id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-cqhg-xjhh-p8hf | Out-of-bounds reads in Pillow | Pillow before 7.1.0 has multiple out-of-bounds reads in `libImaging/FliDecode.c`. | [] |
GHSA-qp2f-7q97-mx65 | Cross-site scripting (XSS) vulnerability in the TGM-Newsletter (tgm_newsletter) extension 0.0.2 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
GHSA-p2h2-c6c9-9wpx | HUAWEI P30 versions Versions earlier than 10.1.0.160(C00E160R2P11);HUAWEI P30 Pro versions Versions earlier than 10.1.0.160(C00E160R2P8) have a denial of service vulnerability. Certain system configuration can be modified because of improper authorization. The attacker could trick the user installing and executing a malicious application, successful exploit could cause a denial of service condition of PHONE function. | [] |
|
CVE-2019-7970 | Adobe Photoshop CC versions 19.1.8 and earlier and 20.0.5 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:photoshop_cc:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
CVE-2022-49142 | net: preserve skb_end_offset() in skb_unclone_keeptruesize() | In the Linux kernel, the following vulnerability has been resolved:
net: preserve skb_end_offset() in skb_unclone_keeptruesize()
syzbot found another way to trigger the infamous WARN_ON_ONCE(delta < len)
in skb_try_coalesce() [1]
I was able to root cause the issue to kfence.
When kfence is in action, the following assertion is no longer true:
int size = xxxx;
void *ptr1 = kmalloc(size, gfp);
void *ptr2 = kmalloc(size, gfp);
if (ptr1 && ptr2)
ASSERT(ksize(ptr1) == ksize(ptr2));
We attempted to fix these issues in the blamed commits, but forgot
that TCP was possibly shifting data after skb_unclone_keeptruesize()
has been used, notably from tcp_retrans_try_collapse().
So we not only need to keep same skb->truesize value,
we also need to make sure TCP wont fill new tailroom
that pskb_expand_head() was able to get from a
addr = kmalloc(...) followed by ksize(addr)
Split skb_unclone_keeptruesize() into two parts:
1) Inline skb_unclone_keeptruesize() for the common case,
when skb is not cloned.
2) Out of line __skb_unclone_keeptruesize() for the 'slow path'.
WARNING: CPU: 1 PID: 6490 at net/core/skbuff.c:5295 skb_try_coalesce+0x1235/0x1560 net/core/skbuff.c:5295
Modules linked in:
CPU: 1 PID: 6490 Comm: syz-executor161 Not tainted 5.17.0-rc4-syzkaller-00229-g4f12b742eb2b #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:skb_try_coalesce+0x1235/0x1560 net/core/skbuff.c:5295
Code: bf 01 00 00 00 0f b7 c0 89 c6 89 44 24 20 e8 62 24 4e fa 8b 44 24 20 83 e8 01 0f 85 e5 f0 ff ff e9 87 f4 ff ff e8 cb 20 4e fa <0f> 0b e9 06 f9 ff ff e8 af b2 95 fa e9 69 f0 ff ff e8 95 b2 95 fa
RSP: 0018:ffffc900063af268 EFLAGS: 00010293
RAX: 0000000000000000 RBX: 00000000ffffffd5 RCX: 0000000000000000
RDX: ffff88806fc05700 RSI: ffffffff872abd55 RDI: 0000000000000003
RBP: ffff88806e675500 R08: 00000000ffffffd5 R09: 0000000000000000
R10: ffffffff872ab659 R11: 0000000000000000 R12: ffff88806dd554e8
R13: ffff88806dd9bac0 R14: ffff88806dd9a2c0 R15: 0000000000000155
FS: 00007f18014f9700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020002000 CR3: 000000006be7a000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
tcp_try_coalesce net/ipv4/tcp_input.c:4651 [inline]
tcp_try_coalesce+0x393/0x920 net/ipv4/tcp_input.c:4630
tcp_queue_rcv+0x8a/0x6e0 net/ipv4/tcp_input.c:4914
tcp_data_queue+0x11fd/0x4bb0 net/ipv4/tcp_input.c:5025
tcp_rcv_established+0x81e/0x1ff0 net/ipv4/tcp_input.c:5947
tcp_v4_do_rcv+0x65e/0x980 net/ipv4/tcp_ipv4.c:1719
sk_backlog_rcv include/net/sock.h:1037 [inline]
__release_sock+0x134/0x3b0 net/core/sock.c:2779
release_sock+0x54/0x1b0 net/core/sock.c:3311
sk_wait_data+0x177/0x450 net/core/sock.c:2821
tcp_recvmsg_locked+0xe28/0x1fd0 net/ipv4/tcp.c:2457
tcp_recvmsg+0x137/0x610 net/ipv4/tcp.c:2572
inet_recvmsg+0x11b/0x5e0 net/ipv4/af_inet.c:850
sock_recvmsg_nosec net/socket.c:948 [inline]
sock_recvmsg net/socket.c:966 [inline]
sock_recvmsg net/socket.c:962 [inline]
____sys_recvmsg+0x2c4/0x600 net/socket.c:2632
___sys_recvmsg+0x127/0x200 net/socket.c:2674
__sys_recvmsg+0xe2/0x1a0 net/socket.c:2704
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x44/0xae | [] |
GHSA-mm7q-52jr-w3r4 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bPlugins Business Card Block allows Stored XSS. This issue affects Business Card Block: from n/a through 1.0.5. | [] |
|
CVE-2013-2624 | Telean before 1.3.1 contains a full path disclosure vulnerability which could allow remote attackers to obtain sensitive information through a specially crafted URL request. | [
"cpe:2.3:a:telaen_project:telaen:*:*:*:*:*:*:*:*"
] |
|
GHSA-x47m-3p5m-6489 | SQL injection vulnerability in arcade.php in ibProArcade 3.3.0 and earlier allows remote attackers to execute arbitrary SQL commands via the g_display_order cookie parameter. | [] |
|
CVE-1999-1487 | Vulnerability in digest in AIX 4.3 allows printq users to gain root privileges by creating and/or modifing any file on the system. | [
"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*"
] |
|
GHSA-qxf9-65gj-mxj8 | In the Linux kernel, the following vulnerability has been resolved:net: fix memory leak in tcp_conn_request()If inet_csk_reqsk_queue_hash_add() return false, tcp_conn_request() will
return without free the dst memory, which allocated in af_ops->route_req.Here is the kmemleak stack:unreferenced object 0xffff8881198631c0 (size 240):
comm "softirq", pid 0, jiffies 4299266571 (age 1802.392s)
hex dump (first 32 bytes):
00 10 9b 03 81 88 ff ff 80 98 da bc ff ff ff ff ................
81 55 18 bb ff ff ff ff 00 00 00 00 00 00 00 00 .U..............
backtrace:
[<ffffffffb93e8d4c>] kmem_cache_alloc+0x60c/0xa80
[<ffffffffba11b4c5>] dst_alloc+0x55/0x250
[<ffffffffba227bf6>] rt_dst_alloc+0x46/0x1d0
[<ffffffffba23050a>] __mkroute_output+0x29a/0xa50
[<ffffffffba23456b>] ip_route_output_key_hash+0x10b/0x240
[<ffffffffba2346bd>] ip_route_output_flow+0x1d/0x90
[<ffffffffba254855>] inet_csk_route_req+0x2c5/0x500
[<ffffffffba26b331>] tcp_conn_request+0x691/0x12c0
[<ffffffffba27bd08>] tcp_rcv_state_process+0x3c8/0x11b0
[<ffffffffba2965c6>] tcp_v4_do_rcv+0x156/0x3b0
[<ffffffffba299c98>] tcp_v4_rcv+0x1cf8/0x1d80
[<ffffffffba239656>] ip_protocol_deliver_rcu+0xf6/0x360
[<ffffffffba2399a6>] ip_local_deliver_finish+0xe6/0x1e0
[<ffffffffba239b8e>] ip_local_deliver+0xee/0x360
[<ffffffffba239ead>] ip_rcv+0xad/0x2f0
[<ffffffffba110943>] __netif_receive_skb_one_core+0x123/0x140Call dst_release() to free the dst memory when
inet_csk_reqsk_queue_hash_add() return false in tcp_conn_request(). | [] |
|
CVE-2024-5236 | Campcodes Complete Web-Based School Management System teacher_salary_invoice1.php sql injection | A vulnerability classified as critical was found in Campcodes Complete Web-Based School Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /view/teacher_salary_invoice1.php. The manipulation of the argument date leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-265987. | [
"cpe:2.3:a:campcodes:complete_web-based_school_management_system:1.0:*:*:*:*:*:*:*"
] |
GHSA-fxwx-9wgp-c8f8 | Cross-site scripting (XSS) vulnerability in Verity Search97 allows remote attackers to insert arbitrary web content and steal sensitive information from other clients, possibly due to certain error messages from template pages that use the (1) vformat or (2) vfilter functions. | [] |
|
GHSA-c2f3-v6vh-fq3v | In verifyInputEvent of InputDispatcher.cpp, there is a possible way to conduct click fraud due to side channel information disclosure. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-261085213 | [] |
|
GHSA-xc2v-fcxv-wj59 | A vulnerability has been reported to affect earlier QNAP devices running QTS 4.3.4 to 4.3.6. Caused by improper limitations of a pathname to a restricted directory, this vulnerability allows for renaming arbitrary files on the target system, if exploited. QNAP have already fixed this vulnerability in the following versions: QTS 4.3.6.0895 build 20190328 (and later) QTS 4.3.4.0899 build 20190322 (and later) This issue does not affect QTS 4.4.x or QTS 4.5.x. | [] |
|
CVE-2015-3089 | Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3078, CVE-2015-3090, and CVE-2015-3093. | [
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.169:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] |
|
CVE-2008-1409 | Multiple directory traversal vulnerabilities in the Default theme in Exero CMS 1.0.1 allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the theme parameter to (1) index.php, (2) editpassword.php, and (3) avatar.php in usercp/; (4) custompage.php; (5) errors/404.php; (6) memberslist.php and (7) profile.php in members/; (8) index.php and (9) fullview.php in news/; and (10) nopermission.php. | [
"cpe:2.3:a:exero:exero_cms:1.0.1:*:*:*:*:*:*:*"
] |
|
GHSA-9wp9-mvvj-c449 | Entertainment CMS allows remote attackers to bypass authentication and perform certain administrative actions by setting the adminLogged cookie to "Administrator." | [] |
|
GHSA-j756-f273-xhp4 | github.com/nats-io/nats-server Import token permissions checking not enforced | (This advisory is canonically <https://advisories.nats.io/CVE/CVE-2021-3127.txt>)Problem DescriptionThe NATS server provides for Subjects which are namespaced by Account; all Subjects are supposed to be private to an account, with an Export/Import system used to grant cross-account access to some Subjects. Some Exports are public, such that anyone can import the relevant subjects, and some Exports are private, such that the Import requires a token JWT to prove permission.The JWT library's validation of the bindings in the Import Token incorrectly warned on mismatches, instead of outright rejecting the token.As a result, any account can take an Import token used by any other account and re-use it for themselves because the binding to the importing account is not rejected, and use it to import *any* Subject from the Exporting account, not just the Subject referenced in the Import Token.The NATS account-server system treats account JWTs as semi-public information, such that an attacker can easily enumerate all account JWTs and retrieve all Import Tokens from those account JWTs.The CVE identifier should cover the JWT library repair and the nats-server containing the fixed JWT library, and any other application depending upon the fixed JWT library.Affected versionsJWT libraryall versions prior to 2.0.1fixed after nats-io/jwt#149 landed (2021-03-14)NATS ServerVersion 2 prior to 2.2.02.0.0 through and including 2.1.9 are vulnerablefixed with nats-io/nats-server@423b79440c (2021-03-14)ImpactIn deployments with untrusted accounts able to update the Account Server with imports, a malicious account can access any Subject from an account which provides Exported Subjects.Abuse of this facility requires the malicious actor to upload their tampered Account JWT to the Account Server, providing the service operator with a data-store which can be scanned for signs of abuse.WorkaroundDeny access to clients to update their account JWT in the account server.SolutionUpgrade the JWT dependency in any application using it.Upgrade the NATS server if using NATS Accounts (with private Exports; Account owners can create those at any time though).Audit all accounts JWTs to scan for exploit attempts; a Python script to audit the accounts can be found at <https://gist.github.com/philpennock/09d49524ad98043ff11d8a40c2bb0d5a>. | [] |
CVE-2023-46415 | TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_41E588 function. | [
"cpe:2.3:o:totolink:x6000r_firmware:9.4.0cu.652_b20230116:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:x6000r:-:*:*:*:*:*:*:*"
] |
|
GHSA-4gvh-59m6-2637 | Tenda AX1803 v1.0.0.1 was discovered to contain a heap overflow via the deviceId parameter in the function saveParentControlInfo . This vulnerability allows attackers to cause a Denial of Service (DoS) attack | [] |
|
CVE-2014-2195 | Cisco AsyncOS on Email Security Appliance (ESA) and Content Security Management Appliance (SMA) devices, when Active Directory is enabled, does not properly handle group names, which allows remote attackers to gain role privileges by leveraging group-name similarity, aka Bug ID CSCum86085. | [
"cpe:2.3:o:cisco:asyncos:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:content_security_management_appliance:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:email_security_appliance_firmware:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-2138 | The JetWidgets For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Animated Box widget in all versions up to, and including, 1.0.15 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
CVE-2017-7436 | libzypp accepts unsigned packages even when configured to check signatures | In libzypp before 20170803 it was possible to retrieve unsigned packages without a warning to the user which could lead to man in the middle or malicious servers to inject malicious RPM packages into a users system. | [
"cpe:2.3:a:opensuse:libzypp:*:*:*:*:*:*:*:*"
] |
CVE-1999-1254 | Windows 95, 98, and NT 4.0 allow remote attackers to cause a denial of service by spoofing ICMP redirect messages from a router, which causes Windows to change its routing tables. | [
"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-40931 | A SQL injection vulnerability in Nagios XI from version 5.11.0 up to and including 5.11.1 allows authenticated attackers to execute arbitrary SQL commands via the ID parameter in the POST request to /nagiosxi/admin/banner_message-ajaxhelper.php | [
"cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-27016 | netfilter: flowtable: validate pppoe header | In the Linux kernel, the following vulnerability has been resolved:
netfilter: flowtable: validate pppoe header
Ensure there is sufficient room to access the protocol field of the
PPPoe header. Validate it once before the flowtable lookup, then use a
helper function to access protocol field. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*"
] |
CVE-2021-1620 | Cisco IOS and IOS XE Software IKEv2 AutoReconnect Feature Denial of Service Vulnerability | A vulnerability in the Internet Key Exchange Version 2 (IKEv2) support for the AutoReconnect feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to exhaust the free IP addresses from the assigned local pool. This vulnerability occurs because the code does not release the allocated IP address under certain failure conditions. An attacker could exploit this vulnerability by trying to connect to the device with a non-AnyConnect client. A successful exploit could allow the attacker to exhaust the IP addresses from the assigned local pool, which prevents users from logging in and leads to a denial of service (DoS) condition. | [
"cpe:2.3:o:cisco:ios:12.2\\(6\\)i1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)svr1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)svr2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)svr3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)svs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)svs1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)svt1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)svt2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)svu1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)e1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)e2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)e3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)e4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)e5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)e5a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)e6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)e7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)e8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)e9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)e10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)e10a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)e10b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)ea:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)ea1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)ea2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)ea3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)ea4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)ea5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)ea6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)ea7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)ea8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)ec1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)ec2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4m\\)e1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4m\\)e2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4m\\)e3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4n\\)e2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4o\\)e2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4o\\)e3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4p\\)e1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4q\\)e1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4s\\)e1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(5\\)e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(5\\)e2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(5\\)e2b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(5\\)e2c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(5\\)ea:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(5\\)ex:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(5a\\)e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(5a\\)e1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(5b\\)e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(5c\\)e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(6\\)e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(6\\)e0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(6\\)e0c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(6\\)e1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(6\\)e1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(6\\)e1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(6\\)e2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(6\\)e2a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(6\\)e2b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(6\\)e3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(6\\)eb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(7\\)e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(7\\)e0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(7\\)e0b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(7\\)e0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(7\\)e1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(7\\)e1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(7\\)e2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(7\\)e2a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(7\\)e2b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(7\\)e3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(7\\)e3a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(7\\)e3k:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(7\\)e4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(7\\)e5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(7\\)e99:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(7a\\)e0b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(7b\\)e0b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(8\\)e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(8\\)e1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(234k\\)e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(0\\)sy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(1\\)sy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(1\\)sy1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(1\\)sy2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jc6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jc8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jc9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jc14:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jca7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jca8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jca9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jd3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jd4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jd5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jd6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jd7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jd8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jd9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jd11:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jd12:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jd13:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jd14:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jd16:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jd17:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jda7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jda8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jda9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jda11:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jda12:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jda13:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jda14:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jda16:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jda17:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)je:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jf1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jf2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jf4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jf5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jf6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jf7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jf8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jf9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jf10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jf11:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jf12:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jf12i:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jf14:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jf14i:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jf15:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jg1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jh1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)ji1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)ji3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)ji4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)ji5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)ji6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jj1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jk:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jk1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jk1t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jk2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jk2a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jk3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jk4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jk5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jk6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jk100:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jn13:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jn14:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jn15:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi1t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi5s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi6a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj2t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj3a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jpk:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jpk1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jpk2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)cg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)cg1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)s3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)s4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)sy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)sy1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)sy2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)sy3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)sy4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)t1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)t2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)t3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)t4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)cg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)s3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)s4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)sn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)sn1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)t1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)t2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)t3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)t4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)m:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)m1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)m2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)m3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)m4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)m5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)m6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)m6a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)m7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)m7a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)m8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)m9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)m10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s0d:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s0e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s0f:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s6a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)sn1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)sn1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)s3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)s4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)sn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)sn1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)sy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)sy1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)sy2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)sy3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)sy4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)sy5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)sy6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)sy7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)sy8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)t1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)t2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)t3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)t4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(2\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(2\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(2\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(2\\)s3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(2\\)s4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(2\\)sn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(2\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(2\\)t1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(2\\)t2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(2\\)t3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(2\\)t4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(2\\)xb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m2a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m4a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m4b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m4c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m6a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m11:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m11a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s6a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s6b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s9a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s10a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s10b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)sn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)sn0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(1\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(1\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(1\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(1\\)s3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(1\\)s4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(1\\)sn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(1\\)sn1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(1\\)sn2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(1\\)sn3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(1\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(1\\)t0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(1\\)t1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(1\\)t2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(1\\)t3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)s3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)s4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)sn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)sp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)sp1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)sp2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)sp3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)sp4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)sp5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)sp6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)sp7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)sp8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)sp8a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)sp9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)t0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)t1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)t2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)t3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)m:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)m0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)m1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)m1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)m1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)m2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)m2a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)m3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)m3a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)m4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)m5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)m6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)m6a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)m6b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)m7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)m8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)m9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)sn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(4\\)sn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(5\\)sn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(7\\)sn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(7\\)sn1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(7\\)sn2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.7\\(3\\)m:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.7\\(3\\)m0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.7\\(3\\)m1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.7\\(3\\)m2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.7\\(3\\)m3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.7\\(3\\)m4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.7\\(3\\)m4a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.7\\(3\\)m4b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.7\\(3\\)m5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.7\\(3\\)m6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.7\\(3\\)m7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.7\\(3\\)m8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.8\\(3\\)m:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.8\\(3\\)m0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.8\\(3\\)m0b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.8\\(3\\)m1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.8\\(3\\)m1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.8\\(3\\)m2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.8\\(3\\)m2a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.8\\(3\\)m3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.8\\(3\\)m3a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.8\\(3\\)m3b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.8\\(3\\)m4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.8\\(3\\)m5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.8\\(3\\)m6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.9\\(3\\)m:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.9\\(3\\)m0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.9\\(3\\)m1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.9\\(3\\)m2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.9\\(3\\)m2a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.9\\(3\\)m3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.9\\(3\\)m3a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.9\\(3\\)m3b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.4e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.5ae:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.5e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.6e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.7e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.8e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.9e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.10e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9.2be:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9.2e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.0ce:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.0e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.1ae:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.1se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.2e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.3e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.0e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.1ae:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.2ae:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.2e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.3ae:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.3e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.4e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.5e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.99ze:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12.0as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.0as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.2as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.5as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.5s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.6as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.6bs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.6s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.7as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.7s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.8s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.9s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.10s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.15.1xbs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.15.2xbs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.0as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.0bs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.4cs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.4es:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.4gs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.5as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.5bs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.6bs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.6s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.7as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.7bs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.7s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.8s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.9s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.10as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.10bs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.10s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.17.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.17.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.0sp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.1asp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.1bsp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.1csp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.1gsp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.1hsp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.1isp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.2asp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.2sp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.3asp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.3bsp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.3sp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.4sp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.5sp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.6sp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.7sp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.8asp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.8sp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.9sp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.11:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.5b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.7a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.1d:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.2a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.3h:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.4c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1z:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1z1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1z2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1za:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.2t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.5a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.5b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.3.3a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.4.1c:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-4g\\/6g_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:8800_12-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:8800_18-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:8800_4-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:8800_8-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:8804:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1000_series_route_processor_\\(rp2\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1000_series_route_processor_\\(rp3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1002_fixed_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c8200-1n-4t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c8200l-1n-4t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c9500-12q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c9500-16x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c9500-24q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c9500-24y4c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c9500-32c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c9500-32qc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c9500-40x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c9500-48y4c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48fd-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48fd-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48fd-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48uq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48uq-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48uq-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48uq-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48ur:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48ur-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48ur-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48ur-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48uz:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48uz-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48uz-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48uz-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24pd:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24pd-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24pd-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24pd-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24pdm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24pdm-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24pdm-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24pdm-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24ps-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24ps-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24ps-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24td-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24td-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24td-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24ts-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24ts-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24ts-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fd-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fd-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fd-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fq-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fq-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fq-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fqm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fqm-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fqm-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fqm-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fs-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fs-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fs-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48pd-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48pd-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48pd-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48pq-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48pq-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48pq-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48ps-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48ps-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48ps-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48td-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48td-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48td-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48tq-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48tq-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48tq-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48ts-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48ts-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48ts-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-8x24pd-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-8x24pd-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-8x24pd-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-8x24uq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-8x24uq-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-8x24uq-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-8x24uq-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-12s-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-12s-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-12x48u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-12xs-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-12xs-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-16xs-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-16xs-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24p-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24p-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24p-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24pw-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24s-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24s-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24t-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24t-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24t-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24u-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24u-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24u-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24xs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24xs-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24xs-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24xu:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24xu-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24xu-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24xu-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-32xs-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-32xs-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48f-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48f-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48f-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48p-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48p-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48p-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48pw-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48t-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48t-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48t-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48u-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48u-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48u-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48xs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48xs-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48xs-f-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48xs-f-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48xs-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-nm-2-40g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-nm-8-10g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_8510csr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_8510msr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_8540csr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-24p-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-24p-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-24s-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-24s-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-24t-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-24t-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-24u-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-24u-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-24ux-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-24ux-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48p-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48p-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48s-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48s-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48t-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48t-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48u-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48u-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48un-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48un-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48uxm-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300-48uxm-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-24p-4g-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-24p-4g-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-24p-4x-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-24p-4x-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-24t-4g-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-24t-4g-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-24t-4x-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-24t-4x-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-48p-4g-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-48p-4g-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-48p-4x-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-48p-4x-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-48t-4g-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-48t-4g-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-48t-4x-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l-48t-4x-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9300l_stack:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9400_supervisor_engine-1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9407r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9410r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9600_supervisor_engine-1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-40_wireless_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-80_wireless_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800_embedded_wireless_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_cg418-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_cg522-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_ess9300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_ie3200_rugged_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_ie3300_rugged_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_ie3400_heavy_duty_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_ie3400_rugged_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:cbr-8:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:csr_1000v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:esr6300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ess-3300-24t-con-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ess-3300-24t-con-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ess-3300-24t-ncp-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ess-3300-24t-ncp-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ess-3300-con-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ess-3300-con-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ess-3300-ncp-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ess-3300-ncp-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:isrv:-:*:*:*:*:*:*:*"
] |
CVE-2018-0146 | A vulnerability in the Cisco Data Center Analytics Framework application could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to improper CSRF protection by the affected application. An attacker could exploit this vulnerability by persuading a user of the affected application to click a malicious link. A successful exploit could allow the attacker to submit arbitrary requests and take unauthorized actions on behalf of the user. Cisco Bug IDs: CSCvg45114. | [
"cpe:2.3:a:cisco:data_center_analytics_framework:3.1:*:*:*:*:*:*:*"
] |
|
GHSA-mj89-7mx3-99gw | NetApp OnCommand Unified Manager for 7-Mode (core package) versions prior to 5.2.3 may disclose sensitive LDAP account information to authenticated users when the LDAP authentication configuration is tested via the user interface. | [] |
|
CVE-2009-0538 | Format string vulnerability in Symantec pcAnywhere before 12.5 SP1 allows local users to read and modify arbitrary memory locations, and cause a denial of service (application crash) or possibly have unspecified other impact, via format string specifiers in the pathname of a remote control file (aka .CHF file). | [
"cpe:2.3:a:symantec:pcanywhere:*:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:pcanywhere:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:pcanywhere:10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:pcanywhere:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:pcanywhere:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:pcanywhere:11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:pcanywhere:11.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:pcanywhere:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:pcanywhere:12.1:*:*:*:*:*:*:*"
] |
|
GHSA-xvq9-c88q-jf5x | Where this vulnerability exists in the Rockwell Automation 1756-EN4* Ethernet/IP communication products, it could allow a malicious user to cause a denial of service by asserting the target system through maliciously crafted CIP messages. | [] |
|
GHSA-vgmc-qr4h-h4cx | A vulnerability in the CLI of Cisco FXOS Software could allow an authenticated, local attacker to create a file or overwrite any file on the filesystem of an affected device, including system files.The vulnerability occurs because there is no validation of parameters when a specific CLI command is used. An attacker could exploit this vulnerability by authenticating to an affected device and using the command at the CLI. A successful exploit could allow the attacker to overwrite any file on the disk of the affected device, including system files. The attacker must have valid administrative credentials on the affected device to exploit this vulnerability. | [] |
|
CVE-2008-4800 | The DebugDiag ActiveX control in CrashHangExt.dll, possibly 1.0, in Microsoft Debug Diagnostic Tool allows remote attackers to cause a denial of service (NULL pointer dereference and Internet Explorer 6.0 crash) via a large negative integer argument to the GetEntryPointForThread method. NOTE: this issue might only be exploitable in limited environments or non-default browser settings. | [
"cpe:2.3:a:microsoft:debug_diagnostic_tool:*:*:*:*:*:*:*:*"
] |
|
GHSA-2448-7fj5-7v9w | Inappropriate implementation in Media Stream in Google Chrome prior to 134.0.6998.35 allowed a remote attacker to obtain information about a peripheral via a crafted HTML page. (Chromium security severity: Medium) | [] |
|
CVE-2021-20833 | The SNKRDUNK Market Place App for iOS versions prior to 2.2.0 does not verify server certificate properly, which allows man-in-the-middle attackers to eavesdrop on and/or alter encrypted communication via a crafted certificate. | [
"cpe:2.3:a:soda-inc:snkrdunk:*:*:*:*:*:iphone_os:*:*"
] |
|
GHSA-6fg5-c9pf-xj22 | Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management 6.2 through 6.2.8, 7.1 before 7.1.1.12, and 7.5 before 7.5.0.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
GHSA-crjm-65gw-qhwr | There is a path traversal vulnerability in Huawei PC product. Because the product does not filter path with special characters,attackers can construct a file path with special characters to exploit this vulnerability. Successful exploitation could allow the attacker to transport a file to certain path.Affected product versions include:PC Smart Full Scene 11.1 versions PCManager 11.1.1.97. | [] |
|
GHSA-62f6-qcp7-pw2w | Adobe InCopy version 16.0 (and earlier) is affected by an path traversal vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve remote code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] |
|
CVE-2019-19211 | Dolibarr ERP/CRM before 10.0.3 has an Insufficient Filtering issue that can lead to user/card.php XSS. | [
"cpe:2.3:a:dolibarr:dolibarr:*:*:*:*:*:*:*:*"
] |
|
GHSA-cm79-jwwm-5h7h | Buffer-overflow in jsdtoa.c in Artifex MuJS in versions 1.0.1 to 1.1.1. An integer overflow happens when js_strtod() reads in floating point exponent, which leads to a buffer overflow in the pointer *d. | [] |
|
GHSA-98g7-ggp2-2q96 | Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0198, CVE-2010-0199, and CVE-2010-0202. | [] |
|
GHSA-56h3-j94v-47jr | Macromedia "The Matrix" screen saver on Windows 95 with the "Password protected" option enabled allows attackers with physical access to the machine to bypass the password prompt by pressing the ESC (Escape) key. | [] |
|
GHSA-m3xv-x3ph-mq22 | Server-side Template Injection in nystudio107/craft-seomatic | A Server-side Template Injection (SSTI) vulnerability exists in Nystudio107 Seomatic prior to 3.4.12 in src/helpers/UrlHelper.php via the host header. | [] |
CVE-2021-0282 | Junos OS: RPD crash while processing a specific BGP UPDATE when Multipath or add-path features are enabled | On Juniper Networks Junos OS devices with Multipath or add-path feature enabled, processing a specific BGP UPDATE can lead to a routing process daemon (RPD) crash and restart, causing a Denial of Service (DoS). Continued receipt and processing of this UPDATE message will create a sustained Denial of Service (DoS) condition. This BGP UPDATE message can propagate to other BGP peers with vulnerable Junos versions on which Multipath or add-path feature is enabled, and cause RPD to crash and restart. This issue affects both IBGP and EBGP deployments in IPv4 or IPv6 network. Junos OS devices that do not have the BGP Multipath or add-path feature enabled are not affected by this issue. This issue affects: Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S18; 15.1 versions prior to 15.1R7-S9; 17.3 versions prior to 17.3R3-S11; 17.4 versions prior to 17.4R2-S13, 17.4R3-S4; 18.1 versions prior to 18.1R3-S12; 18.2 versions prior to 18.2R3-S7; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R2-S6, 18.4R3-S6; 19.1 versions prior to 19.1R3-S3; | [
"cpe:2.3:o:juniper:junos:12.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r10-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r10-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s12:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s13:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s14:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s15:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s16:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s17:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r13:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:a1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f5-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s12:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r4-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r4-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r4-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r5-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r5-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r5-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r5-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3:-:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1:-:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*"
] |
GHSA-q94c-x56g-qr59 | A use-after-free flaw was found in the Linux Kernel. When a disk is removed, bdi_unregister is called to stop further write-back and waits for associated delayed work to complete. However, wb_inode_writeback_end() may schedule bandwidth estimation work after this has completed, which can result in the timer attempting to access the recently freed bdi_writeback. | [] |
|
CVE-2011-3653 | Mozilla Firefox before 8.0 and Thunderbird before 8.0 on Mac OS X do not properly interact with the GPU memory behavior of a certain driver for Intel integrated GPUs, which allows remote attackers to bypass the Same Origin Policy and read image data via vectors related to WebGL textures. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.24:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:7.0:*:*:*:*:*:*:*"
] |
|
CVE-2020-24312 | mndpsingh287 WP File Manager v6.4 and lower fails to restrict external access to the fm_backups directory with a .htaccess file. This results in the ability for unauthenticated users to browse and download any site backups, which sometimes include full database backups, that the plugin has taken. | [
"cpe:2.3:a:webdesi9:file_manager:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2023-41218 | D-Link DIR-3040 prog.cgi SetWan3Settings Stack-Based Buffer Overflow Remote Code Execution Vulnerability | D-Link DIR-3040 prog.cgi SetWan3Settings Stack-Based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-3040 routers. Authentication is required to exploit this vulnerability.
The specific flaw exists within the prog.cgi binary, which handles HNAP requests made to the lighttpd webserver listening on TCP ports 80 and 443. The issue results from the lack of proper validation of a user-supplied string before copying it to a fixed-size stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-21618. | [
"cpe:2.3:o:dlink:dir-3040_firmware:1.20b03:*:*:*:*:*:*:*"
] |
CVE-2020-14894 | Vulnerability in the Oracle Banking Corporate Lending product of Oracle Financial Services Applications (component: Core). Supported versions that are affected are 12.3.0 and 14.0.0-14.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Corporate Lending. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Banking Corporate Lending accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). | [
"cpe:2.3:a:oracle:banking_corporate_lending:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_corporate_lending:12.3.0:*:*:*:*:*:*:*"
] |
|
CVE-2010-2178 | Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188. | [
"cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:flash_player:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:flash_player:5.0.30.0:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:flash_player:5.0.41.0:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:flash_player:5.0.42.0:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:flash_player:5.0.58.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.5.3:*:*:*:*:*:*:*"
] |
|
CVE-2017-17783 | In GraphicsMagick 1.3.27a, there is a buffer over-read in ReadPALMImage in coders/palm.c when QuantumDepth is 8. | [
"cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.27a:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] |
|
GHSA-536r-fjf3-3wp7 | Heap-based buffer overflow in the MCRegEx__Search function in AOL ICQ Pro 2003b Build 3916 and earlier allows remote attackers to execute arbitrary code via an inconsistent length field of a Message in a 0x2711 Type-Length-Value (TLV) type. | [] |
|
GHSA-796v-r7jq-x526 | CVE was unused by HPE. | [] |
|
CVE-2024-56170 | A validation integrity issue was discovered in Fort through 1.6.4 before 2.0.0. RPKI manifests are listings of relevant files that clients are supposed to verify. Assuming everything else is correct, the most recent version of a manifest should be prioritized over other versions, to prevent replays, accidental or otherwise. Manifests contain the manifestNumber and thisUpdate fields, which can be used to gauge the relevance of a given manifest, when compared to other manifests. The former is a serial-like sequential number, and the latter is the date on which the manifest was created. However, the product does not compare the up-to-dateness of the most recently fetched manifest against the cached manifest. As such, it's prone to a rollback to a previous version if it's served a valid outdated manifest. This leads to outdated route origin validation. | [] |
|
CVE-2024-56588 | scsi: hisi_sas: Create all dump files during debugfs initialization | In the Linux kernel, the following vulnerability has been resolved:
scsi: hisi_sas: Create all dump files during debugfs initialization
For the current debugfs of hisi_sas, after user triggers dump, the
driver allocate memory space to save the register information and create
debugfs files to display the saved information. In this process, the
debugfs files created after each dump.
Therefore, when the dump is triggered while the driver is unbind, the
following hang occurs:
[67840.853907] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000a0
[67840.862947] Mem abort info:
[67840.865855] ESR = 0x0000000096000004
[67840.869713] EC = 0x25: DABT (current EL), IL = 32 bits
[67840.875125] SET = 0, FnV = 0
[67840.878291] EA = 0, S1PTW = 0
[67840.881545] FSC = 0x04: level 0 translation fault
[67840.886528] Data abort info:
[67840.889524] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
[67840.895117] CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[67840.900284] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[67840.905709] user pgtable: 4k pages, 48-bit VAs, pgdp=0000002803a1f000
[67840.912263] [00000000000000a0] pgd=0000000000000000, p4d=0000000000000000
[67840.919177] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[67840.996435] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[67841.003628] pc : down_write+0x30/0x98
[67841.007546] lr : start_creating.part.0+0x60/0x198
[67841.012495] sp : ffff8000b979ba20
[67841.016046] x29: ffff8000b979ba20 x28: 0000000000000010 x27: 0000000000024b40
[67841.023412] x26: 0000000000000012 x25: ffff20202b355ae8 x24: ffff20202b35a8c8
[67841.030779] x23: ffffa36877928208 x22: ffffa368b4972240 x21: ffff8000b979bb18
[67841.038147] x20: ffff00281dc1e3c0 x19: fffffffffffffffe x18: 0000000000000020
[67841.045515] x17: 0000000000000000 x16: ffffa368b128a530 x15: ffffffffffffffff
[67841.052888] x14: ffff8000b979bc18 x13: ffffffffffffffff x12: ffff8000b979bb18
[67841.060263] x11: 0000000000000000 x10: 0000000000000000 x9 : ffffa368b1289b18
[67841.067640] x8 : 0000000000000012 x7 : 0000000000000000 x6 : 00000000000003a9
[67841.075014] x5 : 0000000000000000 x4 : ffff002818c5cb00 x3 : 0000000000000001
[67841.082388] x2 : 0000000000000000 x1 : ffff002818c5cb00 x0 : 00000000000000a0
[67841.089759] Call trace:
[67841.092456] down_write+0x30/0x98
[67841.096017] start_creating.part.0+0x60/0x198
[67841.100613] debugfs_create_dir+0x48/0x1f8
[67841.104950] debugfs_create_files_v3_hw+0x88/0x348 [hisi_sas_v3_hw]
[67841.111447] debugfs_snapshot_regs_v3_hw+0x708/0x798 [hisi_sas_v3_hw]
[67841.118111] debugfs_trigger_dump_v3_hw_write+0x9c/0x120 [hisi_sas_v3_hw]
[67841.125115] full_proxy_write+0x68/0xc8
[67841.129175] vfs_write+0xd8/0x3f0
[67841.132708] ksys_write+0x70/0x108
[67841.136317] __arm64_sys_write+0x24/0x38
[67841.140440] invoke_syscall+0x50/0x128
[67841.144385] el0_svc_common.constprop.0+0xc8/0xf0
[67841.149273] do_el0_svc+0x24/0x38
[67841.152773] el0_svc+0x38/0xd8
[67841.156009] el0t_64_sync_handler+0xc0/0xc8
[67841.160361] el0t_64_sync+0x1a4/0x1a8
[67841.164189] Code: b9000882 d2800002 d2800023 f9800011 (c85ffc05)
[67841.170443] ---[ end trace 0000000000000000 ]---
To fix this issue, create all directories and files during debugfs
initialization. In this way, the driver only needs to allocate memory
space to save information each time the user triggers dumping. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
GHSA-w2f9-3chr-2j98 | The Remote Desktop Sharing (RDS) Screen Saver Protection capability for Microsoft NetMeeting 3.01 through SP2 (4.4.3396) allows attackers with physical access to hijack remote sessions by entering certain logoff or shutdown sequences (such as CTRL-ALT-DEL) and canceling out of the resulting user confirmation prompts, such as when the remote user is editing a document. | [] |
|
GHSA-w25q-j7hc-27j8 | The Auto-update service for Okta Verify for Windows is vulnerable to two flaws which in combination could be used to execute arbitrary code. | [] |
|
CVE-2007-5254 | VirusBlokAda Vba32 AntiVirus 3.12.2 uses weak permissions (Everyone:Write) for its installation directory, which allows local users to gain privileges by replacing application programs, as demonstrated by replacing vba32ldr.exe. | [
"cpe:2.3:a:virusblokada:vba32_antivirus:3.12.2:*:*:*:*:*:*:*"
] |
|
GHSA-ww3m-ffrm-qvqv | Ansible may expose private key | A flaw was found in the Ansible Automation Platform. When creating a new keypair, the ec2_key module prints out the private key directly to the standard output. This flaw allows an attacker to fetch those keys from the log files, compromising the system's confidentiality, integrity, and availability. | [] |
GHSA-q9h7-27gp-hwp9 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Zoho Flow Zoho Flow for WordPress allows SQL Injection.This issue affects Zoho Flow for WordPress: from n/a through 2.7.1. | [] |
|
GHSA-3c9v-5fr8-87x5 | Improper access control in new Dex Mode in multitasking framework prior to SMR Sep-2024 Release 1 allows physical attackers to temporarily access an unlocked screen. | [] |
|
GHSA-r47x-v4ww-q7cr | Directory traversal vulnerability in the Scanner File Utility (aka listener) in Kyocera Mita (KM) 3.3.0.1 allows remote attackers to upload files to arbitrary locations via a .. (dot dot) in a request. | [] |
|
GHSA-h2wh-36m8-j3rp | This issue was addressed through improved state management. This issue is fixed in macOS Ventura 13.7.5, tvOS 18.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access sensitive user data. | [] |
|
CVE-2020-13850 | Artica Pandora FMS 7.44 has inadequate access controls on a web folder. | [
"cpe:2.3:a:pandorafms:pandora_fms:7.44:*:*:*:*:*:*:*"
] |
|
GHSA-j3gw-v5qx-v2xm | OS Command Injection vulnerability in McAfee ePolicy Orchestrator (ePO) 5.9.0, 5.3.2, 5.3.1, 5.1.3, 5.1.2, 5.1.1, and 5.1.0 allows attackers to run arbitrary OS commands with limited privileges via not sanitizing the user input data before exporting it into a CSV format output. | [] |
|
CVE-2021-43528 | Thunderbird unexpectedly enabled JavaScript in the composition area. The JavaScript execution context was limited to this area and did not receive chrome-level privileges, but could be used as a stepping stone to further an attack with other vulnerabilities. This vulnerability affects Thunderbird < 91.4.0. | [
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] |
|
GHSA-q232-vjhf-rc89 | The Utilities for MTG plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'mtglink' shortcode in all versions up to, and including, 1.4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
CVE-2022-37773 | An authenticated SQL Injection vulnerability in the statistics page (/statistics/retrieve) of Maarch RM 2.8, via the filter parameter, allows the complete disclosure of all databases. | [
"cpe:2.3:a:maarch:maarch_rm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:maarch:maarch_rm:2.9:*:*:*:*:*:*:*"
] |
|
GHSA-4cmq-9jfx-jxmh | A buffer overflow vulnerability in Import Command in SyncBreeze before 10.6, DiskSorter before 10.6, DiskBoss before 8.9, DiskPulse before 10.6, DiskSavvy before 10.6, DupScout before 10.6, and VX Search before 10.6 allows attackers to execute arbitrary code via a crafted XML file containing a long name attribute of a classify element. | [] |
|
GHSA-w3g8-r9gw-qrh8 | Denial of Service in Keycloak Server via Security Headers | A potential Denial of Service (DoS) vulnerability has been identified in Keycloak, which could allow an administrative user with the rights to change realm settings to disrupt the service. This is done by modifying any of the security headers and inserting newlines, which causes the Keycloak server to write to a request that is already terminated, leading to a failure of said request.Service disruption may happen, users will be unable to access applications relying on Keycloak, or any of the consoles provided by Keycloak itself on the affected realm. | [] |
CVE-2023-2732 | The MStore API plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.9.2. This is due to insufficient verification on the user being supplied during the add listing REST API request through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id. | [
"cpe:2.3:a:inspireui:mstore_api:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2024-36913 | Drivers: hv: vmbus: Leak pages if set_memory_encrypted() fails | In the Linux kernel, the following vulnerability has been resolved:
Drivers: hv: vmbus: Leak pages if set_memory_encrypted() fails
In CoCo VMs it is possible for the untrusted host to cause
set_memory_encrypted() or set_memory_decrypted() to fail such that an
error is returned and the resulting memory is shared. Callers need to
take care to handle these errors to avoid returning decrypted (shared)
memory to the page allocator, which could lead to functional or security
issues.
VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()
fails. Leak the pages if this happens. | [
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] |
CVE-2023-49967 | Typecho v1.2.1 was discovered to be vulnerable to an XML Quadratic Blowup attack via the component /index.php/action/xmlrpc. | [
"cpe:2.3:a:typecho:typecho:1.2.1:-:*:*:*:*:*:*",
"cpe:2.3:a:typecho:typecho:1.2.1:rc:*:*:*:*:*:*",
"cpe:2.3:a:typecho:typecho:1.2.1:rc2:*:*:*:*:*:*"
] |
|
GHSA-q72f-wgf9-7vp7 | IBM Security Guardium 11.3 could allow a local user to escalate their privileges due to improper permission controls. IBM X-Force ID: 240908. | [] |
|
CVE-2021-20608 | Improper Handling of Length Parameter Inconsistency vulnerability in Mitsubishi Electric GX Works2 versions 1.606G and prior allows a remote unauthenticated attacker to cause a DoS condition in GX Works2 by getting GX Works2 to read a tampered program file from a Mitsubishi Electric PLC by sending malicious crafted packets to tamper with the program file. | [
"cpe:2.3:a:mitsubishielectric:gx_works2:*:*:*:*:*:*:*:*"
] |
|
CVE-2015-2729 | The AudioParamTimeline::AudioNodeInputValue function in the Web Audio implementation in Mozilla Firefox before 39.0 and Firefox ESR 38.x before 38.1 does not properly calculate an oscillator rendering range, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via unspecified vectors. | [
"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"
] |
|
GHSA-p9rf-64qj-22rw | There exists a denial of service through Data corruption in gRPC-C++ - gRPC-C++ servers with transmit zero copy enabled through the channel arg GRPC_ARG_TCP_TX_ZEROCOPY_ENABLED can experience data corruption issues. The data sent by the application may be corrupted before transmission over the network thus leading the receiver to receive an incorrect set of bytes causing RPC requests to fail. We recommend upgrading past commit e9046b2bbebc0cb7f5dc42008f807f6c7e98e791 | [] |
|
CVE-2024-48237 | WTCMS 1.0 is vulnerable to Incorrect Access Control in \Common\Controller\HomebaseController.class.php. | [
"cpe:2.3:a:wtcms_project:wtcms:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-vf5x-8r9f-vm4f | Insecure direct object references (IDOR) vulnerability in the wpForo Forum plugin <= 2.0.5 on WordPress allows attackers with subscriber or higher user roles to mark any forum post as private/public. | [] |
|
CVE-2017-9879 | IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to execute arbitrary code or cause a denial of service via a crafted .fpx file, related to "Data from Faulting Address controls subsequent Write Address starting at FPX!FPX_GetScanDevicePropertyGroup+0x000000000000a525." | [
"cpe:2.3:a:irfanview:irfanview:4.44:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:fpx:4.46:*:*:*:*:*:*:*"
] |
|
GHSA-h659-9c3j-jcvg | An issue was discovered in the Connected Vehicle Systems Alliance (COVESA; formerly GENIVI) dlt-daemon through 2.18.8. Dynamic memory is not released after it is allocated in dlt-control-common.c. | [] |
|
CVE-2020-5832 | Symantec Data Center Security Manager Component, prior to 6.8.2 (aka 6.8 MP2), may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user. | [
"cpe:2.3:a:symantec:data_center_security:*:*:*:*:*:*:*:*"
] |
|
GHSA-2hvh-29rf-rgx7 | The Nokia 6131 Near Field Communication (NFC) phone with 05.12 firmware automatically installs software upon completing the download of a JAR file, which makes it easier for remote attackers to execute arbitrary code via a crafted URI record in an NDEF tag. | [] |
|
GHSA-7hfm-wr9w-6fgj | An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in J-Web of Juniper Networks Junos OS allows any low-privileged authenticated attacker to elevate their privileges to root. This issue affects: Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S19; 15.1 versions prior to 15.1R7-S10; 18.3 versions prior to 18.3R3-S5; 18.4 versions prior to 18.4R3-S9; 19.1 versions prior to 19.1R3-S6; 19.2 versions prior to 19.2R1-S7, 19.2R3-S3; 19.3 versions prior to 19.3R3-S3; 19.4 versions prior to 19.4R3-S5; 20.1 versions prior to 20.1R2-S2, 20.1R3-S1; 20.2 versions prior to 20.2R3-S2; 20.3 versions prior to 20.3R3; 20.4 versions prior to 20.4R2-S1, 20.4R3; 21.1 versions prior to 21.1R1-S1, 21.1R2. | [] |
|
CVE-2008-1437 | Unspecified vulnerability in Microsoft Malware Protection Engine (mpengine.dll) 1.1.3520.0 and 0.1.13.192, as used in multiple Microsoft products, allows context-dependent attackers to cause a denial of service (engine hang and restart) via a crafted file, a different vulnerability than CVE-2008-1438. | [
"cpe:2.3:a:microsoft:antigen_for_exchange:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:antigen_for_smtp_gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:diagnostics_and_recovery_toolkit:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:forefront_client_security:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:forefront_security_for_exchange_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:forefront_security_for_sharepoint:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:malware_protection_engine:0.1.13.192:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:malware_protection_engine:1.1.3520.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:windows_defender:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:windows_live_onecare:*:*:*:*:*:*:*:*"
] |
|
CVE-2014-4532 | Cross-site scripting (XSS) vulnerability in templates/printAdminUsersList_Footer.tpl.php in the GarageSale plugin before 1.2.3 for WordPress allows remote attackers to inject arbitrary web script or HTML via the page parameter. | [
"cpe:2.3:a:garagesale_project:garagesale:*:-:-:*:-:wordpress:*:*"
] |
|
GHSA-mh4w-qhp7-f8v8 | In an MPLS P2MP environment a Loop with Unreachable Exit Condition vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause high load on RPD which in turn may lead to routing protocol flaps. If a system with sensor-based-stats enabled receives a specific LDP FEC this can lead to the above condition. Continued receipted of such an LDP FEC will create a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS 19.2 version 19.2R2 and later versions prior to 19.2R3-S3; 19.3 versions prior to 19.3R2-S6, 19.3R3-S2; 19.4 versions prior to 19.4R1-S4, 19.4R2-S4, 19.4R3-S2; 20.1 versions prior to 20.1R2-S1, 20.1R3; 20.2 versions prior to 20.2R2-S1, 20.2R3; 20.3 versions prior to 20.3R1-S2, 20.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 19.2R2. Juniper Networks Junos OS Evolved All versions prior to 20.1R2-S3-EVO; 20.3 versions prior to 20.3R1-S2-EVO. | [] |
|
GHSA-2xvc-p88c-94vw | SAP UI5 Variant Management - versions SAP_UI 750, SAP_UI 754, SAP_UI 755, SAP_UI 756, SAP_UI 757, UI_700 200, does not sufficiently encode user-controlled inputs on reading data from the server, resulting in Stored Cross-Site Scripting (Stored XSS) vulnerability. After successful exploitation, an attacker with user level access can cause high impact on confidentiality, modify some information and can cause unavailability of the application at user level. | [] |
|
CVE-2024-26566 | An issue in Cute Http File Server v.3.1 allows a remote attacker to escalate privileges via the password verification component. | [
"cpe:2.3:a:ods-im:cutehttpfileserver:*:*:*:*:*:*:*:*"
] |
|
GHSA-g23j-wvjf-2p27 | Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly escape HTML in file:// URLs in directory listings, which allows remote attackers to conduct cross-site scripting (XSS) attacks or have unspecified other impact via a crafted filename. | [] |
|
GHSA-35gg-hfjv-3g6c | An information disclosure vulnerability was found in JBoss Enterprise Application Platform before 7.0.4. It was discovered that when configuring RBAC and marking information as sensitive, users with a Monitor role are able to view the sensitive information. | [] |
|
CVE-2007-6663 | SQL injection vulnerability in (1) Puarcade.php and (2) PUarcade.html.php in Pragmatic Utopia PU Arcade (com_puarcade) 2.0.3, 2.1.2, and 2.1.3 Beta component for Joomla! allows remote attackers to execute arbitrary SQL commands via the fid parameter to index.php. | [
"cpe:2.3:a:pragmatic_utopia:pu_arcade:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:pragmatic_utopia:pu_arcade:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pragmatic_utopia:pu_arcade:2.1.3:beta:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-17262 | XnView Classic 2.49.1 allows a User Mode Write AV starting at Xwsq+0x0000000000001fc0. | [
"cpe:2.3:a:xnview:xnview:2.49.1:*:*:*:classic:*:*:*"
] |
|
GHSA-fr2p-5jh8-4366 | An issue was discovered in a third-party component related to ro.boot.wifimacaddr, shipped on devices from multiple device manufacturers. Various software builds for the following TCL devices (30Z and 10L) and Motorola devices (Moto G Pure and Moto G Power) leak the Wi-Fi MAC address to a system property that can be accessed by any local app on the device without any permissions or special privileges. Google restricted third-party apps from directly obtaining non-resettable device identifiers in Android 10 and higher, but in these instances they are leaked by a high-privilege process and can be obtained indirectly. The software build fingerprints for each confirmed vulnerable device are as follows: TCL A3X (TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vAAZ:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vAB3:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vAB7:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABA:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABM:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABP:user/release-keys, and TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABS:user/release-keys); TCL 10L (TCL/T770B/T1_LITE:10/QKQ1.200329.002/3CJ0:user/release-keys and TCL/T770B/T1_LITE:11/RKQ1.210107.001/8BIC:user/release-keys); Motorola Moto G Pure (motorola/ellis_trac/ellis:11/RRHS31.Q3-46-110-2/74844:user/release-keys, motorola/ellis_trac/ellis:11/RRHS31.Q3-46-110-7/5cde8:user/release-keys, motorola/ellis_trac/ellis:11/RRHS31.Q3-46-110-10/d67faa:user/release-keys, motorola/ellis_trac/ellis:11/RRHS31.Q3-46-110-13/b4a29:user/release-keys, motorola/ellis_trac/ellis:12/S3RH32.20-42-10/1c2540:user/release-keys, motorola/ellis_trac/ellis:12/S3RHS32.20-42-13-2-1/6368dd:user/release-keys, motorola/ellis_a/ellis:11/RRH31.Q3-46-50-2/20fec:user/release-keys, motorola/ellis_vzw/ellis:11/RRH31.Q3-46-138/103bd:user/release-keys, motorola/ellis_vzw/ellis:11/RRHS31.Q3-46-138-2/e5502:user/release-keys, and motorola/ellis_vzw/ellis:12/S3RHS32.20-42-10-14-2/5e0b0:user/release-keys); and Motorola Moto G Power (motorola/tonga_g/tonga:11/RRQ31.Q3-68-16-2/e5877:user/release-keys and motorola/tonga_g/tonga:12/S3RQS32.20-42-10-6/f876d3:user/release-keys). This malicious app reads from the "ro.boot.wifimacaddr" system property to indirectly obtain the Wi-Fi MAC address. | [] |
|
GHSA-v52w-8549-jpj5 | Vulnerability in wordpress plugin eventr v1.02.2, The edit.php form and event_form.php code do not sanitize input, this allows for blind SQL injection via the event parameter. | [] |
|
GHSA-5r9w-7j85-fv72 | Microsoft Internet Explorer 7 allows remote attackers to (1) cause a security certificate from a secure web site to appear invalid via a link to res://ieframe.dll/sslnavcancel.htm with the target site in the anchor identifier, which displays the site's URL in the address bar but causes Internet Explorer to report that the certificate is invalid, or (2) trigger a "The webpage no longer exists" report via a link to res://ieframe.dll/http_410.htm, a variant of CVE-2006-5805. | [] |
|
CVE-2024-25151 | The Calendar module in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions does not escape user supplied data in the default notification email template, which allows remote authenticated users to inject arbitrary web script or HTML via the title of a calendar event or the user's name. This may lead to a content spoofing or cross-site scripting (XSS) attacks depending on the capability of the receiver's mail client. | [] |
|
CVE-2024-2193 | Speculative Race Condition impacts modern CPU architectures that support speculative execution, also known as GhostRace. | A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data from the CPU using race conditions to access the speculative executable code paths. | [] |
GHSA-3fv4-24vv-rx57 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14996. | [] |
|
CVE-2022-46897 | An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. The CapsuleIFWUSmm driver does not check the return value from a method or function. This can prevent it from detecting unexpected states and conditions. | [
"cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.