buffer overflow in Screen Capture in Google Chrome on Chrome OS prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. | [] | null | 8.8 | null | null |
|
CVE-2020-6822 | On 32-bit builds, an out of bounds write could have occurred when processing an image larger than 4 GB in <code>GMPDecodeData</code>. It is possible that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 68.7.0, Firefox ESR < 68.7, and Firefox < 75. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-3c3v-8gm2-qxwq | Stack-based buffer overflow in the DoModal function in the Dialog Wrapper Module ActiveX control (DlgWrapper.dll) before 8.4.166.0, as used by ICONICS OPC Enabled Gauge, Switch, and Vessel ActiveX, allows remote attackers to execute arbitrary code via a long (1) FileName or (2) Filter argument. | [] | null | null | null | null |
|
CVE-2014-2408 | Unspecified vulnerability in the Core RDBMS component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, and 12.1.0.1 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to the "Grant Any Object Privilege." | [
"cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:11.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:11.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:12.1.0.1:*:*:*:*:*:*:*"
] | null | null | null | 6.6 |
|
GHSA-x5m7-63c6-fx79 | Withdrawn Advisory: Cluster Monitoring Operator contains a credentials leak | Withdrawn AdvisoryThis advisory has been withdrawn because the vulnerability does not affect a package in the Go registry. For more information, see the discussion [here](https://github.com/github/advisory-database/pull/5467#issuecomment-2812187822). This link is maintained to preserve external references.Original DescriptionA credentials leak vulnerability was found in the cluster monitoring operator in OCP. This issue may allow a remote attacker who has basic login credentials to check the pod manifest to discover a repository pull secret. | [] | null | 7.7 | null | null |
CVE-2020-26162 | Xerox WorkCentre EC7836 before 073.050.059.25300 and EC7856 before 073.020.059.25300 devices allow XSS via Description pages. | [
"cpe:2.3:o:xerox:workcentre_ec7836_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:workcentre_ec7836:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xerox:workcentre_ec7856_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:workcentre_ec7856:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2003-0149 | Heap-based buffer overflow in ePO agent for McAfee ePolicy Orchestrator 2.0, 2.5, and 2.5.1 allows remote attackers to execute arbitrary code via a POST request containing long parameters. | [
"cpe:2.3:a:mcafee:epolicy_orchestrator:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:2.5:sp1:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:2.5.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-9jpv-w64v-mgr2 | Net-NTLM leak in Fireflow A32.20 and A32.50 allows an attacker to obtain victim’s domain credentials and Net-NTLM hash which can lead to relay domain attacks. | [] | null | 5.9 | null | null |
|
CVE-2024-2168 | SourceCodester Online Tours & Travels Management System HTTP POST Request expense_category.php sql injection | A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/operations/expense_category.php of the component HTTP POST Request Handler. The manipulation of the argument status leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-255678 is the identifier assigned to this vulnerability. | [] | null | 4.7 | 4.7 | 5.8 |
CVE-2015-7684 | Unrestricted file upload in GLPI before 0.85.3 allows remote authenticated users to execute arbitrary code by adding a file with an executable extension as an attachment to a new ticket, then accessing it via a direct request to the file in files/_tmp/. | [
"cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*"
] | null | null | null | 9 |
|
CVE-2005-3451 | Unspecified vulnerability in SQL*ReportWriter in Oracle Application Server 9.0 up to 9.0.2.1 has unknown impact and attack vectors, as identified by Oracle Vuln# AS10. | [
"cpe:2.3:a:oracle:application_server:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:9.0.2.1:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2019-13635 | The WP Fastest Cache plugin through 0.8.9.5 for WordPress allows wpFastestCache.php and inc/cache.php Directory Traversal. | [
"cpe:2.3:a:wpfastestcache:wp_fastest_cache:*:*:*:*:*:wordpress:*:*"
] | null | null | 9.1 | 6.4 |
|
GHSA-xp9h-4c3v-4fjv | In ADB server and USB server, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-153356209 | [] | null | null | null | null |
|
CVE-2023-34017 | WordPress Five Star Restaurant Reservations Plugin <= 2.6.7 is vulnerable to Cross Site Scripting (XSS) | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in FiveStarPlugins Five Star Restaurant Reservations plugin <= 2.6.7 versions. | [
"cpe:2.3:a:fivestarplugins:five_star_restaurant_menu:*:*:*:*:*:wordpress:*:*"
] | null | 7.1 | null | null |
GHSA-6xf7-p3jx-g67x | Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat Reader DC Classic before 2015.006.30060, and Acrobat and Acrobat Reader DC Continuous before 2015.008.20082 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3095, CVE-2015-5087, CVE-2015-5094, CVE-2015-5100, CVE-2015-5102, CVE-2015-5103, and CVE-2015-5104. | [] | null | null | null | null |
|
GHSA-q365-px98-c77c | Unspecified vulnerability in the Application Mgmt Pack for E-Business Suite component in Oracle E-Business Suite 12.1 and 12.2 allows remote attackers to affect confidentiality via vectors related to REST Framework, a different vulnerability than CVE-2016-0457. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that this issue is an XML External Entity (XXE) vulnerability, which allows remote attackers to read arbitrary files, cause a denial of service, conduct server-side request forgery (SSRF) attacks, or conduct SMB Relay attacks via a crafted DTD in an XML request to OA_HTML/copxmllcmservicecontroller.js. | [] | null | null | null | null |
|
GHSA-hxwh-j2hw-wvh5 | Vulnerability in the Oracle FLEXCUBE Private Banking component of Oracle Financial Services Applications (subcomponent: Miscellaneous). Supported versions that are affected are 2.0.0, 2.0.1, 2.2.0 and 12.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Private Banking. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle FLEXCUBE Private Banking, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle FLEXCUBE Private Banking accessible data as well as unauthorized read access to a subset of Oracle FLEXCUBE Private Banking accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [] | null | null | 6.1 | null |
|
CVE-2022-1387 | No Future Posts <= 1.4 - Admin+ Stored Cross-Site Scripting | The No Future Posts WordPress plugin through 1.4 does not escape its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks when unfiltered_html is disallowed | [
"cpe:2.3:a:no_future_posts_project:no_future_posts:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | 3.5 |
RHSA-2021:3317 | Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update | hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling hw: Information disclosure issue in Intel SGX via RAPL interface hw: Vector Register Leakage-Active hw: Fast forward store predictor hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors | [
"cpe:/o:redhat:rhel_aus:7.6::server",
"cpe:/o:redhat:rhel_e4s:7.6::server",
"cpe:/o:redhat:rhel_tus:7.6::server"
] | null | 2.8 | 6.5 | null |
GHSA-3g5w-6pw7-6hrp | Path Traversal In Eclipse GlassFish | In Eclipse GlassFish versions 5.1.0 to 6.2.5, there is a vulnerability in relative path traversal because it does not filter request path starting with './'. Successful exploitation could allow an remote unauthenticated attacker to access critical data, such as configuration files and deployed application source code. | [] | null | 6.5 | null | null |
CVE-2016-7440 | The C software implementation of AES Encryption and Decryption in wolfSSL (formerly CyaSSL) before 3.9.10 makes it easier for local users to discover AES keys by leveraging cache-bank timing differences. | [
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
CVE-2024-6301 | Origin Validation Error in Conduit | Lack of validation of origin in federation API in Conduit, allowing any remote server to impersonate any user from any server in most EDUs | [
"cpe:2.3:a:the_conduit_contributors:conduit:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:conduit:conduit:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
GHSA-m36m-fp4h-732r | Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . | [] | null | null | 9.8 | null |
|
ICSA-21-175-01 | FATEK Automation WinProladder | The affected product is vulnerable to an out-of-bounds read, which may allow an attacker to execute arbitrary code.CVE-2021-32990 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The affected product is vulnerable to an out-of-bounds write, which may allow an attacker to execute arbitrary code.CVE-2021-32988 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The affected product does not properly restrict operations within the bounds of a memory buffer, which may allow an attacker to execute arbitrary code.CVE-2021-32992 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). | [] | null | null | 7.8 | null |
CVE-2023-44395 | Autolab has Path Traversal vulnerability in Assessment functionality | Autolab is a course management service that enables instructors to offer autograded programming assignments to their students over the Web. Path traversal vulnerabilities were discovered in Autolab's assessment functionality in versions of Autolab prior to 2.12.0, whereby instructors can perform arbitrary file reads. Version 2.12.0 contains a patch. There are no feasible workarounds for this issue. | [
"cpe:2.3:a:autolabproject:autolab:*:*:*:*:*:*:*:*"
] | null | 4.9 | null | null |
CVE-2007-1431 | Multiple unspecified vulnerabilities in PennMUSH 1.8.3 before 1.8.3p1 and 1.8.2 before 1.8.2p3 allow attackers to cause a denial of service (crash) related to the (1) speak and (2) buy functions. | [
"cpe:2.3:a:pennmush:pennmush:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pennmush:pennmush:1.8.2:p1:*:*:*:*:*:*",
"cpe:2.3:a:pennmush:pennmush:1.8.2:p2:*:*:*:*:*:*",
"cpe:2.3:a:pennmush:pennmush:1.8.3:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
CVE-2020-26958 | Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2007-6716 | fs/direct-io.c in the dio subsystem in the Linux kernel before 2.6.23 does not properly zero out the dio struct, which allows local users to cause a denial of service (OOPS), as demonstrated by a certain fio test. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:linux_desktop:9:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp2:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp2:*:*:*:*:*:*"
] | null | 5.5 | null | 4.9 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.