id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
RHSA-2013:0232
Red Hat Security Advisory: JBoss Enterprise Application Platform 5.2.0 security update
JBoss: allows empty password to authenticate against LDAP
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5.2.0" ]
null
null
null
null
CVE-2001-0849
viralator CGI script in Viralator 0.9pre1 and earlier allows remote attackers to execute arbitrary code via a URL for a file being downloaded, which is insecurely passed to a call to wget.
[ "cpe:2.3:a:duncan_hall:viralator:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:duncan_hall:viralator:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:duncan_hall:viralator:0.9_pre1:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2021-38454
Moxa MXview Network Management Software
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.
[ "cpe:2.3:a:moxa:mxview:*:*:*:*:*:*:*:*" ]
null
10
null
null
CVE-2022-32250
net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
RHSA-2016:0277
Red Hat Security Advisory: rhev-hypervisor security update
glibc: getaddrinfo stack-based buffer overflow
[ "cpe:/o:redhat:enterprise_linux:6::hypervisor", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
null
null
CVE-2023-22883
Local Privilege Escalation in Zoom for Windows Installers
Zoom Client for IT Admin Windows installers before version 5.13.5 contain a local privilege escalation vulnerability. A local low-privileged user could exploit this vulnerability in an attack chain during the installation process to escalate their privileges to the SYSTEM user.
[ "cpe:2.3:a:zoom:meetings:*:*:*:*:*:windows:*:*" ]
null
7.2
null
null
GHSA-2qrr-c2gh-pr35
Wikimedia information leak vulnerability
Wikimedia MediaWiki 1.23.0 through 1.32.1 has an information leak. Privileged API responses that include whether a recent change has been patrolled may be cached publicly. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6.
[]
null
null
7.5
null
RHSA-2025:4552
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.22 security update
netty: Denial of Service attack on windows app using Netty org.wildfly.core:wildfly-server: Wildfly improper RBAC permission io.netty:netty-handler: SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine netty: Denial of Service attack on windows app using Netty
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4" ]
null
5.5
null
null
GHSA-vrf2-2g4q-984g
PDF-XChange Editor PDF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PDF files. Crafted data in a PDF file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17765.
[]
null
null
7.8
null
GHSA-3p73-75xq-v9wv
An unauthenticated remote attacker can write memory out of bounds due to improper input validation in the MQTT stack. The brute force attack is not always successful because of memory randomization.
[]
null
7.4
null
null
GHSA-prmc-5v5w-c465
Client TLS credentials sent raw to server in npm package nats
Nats is a Node.js client for the NATS messaging system.Problem Description_Preview versions_ of two NPM packages and one Deno package from the NATS project contain an information disclosure flaw, leaking options to the NATS server; for one package, this includes TLS private credentials.The _connection_ configuration options in these JavaScript-based implementations were fully serialized and sent to the server in the client's `CONNECT` message, immediately after TLS establishment.The nats.js client supports Mutual TLS and the credentials for the TLS client key are included in the connection configuration options; disclosure of the client's TLS private key to the server has been observed.Most authentication mechanisms are handled after connection, instead of as part of connection, so other authentication mechanisms are unaffected. For clarity: NATS account NKey authentication **is NOT affected**.Neither the nats.ws nor the nats.deno clients support Mutual TLS: the affected versions listed below are those where the logic flaw is present. We are including the nats.ws and nats.deno versions out of an abundance of caution, as library maintainers, but rate as minimal the likelihood of applications leaking sensitive data.Affected versionsSecurity impactNPM package nats.js:**mainline is unaffected**beta branch is vulnerable from 2.0.0-201, fixed in 2.0.0-209Logic flawNPM package nats.ws:status: previewflawed from 1.0.0-85, fixed in 1.0.0-111Deno repository https://github.com/nats-io/nats.denostatus: previewflawed in all git tags prior to fixfixed with git tag v1.0.0-9ImpactFor deployments using TLS client certificates (for mutual TLS), private key material for TLS is leaked from the client application to the server. If the server is untrusted (run by a third party), or if the client application also disables TLS verification (and so the true identity of the server is unverifiable) then authentication credentials are leaked.Workaround*None*SolutionUpgrade your package dependencies to fixed versions, and then reissue any TLS client credentials (with new keys, not just new certificates) and revoke the old ones.
[]
null
null
null
null
CVE-2022-31641
Potential vulnerabilities have been identified in the system BIOS of certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure.
[ "cpe:2.3:o:hp:elite_dragonfly_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_dragonfly:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_dragonfly_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_dragonfly_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_x2_1012_g2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x2_1012_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_x2_1013_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x2_1013_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_x2_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x2_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_x360_1040_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x360_1040_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_x360_830_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x360_830_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_1040_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_1040_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_1040_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_1040_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_1050_g1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_1050_g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_630_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_630_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_640_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_640_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_645_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_645_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_650_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_650_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_655_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_655_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_725_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_725_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_735_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_735_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_735_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_735_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_745_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_745_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_745_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_745_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_745_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_745_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_755_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_755_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_755_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_755_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_820_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_820_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_828_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_828_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_830_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_830_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_830_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_830_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_830_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_830_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_835_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_835_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_836_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_836_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_836_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_836_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_g5_healthcare_edition_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g5_healthcare_edition:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_g6_healthcare_edition_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g6_healthcare_edition:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840r_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840r_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_845_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_845_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_846_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_846_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_846_g5_healthcare_edition_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_846_g5_healthcare_edition:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_846r_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_846r_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_848_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_848_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_850_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_850_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_850_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_850_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_850_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_850_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_860_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_860_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_865_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_865_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1020_g2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1020_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1030_g2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1030_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1030_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1030_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1030_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1030_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1040_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1040_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1040_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1040_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_830_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_830_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_830_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_830_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:pro_x2_612_g2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:pro_x2_612_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:pro_x360_fortis_g10_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:pro_x360_fortis_g10:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:pro_x360_fortis_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:pro_x360_fortis_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_430_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_430_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_430_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_430_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_430_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_430_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_440_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_440_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_440_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_440_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_445_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_445_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_445_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_445_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_445r_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_445r_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_450_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_450_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_450_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_450_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_455_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_455_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_455_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_455_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_455_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_455_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_455_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_455_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_455r_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_455r_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_470_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_470_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_470_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_470_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_640_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_640_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_640_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_640_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_640_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_640_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_645_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_645_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_645_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_645_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_650_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_650_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_650_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_650_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_650_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_650_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_655_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_655_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_fortis_g10_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_fortis_g10:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_fortis_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_fortis_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_11_g2_ee_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_11_g2_ee:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_11_g3_ee_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_11_g3_ee:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_11_g4_ee_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_11_g4_ee:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_11_g5_ee_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_11_g5_ee:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_11_g6_ee_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_11_g6_ee:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_440_g1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_440_g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_14u_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_14u_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_14u_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_14u_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_15_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_15_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_15_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_15u_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15u_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_15u_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15u_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_17_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_17_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_17_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_17_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_17_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_17_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_firefly_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_firefly_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_fury_16_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_fury_16_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_power_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_power_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_studio_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_studio_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_studio_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_studio_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_studio_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_studio_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_studio_x360_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_studio_x360_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_x2_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_x2_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_13_g2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_13_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_14_g2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_14_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_15_g2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_15_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_a_14_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_a_14_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_a_14_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_a_14_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_g1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_x_13_g2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_x_13_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_dragonfly_g2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_dragonfly_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_dragonfly_max_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_dragonfly_max:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_x2_g8__firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x2_g8_:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_830_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_830_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_830_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_830_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_835_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_835_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_835_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_835_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_aero_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_aero_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_845_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_845_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_845_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_845_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_850_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_850_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_850_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_850_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_855_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_855_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_855_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_855_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1030_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1030_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1030_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1030_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1040_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1040_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1040_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1040_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_830_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_830_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_830_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_830_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_430_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_430_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_430_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_430_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_440_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_440_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_445_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_445_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_445_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_445_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_450_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_450_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_455_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_455_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_455_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_455_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_630_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_630_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_635_aero_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_635_aero_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_635_aero_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_635_aero_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_640_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_640_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_640_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_640_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_650_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_650_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_650_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_650_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_11_g7_ee_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_11_g7_ee:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_435_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_435_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_435_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_435_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_create_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_create_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_firefly_14_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_firefly_14_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_firefly_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_firefly_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_firefly_15_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_firefly_15_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_fury_15_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_fury_15_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_fury_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_fury_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_fury_17_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_fury_17_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_power_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_power_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_power_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_power_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_studio_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_studio_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_studio_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_studio_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_14_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_14_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_14_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_14_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_15_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_15_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_a_14_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_a_14_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z1_all-in-one_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z1_all-in-one_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z1_entry_tower_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z1_entry_tower_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z1_entry_tower_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z1_entry_tower_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z2_mini_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z2_mini_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z2_mini_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z2_mini_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z2_mini_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z2_mini_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z2_mini_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z2_mini_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z2_small_form_factor_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z2_small_form_factor_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z2_small_form_factor_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z2_small_form_factor_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z2_small_form_factor_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z2_small_form_factor_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z2_small_form_factor_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z2_small_form_factor_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z2_tower_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z2_tower_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z2_tower_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z2_tower_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z2_tower_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z2_tower_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z2_tower_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z2_tower_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z238_microtower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z238_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z240_small_form_factor_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z240_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z240_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z240_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:mt21_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:mt21:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:mt22_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:mt22:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:mt31_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:mt31:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:mt32_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:mt32:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:mt43_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:mt43:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:mt44_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:mt44:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:mt45_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:mt45:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:mt46_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:mt46:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:pro_mt440_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:pro_mt440_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:engage_flex_mini_retail_system_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:engage_flex_mini_retail_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:engage_flex_pro_retail_system_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:engage_flex_pro_retail_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:engage_flex_pro-c_retail_system_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:engage_flex_pro-c_retail_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:engage_go_10_mobile_system_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:engage_go_10_mobile_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:engage_go_mobile_system_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:engage_go_mobile_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:engage_one_all-in-one_system_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:engage_one_all-in-one_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:engage_one_pro_aio_system_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:engage_one_pro_aio_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:mp9_g4_retail_system_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:mp9_g4_retail_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:rp9_g1_retail_system_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:rp9_g1_retail_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_mini_600_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_mini_600_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_mini_800_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_mini_800_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_sff_600_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_sff_600_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_sff_800_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_sff_800_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_slice_g2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_slice_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_tower_600_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_tower_600_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_tower_680_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_tower_680_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_tower_800_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_tower_800_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_tower_880_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_tower_880_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_705_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_705_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_705_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_705_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_805_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_805_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_805_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_805_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_880_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_880_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_880_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_880_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_880_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_880_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_880_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_880_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_880_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_880_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_1000_g1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_1000_g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_1000_g2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_1000_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g3_healthcare_edition_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g3_healthcare_edition:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g4_healthcare_edition_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g4_healthcare_edition:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g5_healthcare_edition_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g5_healthcare_edition:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_840_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_840_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_870_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_870_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:mini_conferencing_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:mini_conferencing:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:pro_mini_400_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:pro_mini_400_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:pro_sff_400_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:pro_sff_400_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:pro_tower_400_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:pro_tower_400_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:pro_tower_480_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:pro_tower_480_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_405_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_405_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_405_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_405_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_405_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_405_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_480_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_480_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_480_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_480_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_480_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_480_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_480_g7_pci_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_480_g7_pci:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_680_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_680_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_680_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_680_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_680_g6_pci_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_680_g6_pci:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_440_g9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_440_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_440_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_440_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_440_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_440_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_440_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_440_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_480_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_480_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_600_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_600_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_600_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_600_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_600_g5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_600_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_600_g6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_600_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z1_g8_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z1_g8_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z1_g9_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z1_g9_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_g3:-:*:*:*:*:*:*:*" ]
null
7
null
null
CVE-2024-20960
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: RAPID). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
RHSA-2003:256
Red Hat Security Advisory: : : : Updated Perl packages fix security issues.
security flaw security flaw
[ "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0", "cpe:/o:redhat:linux:9" ]
null
null
null
null
GHSA-52w2-9c5h-2xqj
Heap-based Buffer Overflow in the psf_binheader_writef function in common.c in libsndfile through 1.0.28 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
[]
null
null
9.8
null
CVE-2017-20141
Itech Movie Portal Script movie.php Union sql injection
A vulnerability classified as critical has been found in Itech Movie Portal Script 7.36. This affects an unknown part of the file /movie.php. The manipulation of the argument f leads to sql injection (Union). It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:ambit:movie_portal_script:7.36:*:*:*:*:*:*:*" ]
null
6.3
null
null
CVE-2024-8382
Internal browser event interfaces were exposed to web content when privileged EventHandler listener callbacks ran for those events. Web content that tried to use those interfaces would not be able to use them with elevated privileges, but their presence would indicate certain browser features had been used, such as when a user opened the Dev Tools console. This vulnerability affects Firefox < 130, Firefox ESR < 128.2, Firefox ESR < 115.15, Thunderbird < 128.2, and Thunderbird < 115.15.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2018-8729
Multiple cross-site scripting (XSS) vulnerabilities in the Activity Log plugin before 2.4.1 for WordPress allow remote attackers to inject arbitrary JavaScript or HTML via a title that is not escaped.
[ "cpe:2.3:a:pojo:activity_log:*:*:*:*:*:wordpress:*:*" ]
null
null
6.1
4.3
CVE-2017-11821
ChakraCore and Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11792, CVE-2017-11793, CVE-2017-11796, CVE-2017-11797, CVE-2017-11798, CVE-2017-11799, CVE-2017-11800, CVE-2017-11801, CVE-2017-11802, CVE-2017-11804, CVE-2017-11805, CVE-2017-11806, CVE-2017-11807, CVE-2017-11808, CVE-2017-11809, CVE-2017-11810, CVE-2017-11811, and CVE-2017-11812.
[ "cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*" ]
null
null
7.5
7.6
CVE-2018-18093
Improper file permissions in the installer for Intel VTune Amplifier 2018 Update 3 and before may allow unprivileged user to potentially gain privileged access via local access.
[ "cpe:2.3:a:intel:vtune_amplifier:*:*:*:*:*:*:*:*", "cpe:2.3:a:intel:vtune_amplifier:2018:update1:*:*:*:*:*:*", "cpe:2.3:a:intel:vtune_amplifier:2018:update2:*:*:*:*:*:*", "cpe:2.3:a:intel:vtune_amplifier:2018:update3:*:*:*:*:*:*" ]
null
null
7.8
4.6
CVE-2024-41164
BIG-IP MPTCP vulnerability
When TCP profile with Multipath TCP enabled (MPTCP) is configured on a Virtual Server, undisclosed traffic along with conditions beyond the attackers control can cause TMM to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
[ "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_automation_toolchain:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_automation_toolchain:17.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_container_ingress_services:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_container_ingress_services:17.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_edge_gateway:17.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_next_cloud-native_network_functions:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*" ]
8.2
5.9
null
null
CVE-2023-47582
Access of uninitialized pointer vulnerability exists in TELLUS V4.0.17.0 and earlier and TELLUS Lite V4.0.17.0 and earlier. If a user opens a specially crafted file (X1, V8, or V9 file), information may be disclosed and/or arbitrary code may be executed.
[ "cpe:2.3:a:fujielectric:tellus:*:*:*:*:*:*:*:*", "cpe:2.3:a:fujielectric:tellus_lite:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2011-0702
The feh_unique_filename function in utils.c in feh before 1.11.2 might allow local users to overwrite arbitrary files via a symlink attack on a /tmp/feh_ temporary file.
[ "cpe:2.3:a:feh_project:feh:*:*:*:*:*:*:*:*", "cpe:2.3:a:feh_project:feh:1.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:feh_project:feh:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:feh_project:feh:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:feh_project:feh:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:feh_project:feh:1.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:feh_project:feh:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:feh_project:feh:1.6:*:*:*:*:*:*:*", "cpe:2.3:a:feh_project:feh:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:feh_project:feh:1.7:*:*:*:*:*:*:*", "cpe:2.3:a:feh_project:feh:1.8:*:*:*:*:*:*:*", "cpe:2.3:a:feh_project:feh:1.9:*:*:*:*:*:*:*", "cpe:2.3:a:feh_project:feh:1.10:*:*:*:*:*:*:*", "cpe:2.3:a:feh_project:feh:1.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:feh_project:feh:1.11:*:*:*:*:*:*:*" ]
null
null
null
3.3
CVE-2012-2546
Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Event Listener Use After Free Vulnerability."
[ "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:9:beta1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:9:rc1:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-w656-prjj-5pfc
Cross-site scripting (XSS) vulnerability in Outlook Web Access (OWA) in Microsoft Exchange Server 2013 Cumulative Update 8 and 9 allows remote attackers to inject arbitrary web script or HTML via a crafted e-mail message, aka "Exchange Spoofing Vulnerability."
[]
null
null
null
null
ICSA-23-348-06
Siemens OPC UA Implementation in SINUMERIK ONE and SINUMERIK MC
The OPC UA implementations (ANSI C and C++) in affected products contain an integer overflow vulnerability that could cause the application to run into an infinite loop during certificate validation. This could allow an unauthenticated remote attacker to create a denial of service condition by sending a specially crafted certificate.
[]
null
7.5
null
null
CVE-2011-0571
Adobe Flash Player before 10.2.152.26 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0559, CVE-2011-0560, CVE-2011-0561, CVE-2011-0572, CVE-2011-0573, CVE-2011-0574, CVE-2011-0578, CVE-2011-0607, and CVE-2011-0608.
[ "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:6.0.21.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.155.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.277.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.283.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.53.64:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.82.76:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.92.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.92.10:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.95.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.95.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-fx2c-x2mg-cjm2
The SecKeyDeriveFromPassword function in Apple OS X before 10.12 does not use the CF_RETURNS_RETAINED keyword, which allows attackers to obtain sensitive information from process memory by triggering key derivation.
[]
null
null
5.5
null
CVE-2024-45241
A traversal vulnerability in GeneralDocs.aspx in CentralSquare CryWolf (False Alarm Management) through 2024-08-09 allows unauthenticated attackers to read files outside of the working web directory via the rpt parameter, leading to the disclosure of sensitive information.
[ "cpe:2.3:a:centralsquare:crywolf:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2010-0700
Cross-site scripting (XSS) vulnerability in index.php in WampServer 2.0i allows remote attackers to inject arbitrary web script or HTML via the lang parameter.
[ "cpe:2.3:a:wampserver:wampserver:2.0i:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2005-4857
eZ publish 3.5 before 3.5.7, 3.6 before 3.6.5, 3.7 before 3.7.3, and 3.8 before 20051128 allows remote authenticated users to cause a denial of service (Apache httpd segmentation fault) via a request to content/advancedsearch.php with an empty SearchContentClassID parameter, reportedly related to a "memory addressing error".
[ "cpe:2.3:a:ez:ez_publish:*:*:*:*:*:*:*:*", "cpe:2.3:a:ez:ez_publish:3.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ez:ez_publish:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ez:ez_publish:3.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:ez:ez_publish:3.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:ez:ez_publish:3.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:ez:ez_publish:3.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:ez:ez_publish:3.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:ez:ez_publish:3.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:ez:ez_publish:3.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ez:ez_publish:3.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:ez:ez_publish:3.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:ez:ez_publish:3.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:ez:ez_publish:3.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:ez:ez_publish:3.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:ez:ez_publish:3.7.2:*:*:*:*:*:*:*" ]
null
null
null
4
GHSA-8fmx-5gmc-pfcw
In the Linux kernel, the following vulnerability has been resolved:net/smc: Fix possible leaked pernet namespace in smc_init()In smc_init(), register_pernet_subsys(&smc_net_stat_ops) is called without any error handling. If it fails, registering of &smc_net_ops won't be reverted. And if smc_nl_init() fails, &smc_net_stat_ops itself won't be reverted.This leaves wild ops in subsystem linkedlist and when another module tries to call register_pernet_operations() it triggers page fault:BUG: unable to handle page fault for address: fffffbfff81b964c RIP: 0010:register_pernet_operations+0x1b9/0x5f0 Call Trace: <TASK> register_pernet_subsys+0x29/0x40 ebtables_init+0x58/0x1000 [ebtables] ...
[]
null
null
null
null
cisco-sa-asaftd-frag-memleak-mCtqdP9n
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software IP Fragment Memory Leak Vulnerability
Update from October 22nd, 2020: Cisco has become aware of a new Cisco Adaptive Security Appliance vulnerability that could affect the fixed releases recommended for code trains 9.13 and 9.14 in the Fixed Software ["#fs"] section of this advisory. See the Cisco Adaptive Security Appliance Software SSL/TLS Denial of Service Vulnerability ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssl-dos-7uZWwSEy"] for additional information. A vulnerability in the IP fragment-handling implementation of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a memory leak on an affected device. This memory leak could prevent traffic from being processed through the device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper error handling when specific failures occur during IP fragment reassembly. An attacker could exploit this vulnerability by sending crafted, fragmented IP traffic to a targeted device. A successful exploit could allow the attacker to continuously consume memory on the affected device and eventually impact traffic, resulting in a DoS condition. The device could require a manual reboot to recover from the DoS condition. Note: This vulnerability applies to both IP Version 4 (IPv4) and IP Version 6 (IPv6) traffic. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is part of the October 2020 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication, which includes 17 Cisco Security Advisories that describe 17 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: October 2020 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74302"].
[]
null
8.6
null
null
RHSA-2021:0975
Red Hat Security Advisory: pki-core security update
pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab pki-core: Reflected XSS in getcookies?url= endpoint in CA pki-core: KRA vulnerable to reflected XSS via the getPk12 page pki-core: XSS in the certificate search results pki-core: Unprivileged users can renew any certificate
[ "cpe:/o:redhat:rhel_eus:7.7::computenode", "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
8.1
4.7
null
CVE-2024-37335
Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:sql_2016_azure_connect_feature_pack:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*" ]
null
8.8
null
null
CVE-2024-28919
Secure Boot Security Feature Bypass Vulnerability
Secure Boot Security Feature Bypass Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*" ]
null
6.7
null
null
CVE-2022-30912
H3C Magic R100 R100V100R005 was discovered to contain a stack overflow vulnerability via the UpdateWanParams parameter at /goform/aspForm.
[ "cpe:2.3:o:h3c:magic_r100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:h3c:magic_r100:-:*:*:*:*:*:*:*" ]
null
9.8
null
10
GHSA-2jf3-v47p-px69
Missing Authorization vulnerability in Creative Motion Robin image optimizer allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Robin image optimizer: from n/a through 1.6.9.
[]
null
6.5
null
null
GHSA-4cqx-cgrq-mp79
An issue was discovered in Tigergraph Enterprise 3.7.0. The GSQL query language provides users with the ability to write data to files on a remote TigerGraph server. The locations that a query is allowed to write to are configurable via the GSQL.FileOutputPolicy configuration setting. GSQL queries that contain UDFs can bypass this configuration setting and, as a consequence, can write to any file location to which the administrative user has access.
[]
null
8.8
null
null
GHSA-m8wf-6v9r-jp64
Xerox AtlaLink B8045/B8055/B8065/B8075/B8090 C8030/C8035/C8045/C8055/C8070 printers with software before 101.00x.089.22600 allow an attacker to gain privileges.
[]
null
9.8
null
null
GHSA-qvv2-vrvp-prm4
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Clodeo Shipdeo allows Reflected XSS. This issue affects Shipdeo: from n/a through 1.2.8.
[]
null
7.1
null
null
GHSA-9rwv-75v6-rq79
SQL injection vulnerability in the getUserUddiElements method in the ES UDDI component in SAP NetWeaver AS Java 7.4 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors, aka SAP Security Note 2356504.
[]
null
8.8
null
null
GHSA-rx29-m355-55hm
admin/management.html in PineApp Mail-SeCure allows remote attackers to bypass authentication and perform a sys_usermng operation via the it parameter.
[]
null
null
null
null
GHSA-9rvc-r3x4-4h9r
The insert-or-embed-articulate-content-into-wordpress plugin before 4.2999 for WordPress has insufficient restrictions on file upload.
[]
null
null
8.8
null
CVE-2017-13786
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "APFS" component. It does not properly restrict the DMA mapping time of FileVault decryption buffers, which allows attackers to read cleartext APFS data via a crafted Thunderbolt adapter.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
null
4.6
2.1
CVE-2000-0695
Buffer overflows in pgxconfig in the Raptor GFX configuration tool allow local users to gain privileges via command line options.
[ "cpe:2.3:a:tech-source:raptor_gfx_pgx32:2.3.1:*:*:*:*:*:*:*" ]
null
null
null
7.2
GHSA-wgj7-925j-3jf6
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, when updating custom EDID (hdmi_tx_sysfs_wta_edid), if edid_size, which is controlled by userspace, is too large, a buffer overflow occurs.
[]
null
null
7.8
null
GHSA-xf23-357c-2vmh
Mozilla Firefox before 35.0 on Windows allows remote attackers to bypass the Gecko Media Plugin (GMP) sandbox protection mechanism by leveraging access to the GMP process, as demonstrated by the OpenH264 plugin's process.
[]
null
null
null
null
RHSA-2020:0026
Red Hat Security Advisory: kpatch-patch security update
hw: Machine Check Error on Page Size Change (IFU) hw: TSX Transaction Asynchronous Abort (TAA)
[ "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
null
6.5
null
GHSA-5vf7-q87h-pg6w
Cross-Site Scripting in BookStack
ImpactA user with permission to create comments could POST HTML directly to the system to be saved in a comment, which would then be executed/displayed to others users viewing the comment. Through this vulnerability custom JavaScript code could be injected and therefore ran on other user machines.This most impacts scenarios where not-trusted users are given permission to create comments.PatchesThe issue was addressed in BookStack v0.29.2.After upgrading, The command `php artisan bookstack:regenerate-comment-content` should be ran to remove any pre-existing dangerous content.WorkaroundsComments can be disabled in the system settings to prevent them being shown to users. Alternatively, comment creation permissions can be altered as required to only those who are trusted but this will not address existing exploitation of this vulnerability.References[BookStack Beta v0.29.2](https://github.com/BookStackApp/BookStack/releases/tag/v0.29.2)JVN#41035278[BookStack Blog Post](https://bookstackapp.com/blog/beta-release-v0-29-2/)For more informationIf you have any questions or comments about this advisory:Open an issue in [the BookStack GitHub repository](BookStackApp/BookStack/issues).Ask on the [BookStack Discord chat](https://discord.gg/ztkBqR2).Follow the [BookStack Security Advice](https://github.com/BookStackApp/BookStack#-security) to contact someone privately.
[]
null
6.3
null
null
CVE-2006-4307
Unspecified vulnerability in the format command in Sun Solaris 8 and 9 before 20060821 allows local users to modify arbitrary files via unspecified vectors involving profiles that permit running format with elevated privileges, a different issue than CVE-2006-4306 and CVE-2006-4319.
[ "cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*" ]
null
null
null
7.2
CVE-2024-22405
XADMaster may not apply quarantine attribute correctly to extracted files
XADMaster is an objective-C library for archive and file unarchiving and extraction. When extracting a specially crafted zip archive XADMaster may not apply quarantine attribute correctly. Such behaviour may circumvent Gatekeeper checks on the system. Only macOS installations are affected. This issue was fixed in XADMaster 1.10.8. It is recommended to upgrade to the latest version. There are no known workarounds for this issue.
[ "cpe:2.3:a:macpaw:xadmaster:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2010-0988
Multiple unspecified vulnerabilities in Pulse CMS before 1.2.3 allow (1) remote attackers to write to arbitrary files and execute arbitrary PHP code via vectors related to improper handling of login failures by includes/login.php; and allow remote authenticated users to write to arbitrary files and execute arbitrary PHP code via vectors involving the (2) filename and (3) block parameters to view.php.
[ "cpe:2.3:a:pulsecms:pulse_cms:*:*:*:*:*:*:*:*", "cpe:2.3:a:pulsecms:pulse_cms:1.0:-:*:*:*:*:*:*", "cpe:2.3:a:pulsecms:pulse_cms:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:pulsecms:pulse_cms:1.01:*:*:*:*:*:*:*", "cpe:2.3:a:pulsecms:pulse_cms:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:pulsecms:pulse_cms:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:pulsecms:pulse_cms:1.15:*:*:*:*:*:*:*", "cpe:2.3:a:pulsecms:pulse_cms:1.16:*:*:*:*:*:*:*", "cpe:2.3:a:pulsecms:pulse_cms:1.17:*:*:*:*:*:*:*", "cpe:2.3:a:pulsecms:pulse_cms:1.18:*:*:*:*:*:*:*" ]
null
null
null
6
GHSA-gvrm-w2f9-f77q
Ingress-nginx path sanitization can be bypassed
Ingress-nginx `path` sanitization can be bypassed with `log_format` directive.
[]
null
8.8
null
null
CVE-2015-7348
Cross-site scripting (XSS) vulnerability in zTree 3.5.19.1 and possibly earlier allows remote attackers to inject arbitrary web script or HTML via the id parameter to demo/en/asyncData/getNodesForBigData.php.
[ "cpe:2.3:a:ztree_project:ztree:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2016-5283
Mozilla Firefox before 49.0 allows remote attackers to bypass the Same Origin Policy via a crafted fragment identifier in the SRC attribute of an IFRAME element, leading to insufficient restrictions on link-color information after a document is resized.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
CVE-2024-43354
WordPress myCred plugin <= 2.7.2 - PHP Object Injection vulnerability
Deserialization of Untrusted Data vulnerability in myCred allows Object Injection.This issue affects myCred: from n/a through 2.7.2.
[ "cpe:2.3:a:mycred:mycred:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2021-38574
An issue was discovered in Foxit Reader and PhantomPDF before 10.1.4. It allows SQL Injection via crafted data at the end of a string.
[ "cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2024-53186
ksmbd: fix use-after-free in SMB request handling
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in SMB request handling A race condition exists between SMB request handling in `ksmbd_conn_handler_loop()` and the freeing of `ksmbd_conn` in the workqueue handler `handle_ksmbd_work()`. This leads to a UAF. - KASAN: slab-use-after-free Read in handle_ksmbd_work - KASAN: slab-use-after-free in rtlock_slowlock_locked This race condition arises as follows: - `ksmbd_conn_handler_loop()` waits for `conn->r_count` to reach zero: `wait_event(conn->r_count_q, atomic_read(&conn->r_count) == 0);` - Meanwhile, `handle_ksmbd_work()` decrements `conn->r_count` using `atomic_dec_return(&conn->r_count)`, and if it reaches zero, calls `ksmbd_conn_free()`, which frees `conn`. - However, after `handle_ksmbd_work()` decrements `conn->r_count`, it may still access `conn->r_count_q` in the following line: `waitqueue_active(&conn->r_count_q)` or `wake_up(&conn->r_count_q)` This results in a UAF, as `conn` has already been freed. The discovery of this UAF can be referenced in the following PR for syzkaller's support for SMB requests.
[]
null
7.8
null
null
CVE-2019-4295
IBM Robotic Process Automation with Automation Anywhere 11 could allow an attacker with specialized access to obtain highly sensitive from the credential vault. IBM X-Force ID: 160758.
[ "cpe:2.3:a:ibm:robotic_process_automation_with_automation_anywhere:*:*:*:*:*:*:*:*" ]
null
null
4.9
null
GHSA-3p7f-hw68-ph5v
Nullsoft SHOUTcast server stores the administrative password in plaintext in a configuration file (sc_serv.conf), which could allow a local user to gain administrative privileges on the server.
[]
null
null
null
null
CVE-2021-38144
An issue was discovered in Form Tools through 3.0.20. A low-privileged user can trigger Reflected XSS when a viewing a form via the submission_id parameter, e.g., clients/forms/edit_submission.php?form_id=1&view_id=1&submission_id=[XSS].
[ "cpe:2.3:a:formtools:core:*:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
GHSA-4vq9-rwg9-vq6x
Insertion of Sensitive Information Into Sent Data vulnerability in AppExperts AppExperts – WordPress to Mobile App – WooCommerce to iOs and Android Apps allows Retrieve Embedded Sensitive Data. This issue affects AppExperts – WordPress to Mobile App – WooCommerce to iOs and Android Apps: from n/a through 1.4.3.
[]
null
5.3
null
null
GHSA-4x83-5gw5-q346
Zope Object Database (ZODB) vulnerable to arbitrary Python code execution in ZEO storage servers
Unspecified vulnerability in Zope Object Database (ZODB) before 3.8.2, when certain Zope Enterprise Objects (ZEO) database sharing is enabled, allows remote attackers to execute arbitrary Python code via vectors involving the ZEO network protocol.
[]
9.3
9.8
null
null
GHSA-fv65-j2g7-x89x
Access Control vulnerability in Upqode Plum: Spin Wheel & Email Pop-up allows .This issue affects Plum: Spin Wheel & Email Pop-up: from n/a through 2.0.
[]
null
5.3
null
null
CVE-2016-2487
libstagefright in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-06-01 allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 27833616.
[ "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
GHSA-fpp8-fhh9-hwrp
Cross-site request forgery (CSRF) vulnerability in TWiki before 4.3.2 allows remote attackers to hijack the authentication of arbitrary users for requests that update pages, as demonstrated by a URL for a save script in the ACTION attribute of a FORM element, in conjunction with a call to the submit method in the onload attribute of a BODY element. NOTE: this issue exists because of an insufficient fix for CVE-2009-1339.
[]
null
null
null
null
CVE-2018-5152
WebExtensions with the appropriate permissions can attach content scripts to Mozilla sites such as accounts.firefox.com and listen to network traffic to the site through the "webRequest" API. For example, this allows for the interception of username and an encrypted password during login to Firefox Accounts. This issue does not expose synchronization traffic directly and is limited to the process of user login to the website and the data displayed to the user once logged in. This vulnerability affects Firefox < 60.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" ]
null
null
6.5
4.3
GHSA-583h-x99p-fmcc
Power Distribution Units running on Powertek firmware (multiple brands) before 3.30.30 allows remote authorization bypass in the web interface. To exploit the vulnerability, an attacker must send an HTTP packet to the data retrieval interface (/cgi/get_param.cgi) with the tmpToken cookie set to an empty string followed by a semicolon. This bypasses an active session authorization check. This can be then used to fetch the values of protected sys.passwd and sys.su.name fields that contain the username and password in cleartext.
[]
null
7.5
null
null
CVE-2020-4682
IBM MQ 7.5, 8.0, 9.0, 9.1, 9.2 LTS, and 9.2 CD could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization of trusted data. An attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 186509.
[ "cpe:2.3:a:ibm:mq:8.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:mq:8.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:mq:8.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:mq:8.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:mq:8.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:mq:8.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:mq:8.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:mq:8.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:mq:8.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:mq:8.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:mq:8.0.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:mq:8.0.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:mq:8.0.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:mq:8.0.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:mq:8.0.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:mq:8.0.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:mq:9.0.0.0:*:*:*:lts:*:*:*", "cpe:2.3:a:ibm:mq:9.0.0.1:*:*:*:lts:*:*:*", "cpe:2.3:a:ibm:mq:9.0.0.2:*:*:*:lts:*:*:*", "cpe:2.3:a:ibm:mq:9.0.0.3:*:*:*:lts:*:*:*", "cpe:2.3:a:ibm:mq:9.0.0.4:*:*:*:lts:*:*:*", "cpe:2.3:a:ibm:mq:9.0.0.5:*:*:*:lts:*:*:*", "cpe:2.3:a:ibm:mq:9.0.0.6:*:*:*:lts:*:*:*", "cpe:2.3:a:ibm:mq:9.0.0.7:*:*:*:lts:*:*:*", "cpe:2.3:a:ibm:mq:9.0.0.8:*:*:*:lts:*:*:*", "cpe:2.3:a:ibm:mq:9.0.0.9:*:*:*:lts:*:*:*", "cpe:2.3:a:ibm:mq:9.0.0.10:*:*:*:lts:*:*:*", "cpe:2.3:a:ibm:mq:9.1.0.0:*:*:*:lts:*:*:*", "cpe:2.3:a:ibm:mq:9.1.0.1:*:*:*:lts:*:*:*", "cpe:2.3:a:ibm:mq:9.1.0.2:*:*:*:lts:*:*:*", "cpe:2.3:a:ibm:mq:9.1.0.3:*:*:*:lts:*:*:*", "cpe:2.3:a:ibm:mq:9.1.0.4:*:*:*:lts:*:*:*", "cpe:2.3:a:ibm:mq:9.1.0.5:*:*:*:lts:*:*:*", "cpe:2.3:a:ibm:mq:9.1.0.6:*:*:*:lts:*:*:*", "cpe:2.3:a:ibm:mq:9.2.0.0:*:*:*:continuous_delivery:*:*:*", "cpe:2.3:a:ibm:mq:9.2.1.0:*:*:*:continuous_delivery:*:*:*", "cpe:2.3:a:ibm:mq_appliance:9.2.0.0:*:*:*:lts:*:*:*", "cpe:2.3:a:ibm:websphere_mq:7.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_mq:7.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_mq:7.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_mq:7.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_mq:7.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_mq:7.5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_mq:7.5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_mq:7.5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_mq:7.5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_mq:7.5.0.9:*:*:*:*:*:*:*" ]
null
null
8.1
null
CVE-2008-5743
pdfjam creates the (1) pdf90, (2) pdfjoin, and (3) pdfnup files with a predictable name, which allows local users to overwrite arbitrary files via a symlink attack.
[ "cpe:2.3:a:pdfjam:pdfjam:_nil_:*:*:*:*:*:*:*" ]
null
null
null
6.9
RHSA-2023:0354
Red Hat Security Advisory: OpenJDK 8u362 Windows Security Update
OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) OpenJDK: soundbank URL remote loading (Sound, 8293742)
[ "cpe:/a:redhat:openjdk:1.8::windows" ]
null
3.7
null
null
CVE-2025-4892
code-projects Police Station Management System Delete Record source.cpp remove stack-based overflow
A vulnerability was found in code-projects Police Station Management System 1.0. It has been declared as critical. Affected by this vulnerability is the function criminal::remove of the file source.cpp of the component Delete Record. The manipulation of the argument No leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.
[]
4.8
5.3
5.3
4.3
CVE-2020-12276
GitLab 9.5.9 through 12.9 is vulnerable to stored XSS in an admin notification feature.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ]
null
4.8
null
3.5
RHSA-2010:0807
Red Hat Security Advisory: java-1.5.0-ibm security update
TLS: MITM attacks via session renegotiation krb5: null pointer dereference in GSS-API library leads to DoS (MITKRB5-SA-2010-005) OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) OpenJDK DNS server IP address information leak (6957564) OpenJDK HttpURLConnection request splitting (6952017) JDK unspecified vulnerability in Java Web Start component OpenJDK local network address disclosure (6952603) JDK unspecified vulnerability in 2D component JDK unspecified vulnerability in Sound component OpenJDK IndexColorModel double-free (6925710) OpenJDK JPEG writeImage remote code execution (6963023) OpenJDK ICC Profile remote code execution (6963489) OpenJDK Deserialization Race condition (6559775) OpenJDK Serialization inconsistencies (6966692) JDK unspecified vulnerability in Sound component OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) OpenJDK HttpURLConnection incomplete TRACE permission check (6981426)
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
CVE-2023-28392
Wi-Fi AP UNIT AC-PD-WAPU v1.05_B04 and earlier, AC-PD-WAPUM v1.05_B04 and earlier, AC-PD-WAPU-P v1.05_B04P and earlier, AC-PD-WAPUM-P v1.05_B04P and earlier, AC-WAPU-300 v1.00_B07 and earlier, AC-WAPU-300-P v1.00_B08P and earlier, AC-WAPUM-300 v1.00_B07 and earlier, and AC-WAPUM-300-P v1.00_B08P and earlier allow an authenticated user with an administrative privilege to execute an arbitrary OS command.
[ "cpe:2.3:o:inaba:ac-wapu-300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:inaba:ac-wapu-300:-:*:*:*:*:*:*:*", "cpe:2.3:o:inaba:ac-wapu-300-p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:inaba:ac-wapu-300-p:-:*:*:*:*:*:*:*", "cpe:2.3:o:inaba:ac-wapum-300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:inaba:ac-wapum-300:-:*:*:*:*:*:*:*", "cpe:2.3:o:inaba:ac-wapum-300-p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:inaba:ac-wapum-300-p:-:*:*:*:*:*:*:*" ]
null
7.2
null
null
CVE-2024-5459
Restaurant Menu and Food Ordering <= 2.4.16 - Missing Authorization to Menu Creation
The Restaurant Menu and Food Ordering plugin for WordPress is vulnerable to unauthorized creation of data due to a missing capability check on 'add_section', 'add_menu', 'add_menu_item', and 'add_menu_page' functions in all versions up to, and including, 2.4.16. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create menu sections, menus, food items, and new menu pages.
[ "cpe:2.3:a:fivestarplugins:five_star_restaurant_menu:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
CVE-2024-26804
net: ip_tunnel: prevent perpetual headroom growth
In the Linux kernel, the following vulnerability has been resolved: net: ip_tunnel: prevent perpetual headroom growth syzkaller triggered following kasan splat: BUG: KASAN: use-after-free in __skb_flow_dissect+0x19d1/0x7a50 net/core/flow_dissector.c:1170 Read of size 1 at addr ffff88812fb4000e by task syz-executor183/5191 [..] kasan_report+0xda/0x110 mm/kasan/report.c:588 __skb_flow_dissect+0x19d1/0x7a50 net/core/flow_dissector.c:1170 skb_flow_dissect_flow_keys include/linux/skbuff.h:1514 [inline] ___skb_get_hash net/core/flow_dissector.c:1791 [inline] __skb_get_hash+0xc7/0x540 net/core/flow_dissector.c:1856 skb_get_hash include/linux/skbuff.h:1556 [inline] ip_tunnel_xmit+0x1855/0x33c0 net/ipv4/ip_tunnel.c:748 ipip_tunnel_xmit+0x3cc/0x4e0 net/ipv4/ipip.c:308 __netdev_start_xmit include/linux/netdevice.h:4940 [inline] netdev_start_xmit include/linux/netdevice.h:4954 [inline] xmit_one net/core/dev.c:3548 [inline] dev_hard_start_xmit+0x13d/0x6d0 net/core/dev.c:3564 __dev_queue_xmit+0x7c1/0x3d60 net/core/dev.c:4349 dev_queue_xmit include/linux/netdevice.h:3134 [inline] neigh_connected_output+0x42c/0x5d0 net/core/neighbour.c:1592 ... ip_finish_output2+0x833/0x2550 net/ipv4/ip_output.c:235 ip_finish_output+0x31/0x310 net/ipv4/ip_output.c:323 .. iptunnel_xmit+0x5b4/0x9b0 net/ipv4/ip_tunnel_core.c:82 ip_tunnel_xmit+0x1dbc/0x33c0 net/ipv4/ip_tunnel.c:831 ipgre_xmit+0x4a1/0x980 net/ipv4/ip_gre.c:665 __netdev_start_xmit include/linux/netdevice.h:4940 [inline] netdev_start_xmit include/linux/netdevice.h:4954 [inline] xmit_one net/core/dev.c:3548 [inline] dev_hard_start_xmit+0x13d/0x6d0 net/core/dev.c:3564 ... The splat occurs because skb->data points past skb->head allocated area. This is because neigh layer does: __skb_pull(skb, skb_network_offset(skb)); ... but skb_network_offset() returns a negative offset and __skb_pull() arg is unsigned. IOW, we skb->data gets "adjusted" by a huge value. The negative value is returned because skb->head and skb->data distance is more than 64k and skb->network_header (u16) has wrapped around. The bug is in the ip_tunnel infrastructure, which can cause dev->needed_headroom to increment ad infinitum. The syzkaller reproducer consists of packets getting routed via a gre tunnel, and route of gre encapsulated packets pointing at another (ipip) tunnel. The ipip encapsulation finds gre0 as next output device. This results in the following pattern: 1). First packet is to be sent out via gre0. Route lookup found an output device, ipip0. 2). ip_tunnel_xmit for gre0 bumps gre0->needed_headroom based on the future output device, rt.dev->needed_headroom (ipip0). 3). ip output / start_xmit moves skb on to ipip0. which runs the same code path again (xmit recursion). 4). Routing step for the post-gre0-encap packet finds gre0 as output device to use for ipip0 encapsulated packet. tunl0->needed_headroom is then incremented based on the (already bumped) gre0 device headroom. This repeats for every future packet: gre0->needed_headroom gets inflated because previous packets' ipip0 step incremented rt->dev (gre0) headroom, and ipip0 incremented because gre0 needed_headroom was increased. For each subsequent packet, gre/ipip0->needed_headroom grows until post-expand-head reallocations result in a skb->head/data distance of more than 64k. Once that happens, skb->network_header (u16) wraps around when pskb_expand_head tries to make sure that skb_network_offset() is unchanged after the headroom expansion/reallocation. After this skb_network_offset(skb) returns a different (and negative) result post headroom expansion. The next trip to neigh layer (or anything else that would __skb_pull the network header) makes skb->data point to a memory location outside skb->head area. v2: Cap the needed_headroom update to an arbitarily chosen upperlimit to prevent perpetual increase instead of dropping the headroom increment completely.
[]
null
5.3
null
null
GHSA-qcg7-x5r6-58hf
IBM Rational AppScan Enterprise 5.x and 8.x before 8.5.0.1, when Integrated Windows authentication is used, allows remote authenticated users to obtain administrative privileges by hijacking a session associated with the service account.
[]
null
null
null
null
CVE-2024-0467
code-projects Employee Profile Management System edit_position_query.php cross site scripting
A vulnerability, which was classified as problematic, was found in code-projects Employee Profile Management System 1.0. Affected is an unknown function of the file edit_position_query.php. The manipulation of the argument pos_name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250572.
[ "cpe:2.3:a:carmelogarcia:employee_profile_management_system:1.0:*:*:*:*:*:*:*" ]
null
3.5
3.5
4
GHSA-g42j-f43v-6x6m
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in iThemes WPComplete plugin <= 2.9.2 versions.
[]
null
6.1
null
null
CVE-2008-4075
Directory traversal vulnerability in index.php in D-iscussion Board 3.01 allows remote attackers to read arbitrary files via a .. (dot dot) in the topic parameter.
[ "cpe:2.3:a:dino:d-iscussion_board:3.01:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2015-6763
Multiple unspecified vulnerabilities in Google Chrome before 46.0.2490.71 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-hppc-rpfp-r8qw
Magento 2 Community Edition SSRF vulnerability
A server-side request forgery (SSRF) vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This can be exploited by an authenticated user with admin privileges to manipulate shipment methods to execute arbitrary code.
[]
null
null
7.2
null
GHSA-3c2h-px55-3fmw
netentsec NS-ASG 6.3 is vulnerable to SQL Injection via /3g/index.php.
[]
null
8.8
null
null
CVE-2020-7456
In FreeBSD 12.1-STABLE before r361918, 12.1-RELEASE before p6, 11.4-STABLE before r361919, 11.3-RELEASE before p10, and 11.4-RC2 before p1, an invalid memory location may be used for HID items if the push/pop level is not restored within the processing of that HID item allowing an attacker with physical access to a USB port to be able to use a specially crafted USB device to gain kernel or user-space code execution.
[ "cpe:2.3:o:freebsd:freebsd:11.3:-:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:11.3:p1:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:11.3:p2:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:11.3:p3:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:11.3:p4:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:11.3:p5:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:11.3:p6:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:11.3:p7:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:11.3:p8:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:11.3:p9:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:11.4:rc1:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:11.4:rc2:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:12.1:-:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:12.1:p1:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:12.1:p2:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:12.1:p3:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:12.1:p4:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:12.1:p5:*:*:*:*:*:*", "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*" ]
null
6.8
null
7.2
GHSA-h3vq-5r52-r6hp
Privilege escalation vulnerability in the AMS module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
[]
null
7.8
null
null
GHSA-hpwr-8p93-377c
Cross-site scripting (XSS) vulnerability in Synology DiskStation Manager (DSM) before 5.2-5565 Update 1 allows remote attackers to inject arbitrary web script or HTML via the "compound" parameter to entry.cgi.
[]
null
null
null
null
GHSA-gr79-qrm5-4ph8
NULL pointer dereference in the MMS Client in MZ Automation LibIEC1850 before commit 7afa40390b26ad1f4cf93deaa0052fe7e357ef33 allows a malicious server to Cause a Denial-of-Service via the MMS InitiationResponse message.
[]
null
7.5
null
null
CVE-2007-2092
Direct static code injection vulnerability in index.php in Limesoft Guestbook (LS Simple Guestbook) allows remote attackers to inject arbitrary PHP code into posts.txt via the name parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:limesoft:limesoft_guestbook:1.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
RHSA-2013:1024
Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.3.3 security update
python-qpid: client does not validate qpid server TLS/SSL certificate
[ "cpe:/a:redhat:enterprise_mrg:2:computenode:el6", "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
CVE-2025-21689
USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb()
In the Linux kernel, the following vulnerability has been resolved: USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb() This patch addresses a null-ptr-deref in qt2_process_read_urb() due to an incorrect bounds check in the following: if (newport > serial->num_ports) { dev_err(&port->dev, "%s - port change to invalid port: %i\n", __func__, newport); break; } The condition doesn't account for the valid range of the serial->port buffer, which is from 0 to serial->num_ports - 1. When newport is equal to serial->num_ports, the assignment of "port" in the following code is out-of-bounds and NULL: serial_priv->current_port = newport; port = serial->port[serial_priv->current_port]; The fix checks if newport is greater than or equal to serial->num_ports indicating it is out-of-bounds.
[]
null
5.5
null
null
CVE-2023-42700
In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed
[ "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2009-1045
requests/status.xml in VLC 0.9.8a allows remote attackers to cause a denial of service (stack consumption and crash) via a long input argument in an in_play action.
[ "cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2013-3782
Unspecified vulnerability in the Secure Global Desktop component in Oracle Virtualization 4.6 prior to 4.63 and 4.7 prior to 4.71 allows remote attackers to affect integrity via unknown vectors related to Web UI.
[ "cpe:2.3:a:oracle:virtualization:4.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:virtualization:4.7:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-hpjg-3g2h-99x2
Unspecified vulnerability in the OJVM component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.
[]
null
null
null
null
CVE-2008-0502
PHP remote file inclusion vulnerability in templates/Official/part_userprofile.php in Connectix Boards 0.8.2 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the template_path parameter.
[ "cpe:2.3:a:connectix:connectix_boards:*:*:*:*:*:*:*:*", "cpe:2.3:a:connectix:connectix_boards:0.8.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
RHSA-2022:6206
Red Hat Security Advisory: systemd security update
systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
9.8
null
null
CVE-2022-26952
Digi Passport Firmware through 1.5.1,1 is affected by a buffer overflow in the function for building the Location header string when an unauthenticated user is redirected to the authentication page.
[ "cpe:2.3:o:digi:passport_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:digi:passport:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-mw28-cg9v-9xmq
SQLi and XSS in Huge IT catalog extension v1.0.4 for Joomla
[]
null
null
7.2
null