id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
RHSA-2013:0232 | Red Hat Security Advisory: JBoss Enterprise Application Platform 5.2.0 security update | JBoss: allows empty password to authenticate against LDAP | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5.2.0"
] | null | null | null | null |
CVE-2001-0849 | viralator CGI script in Viralator 0.9pre1 and earlier allows remote attackers to execute arbitrary code via a URL for a file being downloaded, which is insecurely passed to a call to wget. | [
"cpe:2.3:a:duncan_hall:viralator:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:duncan_hall:viralator:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:duncan_hall:viralator:0.9_pre1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2021-38454 | Moxa MXview Network Management Software | A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries. | [
"cpe:2.3:a:moxa:mxview:*:*:*:*:*:*:*:*"
] | null | 10 | null | null |
CVE-2022-32250 | net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
RHSA-2016:0277 | Red Hat Security Advisory: rhev-hypervisor security update | glibc: getaddrinfo stack-based buffer overflow | [
"cpe:/o:redhat:enterprise_linux:6::hypervisor",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | null | null |
CVE-2023-22883 | Local Privilege Escalation in Zoom for Windows Installers | Zoom Client for IT Admin Windows installers before version 5.13.5 contain a local privilege escalation vulnerability. A local low-privileged user could exploit this vulnerability in an attack chain during the installation process to escalate their privileges to the SYSTEM user. | [
"cpe:2.3:a:zoom:meetings:*:*:*:*:*:windows:*:*"
] | null | 7.2 | null | null |
GHSA-2qrr-c2gh-pr35 | Wikimedia information leak vulnerability | Wikimedia MediaWiki 1.23.0 through 1.32.1 has an information leak. Privileged API responses that include whether a recent change has been patrolled may be cached publicly. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6. | [] | null | null | 7.5 | null |
RHSA-2025:4552 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.22 security update | netty: Denial of Service attack on windows app using Netty org.wildfly.core:wildfly-server: Wildfly improper RBAC permission io.netty:netty-handler: SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine netty: Denial of Service attack on windows app using Netty | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
] | null | 5.5 | null | null |
GHSA-vrf2-2g4q-984g | PDF-XChange Editor PDF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PDF files. Crafted data in a PDF file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17765. | [] | null | null | 7.8 | null |
|
GHSA-3p73-75xq-v9wv | An unauthenticated remote attacker can write memory out of bounds due to improper input validation in the MQTT stack. The brute force attack is not always successful because of memory randomization. | [] | null | 7.4 | null | null |
|
GHSA-prmc-5v5w-c465 | Client TLS credentials sent raw to server in npm package nats | Nats is a Node.js client for the NATS messaging system.Problem Description_Preview versions_ of two NPM packages and one Deno package from the NATS project contain an information disclosure flaw, leaking options to the NATS server; for one package, this includes TLS private credentials.The _connection_ configuration options in these JavaScript-based implementations were fully serialized and sent to the server in the client's `CONNECT` message, immediately after TLS establishment.The nats.js client supports Mutual TLS and the credentials for the TLS client key are included in the connection configuration options; disclosure of the client's TLS private key to the server has been observed.Most authentication mechanisms are handled after connection, instead of as part of connection, so other authentication mechanisms are unaffected.
For clarity: NATS account NKey authentication **is NOT affected**.Neither the nats.ws nor the nats.deno clients support Mutual TLS: the affected versions listed below are those where the logic flaw is
present. We are including the nats.ws and nats.deno versions out of an abundance of caution, as library maintainers, but rate as minimal the likelihood of applications leaking sensitive data.Affected versionsSecurity impactNPM package nats.js:**mainline is unaffected**beta branch is vulnerable from 2.0.0-201, fixed in 2.0.0-209Logic flawNPM package nats.ws:status: previewflawed from 1.0.0-85, fixed in 1.0.0-111Deno repository https://github.com/nats-io/nats.denostatus: previewflawed in all git tags prior to fixfixed with git tag v1.0.0-9ImpactFor deployments using TLS client certificates (for mutual TLS), private key material for TLS is leaked from the client application to the
server. If the server is untrusted (run by a third party), or if the client application also disables TLS verification (and so the true identity of the server is unverifiable) then authentication credentials are leaked.Workaround*None*SolutionUpgrade your package dependencies to fixed versions, and then reissue any TLS client credentials (with new keys, not just new certificates) and revoke the old ones. | [] | null | null | null | null |
CVE-2022-31641 | Potential vulnerabilities have been identified in the system BIOS of certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure. | [
"cpe:2.3:o:hp:elite_dragonfly_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_dragonfly:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_dragonfly_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_dragonfly_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x2_1012_g2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x2_1012_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x2_1013_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x2_1013_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x2_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x2_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x360_1040_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x360_1040_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x360_830_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x360_830_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_1040_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_1040_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_1040_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_1040_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_1050_g1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_1050_g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_630_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_630_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_640_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_640_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_645_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_645_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_650_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_650_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_655_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_655_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_725_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_725_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_735_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_735_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_735_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_735_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_745_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_745_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_745_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_745_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_745_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_745_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_755_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_755_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_755_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_755_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_820_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_820_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_828_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_828_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_830_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_830_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_830_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_830_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_830_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_830_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_835_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_835_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_836_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_836_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_836_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_836_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g5_healthcare_edition_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g5_healthcare_edition:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g6_healthcare_edition_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g6_healthcare_edition:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840r_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840r_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_845_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_845_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_846_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_846_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_846_g5_healthcare_edition_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_846_g5_healthcare_edition:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_846r_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_846r_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_848_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_848_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_850_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_850_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_850_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_850_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_850_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_850_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_860_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_860_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_865_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_865_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1020_g2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1020_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1030_g2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1030_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1030_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1030_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1030_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1030_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1040_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1040_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1040_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1040_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_830_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_830_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_830_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_830_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_x2_612_g2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_x2_612_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_x360_fortis_g10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_x360_fortis_g10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_x360_fortis_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_x360_fortis_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_430_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_430_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_430_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_430_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_430_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_430_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_445_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_445_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_445_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_445_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_445r_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_445r_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_455_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_455_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_455_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_455_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_455_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_455_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_455_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_455_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_455r_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_455r_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_470_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_470_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_470_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_470_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_640_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_640_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_640_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_640_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_640_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_640_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_645_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_645_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_645_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_645_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_650_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_650_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_650_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_650_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_650_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_650_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_655_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_655_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_fortis_g10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_fortis_g10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_fortis_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_fortis_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_11_g2_ee_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_11_g2_ee:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_11_g3_ee_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_11_g3_ee:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_11_g4_ee_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_11_g4_ee:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_11_g5_ee_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_11_g5_ee:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_11_g6_ee_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_11_g6_ee:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_440_g1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_440_g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_14u_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_14u_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_14u_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_14u_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15u_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15u_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15u_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15u_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_17_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_17_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_17_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_17_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_17_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_17_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_firefly_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_firefly_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_fury_16_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_fury_16_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_power_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_power_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_studio_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_studio_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_studio_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_studio_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_studio_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_studio_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_studio_x360_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_studio_x360_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_x2_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_x2_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_13_g2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_13_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_14_g2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_14_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_15_g2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_15_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_a_14_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_a_14_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_a_14_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_a_14_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_g1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_x_13_g2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_x_13_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_dragonfly_g2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_dragonfly_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_dragonfly_max_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_dragonfly_max:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x2_g8__firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x2_g8_:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_830_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_830_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_830_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_830_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_835_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_835_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_835_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_835_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_aero_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_aero_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_845_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_845_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_845_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_845_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_850_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_850_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_850_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_850_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_855_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_855_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_855_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_855_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1030_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1030_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1030_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1030_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1040_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1040_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1040_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1040_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_830_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_830_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_830_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_830_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_430_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_430_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_430_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_430_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_445_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_445_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_445_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_445_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_455_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_455_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_455_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_455_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_630_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_630_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_635_aero_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_635_aero_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_635_aero_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_635_aero_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_640_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_640_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_640_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_640_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_650_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_650_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_650_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_650_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_11_g7_ee_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_11_g7_ee:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_435_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_435_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_435_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_435_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_create_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_create_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_firefly_14_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_firefly_14_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_firefly_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_firefly_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_firefly_15_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_firefly_15_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_fury_15_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_fury_15_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_fury_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_fury_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_fury_17_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_fury_17_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_power_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_power_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_power_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_power_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_studio_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_studio_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_studio_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_studio_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_14_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_14_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_14_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_14_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_15_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_15_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_a_14_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_a_14_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z1_all-in-one_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z1_all-in-one_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z1_entry_tower_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z1_entry_tower_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z1_entry_tower_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z1_entry_tower_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_mini_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_mini_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_mini_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_mini_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_mini_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_mini_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_mini_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_mini_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_small_form_factor_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_small_form_factor_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_small_form_factor_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_small_form_factor_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_small_form_factor_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_small_form_factor_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_small_form_factor_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_small_form_factor_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_tower_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_tower_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_tower_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_tower_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_tower_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_tower_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_tower_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_tower_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z238_microtower_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z238_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z240_small_form_factor_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z240_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z240_tower_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z240_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mt21_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt21:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mt22_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt22:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mt31_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt31:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mt32_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt32:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mt43_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt43:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mt44_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt44:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mt45_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt45:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mt46_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt46:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_mt440_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_mt440_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_flex_mini_retail_system_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_flex_mini_retail_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_flex_pro_retail_system_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_flex_pro_retail_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_flex_pro-c_retail_system_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_flex_pro-c_retail_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_go_10_mobile_system_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_go_10_mobile_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_go_mobile_system_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_go_mobile_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_one_all-in-one_system_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_one_all-in-one_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_one_pro_aio_system_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_one_pro_aio_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mp9_g4_retail_system_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mp9_g4_retail_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:rp9_g1_retail_system_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:rp9_g1_retail_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_mini_600_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_mini_600_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_mini_800_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_mini_800_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_sff_600_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_sff_600_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_sff_800_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_sff_800_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_slice_g2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_slice_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_tower_600_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_tower_600_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_tower_680_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_tower_680_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_tower_800_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_tower_800_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_tower_880_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_tower_880_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_705_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_705_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_705_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_705_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_805_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_805_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_805_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_805_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_880_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_880_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_880_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_880_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_880_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_880_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_880_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_880_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_880_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_880_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g3_healthcare_edition_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g3_healthcare_edition:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g4_healthcare_edition_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g4_healthcare_edition:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g5_healthcare_edition_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g5_healthcare_edition:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_840_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_840_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_870_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_870_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mini_conferencing_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mini_conferencing:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_mini_400_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_mini_400_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_sff_400_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_sff_400_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_tower_400_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_tower_400_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_tower_480_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_tower_480_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_405_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_405_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_405_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_405_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_405_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_405_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_480_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_480_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_480_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_480_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_480_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_480_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_480_g7_pci_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_480_g7_pci:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_680_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_680_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_680_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_680_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_680_g6_pci_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_680_g6_pci:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_440_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_440_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_440_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_440_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_440_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_440_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_440_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_440_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_480_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_480_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_600_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_600_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_600_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_600_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_600_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_600_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_600_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_600_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z1_g8_tower_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z1_g8_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z1_g9_tower_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z1_g9_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_g3:-:*:*:*:*:*:*:*"
] | null | 7 | null | null |
|
CVE-2024-20960 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: RAPID). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
RHSA-2003:256 | Red Hat Security Advisory: : : : Updated Perl packages fix security issues. | security flaw security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
GHSA-52w2-9c5h-2xqj | Heap-based Buffer Overflow in the psf_binheader_writef function in common.c in libsndfile through 1.0.28 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact. | [] | null | null | 9.8 | null |
|
CVE-2017-20141 | Itech Movie Portal Script movie.php Union sql injection | A vulnerability classified as critical has been found in Itech Movie Portal Script 7.36. This affects an unknown part of the file /movie.php. The manipulation of the argument f leads to sql injection (Union). It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:ambit:movie_portal_script:7.36:*:*:*:*:*:*:*"
] | null | 6.3 | null | null |
CVE-2024-8382 | Internal browser event interfaces were exposed to web content when privileged EventHandler listener callbacks ran for those events. Web content that tried to use those interfaces would not be able to use them with elevated privileges, but their presence would indicate certain browser features had been used, such as when a user opened the Dev Tools console. This vulnerability affects Firefox < 130, Firefox ESR < 128.2, Firefox ESR < 115.15, Thunderbird < 128.2, and Thunderbird < 115.15. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2018-8729 | Multiple cross-site scripting (XSS) vulnerabilities in the Activity Log plugin before 2.4.1 for WordPress allow remote attackers to inject arbitrary JavaScript or HTML via a title that is not escaped. | [
"cpe:2.3:a:pojo:activity_log:*:*:*:*:*:wordpress:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2017-11821 | ChakraCore and Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11792, CVE-2017-11793, CVE-2017-11796, CVE-2017-11797, CVE-2017-11798, CVE-2017-11799, CVE-2017-11800, CVE-2017-11801, CVE-2017-11802, CVE-2017-11804, CVE-2017-11805, CVE-2017-11806, CVE-2017-11807, CVE-2017-11808, CVE-2017-11809, CVE-2017-11810, CVE-2017-11811, and CVE-2017-11812. | [
"cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.6 |
|
CVE-2018-18093 | Improper file permissions in the installer for Intel VTune Amplifier 2018 Update 3 and before may allow unprivileged user to potentially gain privileged access via local access. | [
"cpe:2.3:a:intel:vtune_amplifier:*:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:vtune_amplifier:2018:update1:*:*:*:*:*:*",
"cpe:2.3:a:intel:vtune_amplifier:2018:update2:*:*:*:*:*:*",
"cpe:2.3:a:intel:vtune_amplifier:2018:update3:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 |
|
CVE-2024-41164 | BIG-IP MPTCP vulnerability | When TCP profile with Multipath TCP enabled (MPTCP) is configured on a Virtual Server, undisclosed traffic along with conditions beyond the attackers control can cause TMM to terminate.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | [
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_automation_toolchain:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_automation_toolchain:17.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_container_ingress_services:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_container_ingress_services:17.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:17.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_next_cloud-native_network_functions:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*"
] | 8.2 | 5.9 | null | null |
CVE-2023-47582 | Access of uninitialized pointer vulnerability exists in TELLUS V4.0.17.0 and earlier and TELLUS Lite V4.0.17.0 and earlier. If a user opens a specially crafted file (X1, V8, or V9 file), information may be disclosed and/or arbitrary code may be executed. | [
"cpe:2.3:a:fujielectric:tellus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fujielectric:tellus_lite:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2011-0702 | The feh_unique_filename function in utils.c in feh before 1.11.2 might allow local users to overwrite arbitrary files via a symlink attack on a /tmp/feh_ temporary file. | [
"cpe:2.3:a:feh_project:feh:*:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.11:*:*:*:*:*:*:*"
] | null | null | null | 3.3 |
|
CVE-2012-2546 | Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Event Listener Use After Free Vulnerability." | [
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:beta1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:rc1:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-w656-prjj-5pfc | Cross-site scripting (XSS) vulnerability in Outlook Web Access (OWA) in Microsoft Exchange Server 2013 Cumulative Update 8 and 9 allows remote attackers to inject arbitrary web script or HTML via a crafted e-mail message, aka "Exchange Spoofing Vulnerability." | [] | null | null | null | null |
|
ICSA-23-348-06 | Siemens OPC UA Implementation in SINUMERIK ONE and SINUMERIK MC | The OPC UA implementations (ANSI C and C++) in affected products contain an integer overflow vulnerability that could cause the application to run into an infinite loop during certificate validation.
This could allow an unauthenticated remote attacker to create a denial of service condition by sending a specially crafted certificate. | [] | null | 7.5 | null | null |
CVE-2011-0571 | Adobe Flash Player before 10.2.152.26 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0559, CVE-2011-0560, CVE-2011-0561, CVE-2011-0572, CVE-2011-0573, CVE-2011-0574, CVE-2011-0578, CVE-2011-0607, and CVE-2011-0608. | [
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:6.0.21.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.155.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.277.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.283.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.53.64:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.82.76:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.92.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.92.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.95.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.95.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-fx2c-x2mg-cjm2 | The SecKeyDeriveFromPassword function in Apple OS X before 10.12 does not use the CF_RETURNS_RETAINED keyword, which allows attackers to obtain sensitive information from process memory by triggering key derivation. | [] | null | null | 5.5 | null |
|
CVE-2024-45241 | A traversal vulnerability in GeneralDocs.aspx in CentralSquare CryWolf (False Alarm Management) through 2024-08-09 allows unauthenticated attackers to read files outside of the working web directory via the rpt parameter, leading to the disclosure of sensitive information. | [
"cpe:2.3:a:centralsquare:crywolf:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2010-0700 | Cross-site scripting (XSS) vulnerability in index.php in WampServer 2.0i allows remote attackers to inject arbitrary web script or HTML via the lang parameter. | [
"cpe:2.3:a:wampserver:wampserver:2.0i:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2005-4857 | eZ publish 3.5 before 3.5.7, 3.6 before 3.6.5, 3.7 before 3.7.3, and 3.8 before 20051128 allows remote authenticated users to cause a denial of service (Apache httpd segmentation fault) via a request to content/advancedsearch.php with an empty SearchContentClassID parameter, reportedly related to a "memory addressing error". | [
"cpe:2.3:a:ez:ez_publish:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ez_publish:3.7.2:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
GHSA-8fmx-5gmc-pfcw | In the Linux kernel, the following vulnerability has been resolved:net/smc: Fix possible leaked pernet namespace in smc_init()In smc_init(), register_pernet_subsys(&smc_net_stat_ops) is called
without any error handling.
If it fails, registering of &smc_net_ops won't be reverted.
And if smc_nl_init() fails, &smc_net_stat_ops itself won't be reverted.This leaves wild ops in subsystem linkedlist and when another module
tries to call register_pernet_operations() it triggers page fault:BUG: unable to handle page fault for address: fffffbfff81b964c
RIP: 0010:register_pernet_operations+0x1b9/0x5f0
Call Trace:
<TASK>
register_pernet_subsys+0x29/0x40
ebtables_init+0x58/0x1000 [ebtables]
... | [] | null | null | null | null |
|
cisco-sa-asaftd-frag-memleak-mCtqdP9n | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software IP Fragment Memory Leak Vulnerability | Update from October 22nd, 2020: Cisco has become aware of a new Cisco Adaptive Security Appliance vulnerability that could affect the fixed releases recommended for code trains 9.13 and 9.14 in the Fixed Software ["#fs"] section of this advisory. See the Cisco Adaptive Security Appliance Software SSL/TLS Denial of Service Vulnerability ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssl-dos-7uZWwSEy"] for additional information.
A vulnerability in the IP fragment-handling implementation of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a memory leak on an affected device. This memory leak could prevent traffic from being processed through the device, resulting in a denial of service (DoS) condition.
The vulnerability is due to improper error handling when specific failures occur during IP fragment reassembly. An attacker could exploit this vulnerability by sending crafted, fragmented IP traffic to a targeted device. A successful exploit could allow the attacker to continuously consume memory on the affected device and eventually impact traffic, resulting in a DoS condition. The device could require a manual reboot to recover from the DoS condition.
Note: This vulnerability applies to both IP Version 4 (IPv4) and IP Version 6 (IPv6) traffic.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the October 2020 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication, which includes 17 Cisco Security Advisories that describe 17 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: October 2020 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74302"]. | [] | null | 8.6 | null | null |
RHSA-2021:0975 | Red Hat Security Advisory: pki-core security update | pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab pki-core: Reflected XSS in getcookies?url= endpoint in CA pki-core: KRA vulnerable to reflected XSS via the getPk12 page pki-core: XSS in the certificate search results pki-core: Unprivileged users can renew any certificate | [
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 8.1 | 4.7 | null |
CVE-2024-37335 | Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability | Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:sql_2016_azure_connect_feature_pack:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*"
] | null | 8.8 | null | null |
CVE-2024-28919 | Secure Boot Security Feature Bypass Vulnerability | Secure Boot Security Feature Bypass Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 6.7 | null | null |
CVE-2022-30912 | H3C Magic R100 R100V100R005 was discovered to contain a stack overflow vulnerability via the UpdateWanParams parameter at /goform/aspForm. | [
"cpe:2.3:o:h3c:magic_r100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:h3c:magic_r100:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
GHSA-2jf3-v47p-px69 | Missing Authorization vulnerability in Creative Motion Robin image optimizer allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Robin image optimizer: from n/a through 1.6.9. | [] | null | 6.5 | null | null |
|
GHSA-4cqx-cgrq-mp79 | An issue was discovered in Tigergraph Enterprise 3.7.0. The GSQL query language provides users with the ability to write data to files on a remote TigerGraph server. The locations that a query is allowed to write to are configurable via the GSQL.FileOutputPolicy configuration setting. GSQL queries that contain UDFs can bypass this configuration setting and, as a consequence, can write to any file location to which the administrative user has access. | [] | null | 8.8 | null | null |
|
GHSA-m8wf-6v9r-jp64 | Xerox AtlaLink B8045/B8055/B8065/B8075/B8090 C8030/C8035/C8045/C8055/C8070 printers with software before 101.00x.089.22600 allow an attacker to gain privileges. | [] | null | 9.8 | null | null |
|
GHSA-qvv2-vrvp-prm4 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Clodeo Shipdeo allows Reflected XSS. This issue affects Shipdeo: from n/a through 1.2.8. | [] | null | 7.1 | null | null |
|
GHSA-9rwv-75v6-rq79 | SQL injection vulnerability in the getUserUddiElements method in the ES UDDI component in SAP NetWeaver AS Java 7.4 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors, aka SAP Security Note 2356504. | [] | null | 8.8 | null | null |
|
GHSA-rx29-m355-55hm | admin/management.html in PineApp Mail-SeCure allows remote attackers to bypass authentication and perform a sys_usermng operation via the it parameter. | [] | null | null | null | null |
|
GHSA-9rvc-r3x4-4h9r | The insert-or-embed-articulate-content-into-wordpress plugin before 4.2999 for WordPress has insufficient restrictions on file upload. | [] | null | null | 8.8 | null |
|
CVE-2017-13786 | An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "APFS" component. It does not properly restrict the DMA mapping time of FileVault decryption buffers, which allows attackers to read cleartext APFS data via a crafted Thunderbolt adapter. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 4.6 | 2.1 |
|
CVE-2000-0695 | Buffer overflows in pgxconfig in the Raptor GFX configuration tool allow local users to gain privileges via command line options. | [
"cpe:2.3:a:tech-source:raptor_gfx_pgx32:2.3.1:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-wgj7-925j-3jf6 | In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, when updating custom EDID (hdmi_tx_sysfs_wta_edid), if edid_size, which is controlled by userspace, is too large, a buffer overflow occurs. | [] | null | null | 7.8 | null |
|
GHSA-xf23-357c-2vmh | Mozilla Firefox before 35.0 on Windows allows remote attackers to bypass the Gecko Media Plugin (GMP) sandbox protection mechanism by leveraging access to the GMP process, as demonstrated by the OpenH264 plugin's process. | [] | null | null | null | null |
|
RHSA-2020:0026 | Red Hat Security Advisory: kpatch-patch security update | hw: Machine Check Error on Page Size Change (IFU) hw: TSX Transaction Asynchronous Abort (TAA) | [
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | null | 6.5 | null |
GHSA-5vf7-q87h-pg6w | Cross-Site Scripting in BookStack | ImpactA user with permission to create comments could POST HTML directly to the system to be saved in a comment, which would then be executed/displayed to others users viewing the comment. Through this vulnerability custom JavaScript code could be injected and therefore ran on other user machines.This most impacts scenarios where not-trusted users are given permission to create comments.PatchesThe issue was addressed in BookStack v0.29.2.After upgrading, The command `php artisan bookstack:regenerate-comment-content` should be ran to remove any pre-existing dangerous content.WorkaroundsComments can be disabled in the system settings to prevent them being shown to users. Alternatively, comment creation permissions can be altered as required to only those who are trusted but this will not address existing exploitation of this vulnerability.References[BookStack Beta v0.29.2](https://github.com/BookStackApp/BookStack/releases/tag/v0.29.2)JVN#41035278[BookStack Blog Post](https://bookstackapp.com/blog/beta-release-v0-29-2/)For more informationIf you have any questions or comments about this advisory:Open an issue in [the BookStack GitHub repository](BookStackApp/BookStack/issues).Ask on the [BookStack Discord chat](https://discord.gg/ztkBqR2).Follow the [BookStack Security Advice](https://github.com/BookStackApp/BookStack#-security) to contact someone privately. | [] | null | 6.3 | null | null |
CVE-2006-4307 | Unspecified vulnerability in the format command in Sun Solaris 8 and 9 before 20060821 allows local users to modify arbitrary files via unspecified vectors involving profiles that permit running format with elevated privileges, a different issue than CVE-2006-4306 and CVE-2006-4319. | [
"cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-2024-22405 | XADMaster may not apply quarantine attribute correctly to extracted files | XADMaster is an objective-C library for archive and file unarchiving and extraction. When extracting a specially crafted zip archive XADMaster may not apply quarantine attribute correctly. Such behaviour may circumvent Gatekeeper checks on the system. Only macOS installations are affected. This issue was fixed in XADMaster 1.10.8. It is recommended to upgrade to the latest version. There are no known workarounds for this issue. | [
"cpe:2.3:a:macpaw:xadmaster:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2010-0988 | Multiple unspecified vulnerabilities in Pulse CMS before 1.2.3 allow (1) remote attackers to write to arbitrary files and execute arbitrary PHP code via vectors related to improper handling of login failures by includes/login.php; and allow remote authenticated users to write to arbitrary files and execute arbitrary PHP code via vectors involving the (2) filename and (3) block parameters to view.php. | [
"cpe:2.3:a:pulsecms:pulse_cms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsecms:pulse_cms:1.0:-:*:*:*:*:*:*",
"cpe:2.3:a:pulsecms:pulse_cms:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsecms:pulse_cms:1.01:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsecms:pulse_cms:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsecms:pulse_cms:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsecms:pulse_cms:1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsecms:pulse_cms:1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsecms:pulse_cms:1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsecms:pulse_cms:1.18:*:*:*:*:*:*:*"
] | null | null | null | 6 |
|
GHSA-gvrm-w2f9-f77q | Ingress-nginx path sanitization can be bypassed | Ingress-nginx `path` sanitization can be bypassed with `log_format` directive. | [] | null | 8.8 | null | null |
CVE-2015-7348 | Cross-site scripting (XSS) vulnerability in zTree 3.5.19.1 and possibly earlier allows remote attackers to inject arbitrary web script or HTML via the id parameter to demo/en/asyncData/getNodesForBigData.php. | [
"cpe:2.3:a:ztree_project:ztree:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2016-5283 | Mozilla Firefox before 49.0 allows remote attackers to bypass the Same Origin Policy via a crafted fragment identifier in the SRC attribute of an IFRAME element, leading to insufficient restrictions on link-color information after a document is resized. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2024-43354 | WordPress myCred plugin <= 2.7.2 - PHP Object Injection vulnerability | Deserialization of Untrusted Data vulnerability in myCred allows Object Injection.This issue affects myCred: from n/a through 2.7.2. | [
"cpe:2.3:a:mycred:mycred:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
CVE-2021-38574 | An issue was discovered in Foxit Reader and PhantomPDF before 10.1.4. It allows SQL Injection via crafted data at the end of a string. | [
"cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2024-53186 | ksmbd: fix use-after-free in SMB request handling | In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix use-after-free in SMB request handling
A race condition exists between SMB request handling in
`ksmbd_conn_handler_loop()` and the freeing of `ksmbd_conn` in the
workqueue handler `handle_ksmbd_work()`. This leads to a UAF.
- KASAN: slab-use-after-free Read in handle_ksmbd_work
- KASAN: slab-use-after-free in rtlock_slowlock_locked
This race condition arises as follows:
- `ksmbd_conn_handler_loop()` waits for `conn->r_count` to reach zero:
`wait_event(conn->r_count_q, atomic_read(&conn->r_count) == 0);`
- Meanwhile, `handle_ksmbd_work()` decrements `conn->r_count` using
`atomic_dec_return(&conn->r_count)`, and if it reaches zero, calls
`ksmbd_conn_free()`, which frees `conn`.
- However, after `handle_ksmbd_work()` decrements `conn->r_count`,
it may still access `conn->r_count_q` in the following line:
`waitqueue_active(&conn->r_count_q)` or `wake_up(&conn->r_count_q)`
This results in a UAF, as `conn` has already been freed.
The discovery of this UAF can be referenced in the following PR for
syzkaller's support for SMB requests. | [] | null | 7.8 | null | null |
CVE-2019-4295 | IBM Robotic Process Automation with Automation Anywhere 11 could allow an attacker with specialized access to obtain highly sensitive from the credential vault. IBM X-Force ID: 160758. | [
"cpe:2.3:a:ibm:robotic_process_automation_with_automation_anywhere:*:*:*:*:*:*:*:*"
] | null | null | 4.9 | null |
|
GHSA-3p7f-hw68-ph5v | Nullsoft SHOUTcast server stores the administrative password in plaintext in a configuration file (sc_serv.conf), which could allow a local user to gain administrative privileges on the server. | [] | null | null | null | null |
|
CVE-2021-38144 | An issue was discovered in Form Tools through 3.0.20. A low-privileged user can trigger Reflected XSS when a viewing a form via the submission_id parameter, e.g., clients/forms/edit_submission.php?form_id=1&view_id=1&submission_id=[XSS]. | [
"cpe:2.3:a:formtools:core:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
GHSA-4vq9-rwg9-vq6x | Insertion of Sensitive Information Into Sent Data vulnerability in AppExperts AppExperts – WordPress to Mobile App – WooCommerce to iOs and Android Apps allows Retrieve Embedded Sensitive Data. This issue affects AppExperts – WordPress to Mobile App – WooCommerce to iOs and Android Apps: from n/a through 1.4.3. | [] | null | 5.3 | null | null |
|
GHSA-4x83-5gw5-q346 | Zope Object Database (ZODB) vulnerable to arbitrary Python code execution in ZEO storage servers | Unspecified vulnerability in Zope Object Database (ZODB) before 3.8.2, when certain Zope Enterprise Objects (ZEO) database sharing is enabled, allows remote attackers to execute arbitrary Python code via vectors involving the ZEO network protocol. | [] | 9.3 | 9.8 | null | null |
GHSA-fv65-j2g7-x89x | Access Control vulnerability in Upqode Plum: Spin Wheel & Email Pop-up allows .This issue affects Plum: Spin Wheel & Email Pop-up: from n/a through 2.0. | [] | null | 5.3 | null | null |
|
CVE-2016-2487 | libstagefright in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-06-01 allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 27833616. | [
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
GHSA-fpp8-fhh9-hwrp | Cross-site request forgery (CSRF) vulnerability in TWiki before 4.3.2 allows remote attackers to hijack the authentication of arbitrary users for requests that update pages, as demonstrated by a URL for a save script in the ACTION attribute of a FORM element, in conjunction with a call to the submit method in the onload attribute of a BODY element. NOTE: this issue exists because of an insufficient fix for CVE-2009-1339. | [] | null | null | null | null |
|
CVE-2018-5152 | WebExtensions with the appropriate permissions can attach content scripts to Mozilla sites such as accounts.firefox.com and listen to network traffic to the site through the "webRequest" API. For example, this allows for the interception of username and an encrypted password during login to Firefox Accounts. This issue does not expose synchronization traffic directly and is limited to the process of user login to the website and the data displayed to the user once logged in. This vulnerability affects Firefox < 60. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
] | null | null | 6.5 | 4.3 |
|
GHSA-583h-x99p-fmcc | Power Distribution Units running on Powertek firmware (multiple brands) before 3.30.30 allows remote authorization bypass in the web interface. To exploit the vulnerability, an attacker must send an HTTP packet to the data retrieval interface (/cgi/get_param.cgi) with the tmpToken cookie set to an empty string followed by a semicolon. This bypasses an active session authorization check. This can be then used to fetch the values of protected sys.passwd and sys.su.name fields that contain the username and password in cleartext. | [] | null | 7.5 | null | null |
|
CVE-2020-4682 | IBM MQ 7.5, 8.0, 9.0, 9.1, 9.2 LTS, and 9.2 CD could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization of trusted data. An attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 186509. | [
"cpe:2.3:a:ibm:mq:8.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:mq:8.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:mq:8.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:mq:8.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:mq:8.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:mq:8.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:mq:8.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:mq:8.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:mq:8.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:mq:8.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:mq:8.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:mq:8.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:mq:8.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:mq:8.0.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:mq:8.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:mq:8.0.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:mq:9.0.0.0:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq:9.0.0.1:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq:9.0.0.2:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq:9.0.0.3:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq:9.0.0.4:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq:9.0.0.5:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq:9.0.0.6:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq:9.0.0.7:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq:9.0.0.8:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq:9.0.0.9:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq:9.0.0.10:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq:9.1.0.0:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq:9.1.0.1:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq:9.1.0.2:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq:9.1.0.3:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq:9.1.0.4:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq:9.1.0.5:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq:9.1.0.6:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq:9.2.0.0:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq:9.2.1.0:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_appliance:9.2.0.0:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:websphere_mq:7.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_mq:7.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_mq:7.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_mq:7.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_mq:7.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_mq:7.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_mq:7.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_mq:7.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_mq:7.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_mq:7.5.0.9:*:*:*:*:*:*:*"
] | null | null | 8.1 | null |
|
CVE-2008-5743 | pdfjam creates the (1) pdf90, (2) pdfjoin, and (3) pdfnup files with a predictable name, which allows local users to overwrite arbitrary files via a symlink attack. | [
"cpe:2.3:a:pdfjam:pdfjam:_nil_:*:*:*:*:*:*:*"
] | null | null | null | 6.9 |
|
RHSA-2023:0354 | Red Hat Security Advisory: OpenJDK 8u362 Windows Security Update | OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) OpenJDK: soundbank URL remote loading (Sound, 8293742) | [
"cpe:/a:redhat:openjdk:1.8::windows"
] | null | 3.7 | null | null |
CVE-2025-4892 | code-projects Police Station Management System Delete Record source.cpp remove stack-based overflow | A vulnerability was found in code-projects Police Station Management System 1.0. It has been declared as critical. Affected by this vulnerability is the function criminal::remove of the file source.cpp of the component Delete Record. The manipulation of the argument No leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. | [] | 4.8 | 5.3 | 5.3 | 4.3 |
CVE-2020-12276 | GitLab 9.5.9 through 12.9 is vulnerable to stored XSS in an admin notification feature. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 4.8 | null | 3.5 |
|
RHSA-2010:0807 | Red Hat Security Advisory: java-1.5.0-ibm security update | TLS: MITM attacks via session renegotiation krb5: null pointer dereference in GSS-API library leads to DoS (MITKRB5-SA-2010-005) OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) OpenJDK DNS server IP address information leak (6957564) OpenJDK HttpURLConnection request splitting (6952017) JDK unspecified vulnerability in Java Web Start component OpenJDK local network address disclosure (6952603) JDK unspecified vulnerability in 2D component JDK unspecified vulnerability in Sound component OpenJDK IndexColorModel double-free (6925710) OpenJDK JPEG writeImage remote code execution (6963023) OpenJDK ICC Profile remote code execution (6963489) OpenJDK Deserialization Race condition (6559775) OpenJDK Serialization inconsistencies (6966692) JDK unspecified vulnerability in Sound component OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) OpenJDK HttpURLConnection incomplete TRACE permission check (6981426) | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
CVE-2023-28392 | Wi-Fi AP UNIT AC-PD-WAPU v1.05_B04 and earlier, AC-PD-WAPUM v1.05_B04 and earlier, AC-PD-WAPU-P v1.05_B04P and earlier, AC-PD-WAPUM-P v1.05_B04P and earlier, AC-WAPU-300 v1.00_B07 and earlier, AC-WAPU-300-P v1.00_B08P and earlier, AC-WAPUM-300 v1.00_B07 and earlier, and AC-WAPUM-300-P v1.00_B08P and earlier allow an authenticated user with an administrative privilege to execute an arbitrary OS command. | [
"cpe:2.3:o:inaba:ac-wapu-300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:inaba:ac-wapu-300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:inaba:ac-wapu-300-p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:inaba:ac-wapu-300-p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:inaba:ac-wapum-300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:inaba:ac-wapum-300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:inaba:ac-wapum-300-p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:inaba:ac-wapum-300-p:-:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
CVE-2024-5459 | Restaurant Menu and Food Ordering <= 2.4.16 - Missing Authorization to Menu Creation | The Restaurant Menu and Food Ordering plugin for WordPress is vulnerable to unauthorized creation of data due to a missing capability check on 'add_section', 'add_menu', 'add_menu_item', and 'add_menu_page' functions in all versions up to, and including, 2.4.16. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create menu sections, menus, food items, and new menu pages. | [
"cpe:2.3:a:fivestarplugins:five_star_restaurant_menu:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
CVE-2024-26804 | net: ip_tunnel: prevent perpetual headroom growth | In the Linux kernel, the following vulnerability has been resolved:
net: ip_tunnel: prevent perpetual headroom growth
syzkaller triggered following kasan splat:
BUG: KASAN: use-after-free in __skb_flow_dissect+0x19d1/0x7a50 net/core/flow_dissector.c:1170
Read of size 1 at addr ffff88812fb4000e by task syz-executor183/5191
[..]
kasan_report+0xda/0x110 mm/kasan/report.c:588
__skb_flow_dissect+0x19d1/0x7a50 net/core/flow_dissector.c:1170
skb_flow_dissect_flow_keys include/linux/skbuff.h:1514 [inline]
___skb_get_hash net/core/flow_dissector.c:1791 [inline]
__skb_get_hash+0xc7/0x540 net/core/flow_dissector.c:1856
skb_get_hash include/linux/skbuff.h:1556 [inline]
ip_tunnel_xmit+0x1855/0x33c0 net/ipv4/ip_tunnel.c:748
ipip_tunnel_xmit+0x3cc/0x4e0 net/ipv4/ipip.c:308
__netdev_start_xmit include/linux/netdevice.h:4940 [inline]
netdev_start_xmit include/linux/netdevice.h:4954 [inline]
xmit_one net/core/dev.c:3548 [inline]
dev_hard_start_xmit+0x13d/0x6d0 net/core/dev.c:3564
__dev_queue_xmit+0x7c1/0x3d60 net/core/dev.c:4349
dev_queue_xmit include/linux/netdevice.h:3134 [inline]
neigh_connected_output+0x42c/0x5d0 net/core/neighbour.c:1592
...
ip_finish_output2+0x833/0x2550 net/ipv4/ip_output.c:235
ip_finish_output+0x31/0x310 net/ipv4/ip_output.c:323
..
iptunnel_xmit+0x5b4/0x9b0 net/ipv4/ip_tunnel_core.c:82
ip_tunnel_xmit+0x1dbc/0x33c0 net/ipv4/ip_tunnel.c:831
ipgre_xmit+0x4a1/0x980 net/ipv4/ip_gre.c:665
__netdev_start_xmit include/linux/netdevice.h:4940 [inline]
netdev_start_xmit include/linux/netdevice.h:4954 [inline]
xmit_one net/core/dev.c:3548 [inline]
dev_hard_start_xmit+0x13d/0x6d0 net/core/dev.c:3564
...
The splat occurs because skb->data points past skb->head allocated area.
This is because neigh layer does:
__skb_pull(skb, skb_network_offset(skb));
... but skb_network_offset() returns a negative offset and __skb_pull()
arg is unsigned. IOW, we skb->data gets "adjusted" by a huge value.
The negative value is returned because skb->head and skb->data distance is
more than 64k and skb->network_header (u16) has wrapped around.
The bug is in the ip_tunnel infrastructure, which can cause
dev->needed_headroom to increment ad infinitum.
The syzkaller reproducer consists of packets getting routed via a gre
tunnel, and route of gre encapsulated packets pointing at another (ipip)
tunnel. The ipip encapsulation finds gre0 as next output device.
This results in the following pattern:
1). First packet is to be sent out via gre0.
Route lookup found an output device, ipip0.
2).
ip_tunnel_xmit for gre0 bumps gre0->needed_headroom based on the future
output device, rt.dev->needed_headroom (ipip0).
3).
ip output / start_xmit moves skb on to ipip0. which runs the same
code path again (xmit recursion).
4).
Routing step for the post-gre0-encap packet finds gre0 as output device
to use for ipip0 encapsulated packet.
tunl0->needed_headroom is then incremented based on the (already bumped)
gre0 device headroom.
This repeats for every future packet:
gre0->needed_headroom gets inflated because previous packets' ipip0 step
incremented rt->dev (gre0) headroom, and ipip0 incremented because gre0
needed_headroom was increased.
For each subsequent packet, gre/ipip0->needed_headroom grows until
post-expand-head reallocations result in a skb->head/data distance of
more than 64k.
Once that happens, skb->network_header (u16) wraps around when
pskb_expand_head tries to make sure that skb_network_offset() is unchanged
after the headroom expansion/reallocation.
After this skb_network_offset(skb) returns a different (and negative)
result post headroom expansion.
The next trip to neigh layer (or anything else that would __skb_pull the
network header) makes skb->data point to a memory location outside
skb->head area.
v2: Cap the needed_headroom update to an arbitarily chosen upperlimit to
prevent perpetual increase instead of dropping the headroom increment
completely. | [] | null | 5.3 | null | null |
GHSA-qcg7-x5r6-58hf | IBM Rational AppScan Enterprise 5.x and 8.x before 8.5.0.1, when Integrated Windows authentication is used, allows remote authenticated users to obtain administrative privileges by hijacking a session associated with the service account. | [] | null | null | null | null |
|
CVE-2024-0467 | code-projects Employee Profile Management System edit_position_query.php cross site scripting | A vulnerability, which was classified as problematic, was found in code-projects Employee Profile Management System 1.0. Affected is an unknown function of the file edit_position_query.php. The manipulation of the argument pos_name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250572. | [
"cpe:2.3:a:carmelogarcia:employee_profile_management_system:1.0:*:*:*:*:*:*:*"
] | null | 3.5 | 3.5 | 4 |
GHSA-g42j-f43v-6x6m | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in iThemes WPComplete plugin <= 2.9.2 versions. | [] | null | 6.1 | null | null |
|
CVE-2008-4075 | Directory traversal vulnerability in index.php in D-iscussion Board 3.01 allows remote attackers to read arbitrary files via a .. (dot dot) in the topic parameter. | [
"cpe:2.3:a:dino:d-iscussion_board:3.01:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2015-6763 | Multiple unspecified vulnerabilities in Google Chrome before 46.0.2490.71 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-hppc-rpfp-r8qw | Magento 2 Community Edition SSRF vulnerability | A server-side request forgery (SSRF) vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This can be exploited by an authenticated user with admin privileges to manipulate shipment methods to execute arbitrary code. | [] | null | null | 7.2 | null |
GHSA-3c2h-px55-3fmw | netentsec NS-ASG 6.3 is vulnerable to SQL Injection via /3g/index.php. | [] | null | 8.8 | null | null |
|
CVE-2020-7456 | In FreeBSD 12.1-STABLE before r361918, 12.1-RELEASE before p6, 11.4-STABLE before r361919, 11.3-RELEASE before p10, and 11.4-RC2 before p1, an invalid memory location may be used for HID items if the push/pop level is not restored within the processing of that HID item allowing an attacker with physical access to a USB port to be able to use a specially crafted USB device to gain kernel or user-space code execution. | [
"cpe:2.3:o:freebsd:freebsd:11.3:-:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p2:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p3:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p4:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p5:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p6:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p7:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p8:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p9:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.4:rc1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.4:rc2:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.1:-:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.1:p1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.1:p2:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.1:p3:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.1:p4:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.1:p5:*:*:*:*:*:*",
"cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*"
] | null | 6.8 | null | 7.2 |
|
GHSA-h3vq-5r52-r6hp | Privilege escalation vulnerability in the AMS module
Impact: Successful exploitation of this vulnerability may affect service confidentiality. | [] | null | 7.8 | null | null |
|
GHSA-hpwr-8p93-377c | Cross-site scripting (XSS) vulnerability in Synology DiskStation Manager (DSM) before 5.2-5565 Update 1 allows remote attackers to inject arbitrary web script or HTML via the "compound" parameter to entry.cgi. | [] | null | null | null | null |
|
GHSA-gr79-qrm5-4ph8 | NULL pointer dereference in the MMS Client in MZ Automation LibIEC1850 before commit 7afa40390b26ad1f4cf93deaa0052fe7e357ef33 allows a malicious server to Cause a Denial-of-Service via the MMS InitiationResponse message. | [] | null | 7.5 | null | null |
|
CVE-2007-2092 | Direct static code injection vulnerability in index.php in Limesoft Guestbook (LS Simple Guestbook) allows remote attackers to inject arbitrary PHP code into posts.txt via the name parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:limesoft:limesoft_guestbook:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2013:1024 | Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.3.3 security update | python-qpid: client does not validate qpid server TLS/SSL certificate | [
"cpe:/a:redhat:enterprise_mrg:2:computenode:el6",
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
CVE-2025-21689 | USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb() | In the Linux kernel, the following vulnerability has been resolved:
USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb()
This patch addresses a null-ptr-deref in qt2_process_read_urb() due to
an incorrect bounds check in the following:
if (newport > serial->num_ports) {
dev_err(&port->dev,
"%s - port change to invalid port: %i\n",
__func__, newport);
break;
}
The condition doesn't account for the valid range of the serial->port
buffer, which is from 0 to serial->num_ports - 1. When newport is equal
to serial->num_ports, the assignment of "port" in the
following code is out-of-bounds and NULL:
serial_priv->current_port = newport;
port = serial->port[serial_priv->current_port];
The fix checks if newport is greater than or equal to serial->num_ports
indicating it is out-of-bounds. | [] | null | 5.5 | null | null |
CVE-2023-42700 | In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
CVE-2009-1045 | requests/status.xml in VLC 0.9.8a allows remote attackers to cause a denial of service (stack consumption and crash) via a long input argument in an in_play action. | [
"cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2013-3782 | Unspecified vulnerability in the Secure Global Desktop component in Oracle Virtualization 4.6 prior to 4.63 and 4.7 prior to 4.71 allows remote attackers to affect integrity via unknown vectors related to Web UI. | [
"cpe:2.3:a:oracle:virtualization:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:virtualization:4.7:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-hpjg-3g2h-99x2 | Unspecified vulnerability in the OJVM component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors. | [] | null | null | null | null |
|
CVE-2008-0502 | PHP remote file inclusion vulnerability in templates/Official/part_userprofile.php in Connectix Boards 0.8.2 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the template_path parameter. | [
"cpe:2.3:a:connectix:connectix_boards:*:*:*:*:*:*:*:*",
"cpe:2.3:a:connectix:connectix_boards:0.8.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2022:6206 | Red Hat Security Advisory: systemd security update | systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 9.8 | null | null |
CVE-2022-26952 | Digi Passport Firmware through 1.5.1,1 is affected by a buffer overflow in the function for building the Location header string when an unauthenticated user is redirected to the authentication page. | [
"cpe:2.3:o:digi:passport_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:digi:passport:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-mw28-cg9v-9xmq | SQLi and XSS in Huge IT catalog extension v1.0.4 for Joomla | [] | null | null | 7.2 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.