id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-1999-0922 | An example application in ColdFusion Server 4.0 allows remote attackers to view source code via the sourcewindow.cfm file. | [
"cpe:2.3:a:allaire:coldfusion_server:4.0:*:*:*:*:*:*:*"
] |
|
GHSA-xpgw-whr6-42cx | Multiple buffer overflows in NASA Common Data Format (CDF) allow context-dependent attackers to execute arbitrary code, as demonstrated using (1) an array index error in the ReadAEDRList64 function, and other errors in the (2) SearchForRecord_r_64, (3) LastRecord64, (4) CDFsel64, and other unspecified functions. | [] |
|
CVE-2023-5140 | Bonus for Woo < 5.8.3 - Reflected Cross-Site Scripting | The Bonus for Woo WordPress plugin before 5.8.3 does not sanitise and escape some parameters before outputting them back in pages, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin. | [
"cpe:2.3:a:computy:bonus_for_woo:*:*:*:*:*:wordpress:*:*"
] |
GHSA-h56m-vwxc-3qpw | Directory traversal vulnerability in actionpack | Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.21, 4.0.x before 4.0.12, 4.1.x before 4.1.8, and 4.2.x before 4.2.0.beta4, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via vectors involving a \ (backslash) character, a similar issue to CVE-2014-7818. | [] |
CVE-2023-24922 | Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability | Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability | [
"cpe:2.3:a:microsoft:dynamics_365:*:*:*:*:on-premises:*:*:*"
] |
CVE-2023-25821 | Nextcloud download permissions can be changed by resharer | Nextcloud is an Open Source private cloud software. Versions 24.0.4 and above, prior to 24.0.7, and 25.0.0 and above, prior to 25.0.1, contain Improper Access Control. Secure view for internal shares can be circumvented if reshare permissions are also given. This issue is patched in versions 24.0.7 and 25.0.1. No workaround is available. | [
"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:nextcloud:nextcloud_server:25.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nextcloud:nextcloud_server:25.0.0:*:*:*:enterprise:*:*:*"
] |
GHSA-j5vv-6wjg-cfr8 | changedetection.io Vulnerable to Improper Input Validation Leading to LFR/Path Traversal | SummaryImproper input validation in the application can allow attackers to perform local file read (LFR) or path traversal attacks. These vulnerabilities occur when user input is used to construct file paths without adequate sanitization or validation. For example, using `file:../../../etc/passwd` or `file: ///etc/passwd` can bypass weak validations and allow unauthorized access to sensitive files. Even though this has been addressed in previous patch, it is still insufficient.DetailsThe check in this line of code is insufficient.The attacker can still bypass this by using:
-`file:../../../../etc/passwd`
-`file: ///etc/passwd` (with space before /)PoCOpen up a changedetection.io instance with a webdriver configured.Create a new watch with `file:../../../../etc/passwd`.Check the watch preview.The contents of `/etc/passwd` should pop out.Screenshots
 | [] |
GHSA-24jr-8pxp-69pm | klaussilveira GitList version <= 0.6 contains a Passing incorrectly sanitized input to system function vulnerability in `searchTree` function that can result in Execute any code as PHP user. This attack appear to be exploitable via Send POST request using search form. This vulnerability appears to have been fixed in 0.7 after commit 87b8c26b023c3fc37f0796b14bb13710f397b322. | [] |
|
GHSA-x7gc-h9pg-938q | A Disclosure of Sensitive Information vulnerability in HPE SiteScope version v11.2x, v11.3x was found. | [] |
|
CVE-2017-1000110 | Blue Ocean allows the creation of GitHub organization folders that are set up to scan a GitHub organization for repositories and branches containing a Jenkinsfile, and create corresponding pipelines in Jenkins. It did not properly check the current user's authentication and authorization when configuring existing GitHub organization folders. This allowed users with read access to the GitHub organization folder to reconfigure it, including changing the GitHub API endpoint for the organization folder to an attacker-controlled server to obtain the GitHub access token, if the organization folder was initially created using Blue Ocean. | [
"cpe:2.3:a:jenkins:blue_ocean:*:*:*:*:*:jenkins:*:*",
"cpe:2.3:a:jenkins:blue_ocean:1.2.0:beta-1:*:*:*:jenkins:*:*",
"cpe:2.3:a:jenkins:blue_ocean:1.2.0:beta-2:*:*:*:jenkins:*:*",
"cpe:2.3:a:jenkins:blue_ocean:1.2.0:beta-3:*:*:*:jenkins:*:*"
] |
|
CVE-2006-6613 | Directory traversal vulnerability in language.php in phpAlbum 0.4.1 Beta 6 and earlier, when magic_quotes_gpc is disabled and register_globals is enabled, allows remote attackers to include and execute arbitrary local files or obtain sensitive information via a .. (dot dot) in the pa_lang[include_file] parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by language.php. | [
"cpe:2.3:a:phpalbum.net:phpalbum:*:*:*:*:*:*:*:*"
] |
|
GHSA-rhv8-wfm8-gjqj | In multiple Tecson Tankspion and GOKs SmartBox 4 products the affected application doesn't properly restrict access to an endpoint that is responsible for saving settings, to a unauthenticated user with limited access rights. Based on the lack of adequately implemented access-control rules, by accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to change the application settings without authenticating at all, which violates originally laid ACL rules. | [] |
|
CVE-2016-6646 | The vApp Managers web application in EMC Unisphere for VMAX Virtual Appliance 8.x before 8.3.0 and Solutions Enabler Virtual Appliance 8.x before 8.3.0 allows remote attackers to execute arbitrary code via crafted input to the (1) GetSymmCmdRequest or (2) RemoteServiceHandler class. | [
"cpe:2.3:a:dell:emc_unisphere:8.0:*:*:*:*:vmax:*:*",
"cpe:2.3:a:dell:emc_unisphere:8.1:*:*:*:*:vmax:*:*",
"cpe:2.3:a:dell:emc_unisphere:8.1.2:*:*:*:*:vmax:*:*",
"cpe:2.3:a:dell:emc_unisphere:8.2:*:*:*:*:vmax:*:*",
"cpe:2.3:a:emc:solutions_enabler:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:solutions_enabler:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:solutions_enabler:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:solutions_enabler:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:solutions_enabler:8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:unisphere:8.0.3:*:*:*:*:vmax:*:*"
] |
|
CVE-2016-1702 | The SkRegion::readFromMemory function in core/SkRegion.cpp in Skia, as used in Google Chrome before 51.0.2704.79, does not validate the interval count, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted serialized data. | [
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-22805 | A CWE-306: Missing Authentication for Critical Function vulnerability exists that could cause deletion of arbitrary files in the context of the user running IGSS due to lack of validation of network messages. Affected Product: Interactive Graphical SCADA System Data Collector (dc.exe) (V15.0.0.21243 and prior) | [
"cpe:2.3:a:schneider-electric:interactive_graphical_scada_system_data_collector:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-33691 | NWDI Notification Service versions - 7.31, 7.40, 7.50, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.SAP NetWeaver Development Infrastructure Notification Service allows a threat actor to send crafted scripts to a victim. If the victim has an active session when the crafted script gets executed, the threat actor could compromise information in victims session, and gain access to some sensitive information also. | [
"cpe:2.3:a:sap:netweaver_development_infrastructure:7.31:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_development_infrastructure:7.40:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_development_infrastructure:7.50:*:*:*:*:*:*:*"
] |
|
CVE-2023-25619 |
A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists that
could cause denial of service of the controller when communicating over the Modbus TCP
protocol.
| [
"cpe:2.3:o:schneider-electric:modicon_m580_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m340_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_momentum_unity_m1e_processor_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_momentum_unity_m1e_processor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_mc80_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_mc80:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxp57_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxp57:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:bmep58s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:bmep58s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:bmeh58s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:bmeh58s:-:*:*:*:*:*:*:*"
] |
|
CVE-2019-4077 | IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 157111. | [
"cpe:2.3:a:ibm:sterling_b2b_integrator:6.0.0.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:sterling_b2b_integrator:6.0.0.1:*:*:*:standard:*:*:*"
] |
|
GHSA-298c-rvvp-xh7q | In the Linux kernel, the following vulnerability has been resolved:ASoC: topology: Fix references to freed memoryMost users after parsing a topology file, release memory used by it, so
having pointer references directly into topology file contents is wrong.
Use devm_kmemdup(), to allocate memory as needed. | [] |
|
GHSA-v6rq-fh3x-6xwm | Out-of-bounds Read in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file. | [] |
|
GHSA-6ppc-xr55-mcvf | Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.44 and Prior to 7.0.8. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data as well as unauthorized read access to a subset of Oracle VM VirtualBox accessible data. Note: This vulnerability applies to Windows VMs only. CVSS 3.1 Base Score 4.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N). | [] |
|
GHSA-332g-rf22-2vcg | A path traversal vulnerability exists in the latest version of stangirard/quivr. This vulnerability allows an attacker to upload files to arbitrary paths in an S3 bucket by manipulating the file path in the upload request. | [] |
|
GHSA-pqw3-898v-hg67 | In the Linux kernel, the following vulnerability has been resolved:net/9p/usbg: fix handling of the failed kzalloc() memory allocationOn the linux-next, next-20241108 vanilla kernel, the coccinelle tool gave the
following error report:./net/9p/trans_usbg.c:912:5-11: ERROR: allocation function on line 911 returns
NULL not ERR_PTR on failurekzalloc() failure is fixed to handle the NULL return case on the memory exhaustion. | [] |
|
GHSA-qpvq-h769-rrw8 | Integer overflow in ColorSync in Apple Safari before 4.0.5 on Windows, and iTunes before 9.1, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an image with a crafted color profile that triggers a heap-based buffer overflow. | [] |
|
GHSA-x6xh-3jj8-cvg4 | The JetAdmin web interface for HP JetDirect does not set a password for the telnet interface when the admin password is changed, which allows remote attackers to gain access to the printer. | [] |
|
CVE-2019-9729 | In Shanda MapleStory Online V160, the SdoKeyCrypt.sys driver allows privilege escalation to NT AUTHORITY\SYSTEM because of not validating the IOCtl 0x8000c01c input value, leading to an integer signedness error and a heap-based buffer underflow. | [
"cpe:2.3:a:shanda:maplestory_online:160.0:*:*:*:*:*:*:*"
] |
|
CVE-2018-4268 | A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to macOS High Sierra 10.13.6. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-49239 | Unauthorized access vulnerability in the card management module. Successful exploitation of this vulnerability may affect service confidentiality. | [
"cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*"
] |
|
CVE-2014-3652 | JBoss KeyCloak: Open redirect vulnerability via failure to validate the redirect URL. | [
"cpe:2.3:a:redhat:keycloak:1.0.1:*:*:*:*:*:*:*"
] |
|
CVE-2025-31614 | WordPress Terms Before Download plugin <= 1.0.4 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in hiroprot Terms Before Download allows Stored XSS. This issue affects Terms Before Download: from n/a through 1.0.4. | [] |
CVE-2020-12048 | Phoenix Hemodialysis Delivery System SW 3.36 and 3.40, The Phoenix Hemodialysis device does not support data-in-transit encryption (e.g., TLS/SSL) when transmitting treatment and prescription data on the network between the Phoenix system and the Exalis dialysis data management tool. An attacker with access to the network could observe sensitive treatment and prescription data sent between the Phoenix system and the Exalis tool. | [
"cpe:2.3:o:baxter:phoenix_x36_firmware:3.36:*:*:*:*:*:*:*",
"cpe:2.3:o:baxter:phoenix_x36_firmware:3.40:*:*:*:*:*:*:*",
"cpe:2.3:h:baxter:phoenix_x36:-:*:*:*:*:*:*:*"
] |
|
CVE-2023-44143 | WordPress Bamboo Columns Plugin <= 1.6.1 is vulnerable to Cross Site Scripting (XSS) | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bamboo Mcr Bamboo Columns allows Stored XSS.This issue affects Bamboo Columns: from n/a through 1.6.1.
| [
"cpe:2.3:a:bamboo_mcr:bamboo_columns:*:*:*:*:*:wordpress:*:*"
] |
CVE-2024-25940 | bhyveload(8) host file access | `bhyveload -h <host-path>` may be used to grant loader access to the <host-path> directory tree on the host. Affected versions of bhyveload(8) do not make any attempt to restrict loader's access to <host-path>, allowing the loader to read any file the host user has access to. In the bhyveload(8) model, the host supplies a userboot.so to boot with, but the loader scripts generally come from the guest image. A maliciously crafted script could be used to exfiltrate sensitive data from the host accessible to the user running bhyhveload(8), which is often the system root. | [] |
CVE-2018-5977 | SQL Injection exists in Affiligator Affiliate Webshop Management System 2.1.0 via a search/?q=&price_type=range&price= request. | [
"cpe:2.3:a:getaffiligator:affiligator:2.1.0:*:*:*:*:*:*:*"
] |
|
CVE-2019-18801 | An issue was discovered in Envoy 1.12.0. An untrusted remote client may send HTTP/2 requests that write to the heap outside of the request buffers when the upstream is HTTP/1. This may be used to corrupt nearby heap contents (leading to a query-of-death scenario) or may be used to bypass Envoy's access control mechanisms such as path based routing. An attacker can also modify requests from other users that happen to be proximal temporally and spatially. | [
"cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*"
] |
|
CVE-2008-3300 | AlphAdmin CMS 1.0.5/03 allows remote attackers to bypass authentication and gain administrative access by setting the aa_login cookie value to 1. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:alphadmin:alphadmin_cms:1.0.5:sp2:*:*:*:*:*:*"
] |
|
CVE-2017-14733 | ReadRLEImage in coders/rle.c in GraphicsMagick 1.3.26 mishandles RLE headers that specify too few colors, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. | [
"cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-42907 | Multiple memory corruption issues were addressed with improved input validation. This issue is fixed in macOS Sonoma 14.2. Processing a maliciously crafted file may lead to unexpected app termination or arbitrary code execution. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-41977 | The issue was addressed with improved handling of caches. This issue is fixed in macOS Sonoma 14.1, iOS 16.7.2 and iPadOS 16.7.2. Visiting a malicious website may reveal browsing history. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-21149 | Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D7800 before 1.0.1.34, DM200 before 1.0.0.50, R6100 before 1.0.1.22, R7500 before 1.0.0.122, R7800 before 1.0.2.42, R8900 before 1.0.3.10, R9000 before 1.0.3.10, WNDR3700v4 before 1.0.2.96, WNDR4300 before 1.0.0.54, WNDR4300v2 before 1.0.0.54, WNDR4500v3 before 1.0.0.54, and WNR2000v5 before 1.0.0.64. | [
"cpe:2.3:o:netgear:d7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:dm200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:dm200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr3700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr3700:v4:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr4300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr4300:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr4500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr4500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr2000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr2000:v5:*:*:*:*:*:*:*"
] |
|
CVE-2007-3327 | httpsv.exe in HTTP Server 1.6.2 allows remote attackers to obtain sensitive information (script source code) via a URI with a trailing %20 (encoded space). | [
"cpe:2.3:a:bughunter:http_server:1.6.2:*:*:*:*:*:*:*"
] |
|
GHSA-vm9c-39jx-q45w | Moodle vulnerable to Exposure of Sensitive Information to an Unauthorized Actor | lib/filelib.php in Moodle through 2.2.11, 2.3.x before 2.3.10, 2.4.x before 2.4.7, and 2.5.x before 2.5.3 does not send "Cache-Control: private" HTTP headers, which allows remote attackers to obtain sensitive information by requesting a file that had been previously retrieved by a caching proxy server. | [] |
GHSA-f454-gp59-g2j5 | The Web Services Security component in IBM WebSphere Application Server (WAS) 6.0.2 before 6.0.2.35 and 7.0 before 7.0.0.3 has an unspecified "security problem" in the XML digital-signature specification, which has unknown impact and attack vectors. | [] |
|
GHSA-5652-4j93-xhg6 | In the Linux kernel, the following vulnerability has been resolved:clk: clk-apple-nco: Add NULL check in applnco_probeAdd NULL check in applnco_probe, to handle kernel NULL pointer
dereference error. | [] |
|
CVE-2013-5692 | Directory traversal vulnerability in X2Engine X2CRM before 3.5 allows remote authenticated administrators to include and execute arbitrary local files via a .. (dot dot) in the file parameter to index.php/admin/translationManager. | [
"cpe:2.3:a:x2engine:x2crm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:x2engine:x2crm:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:x2engine:x2crm:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:x2engine:x2crm:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:x2engine:x2crm:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:x2engine:x2crm:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:x2engine:x2crm:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:x2engine:x2crm:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:x2engine:x2crm:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:x2engine:x2crm:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:x2engine:x2crm:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:x2engine:x2crm:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:x2engine:x2crm:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:x2engine:x2crm:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:x2engine:x2crm:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:x2engine:x2crm:2.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:x2engine:x2crm:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:x2engine:x2crm:2.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:x2engine:x2crm:2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:x2engine:x2crm:2.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:x2engine:x2crm:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:x2engine:x2crm:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:x2engine:x2crm:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:x2engine:x2crm:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:x2engine:x2crm:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:x2engine:x2crm:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:x2engine:x2crm:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:x2engine:x2crm:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:x2engine:x2crm:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:x2engine:x2crm:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:x2engine:x2crm:3.4:*:*:*:*:*:*:*"
] |
|
CVE-2021-41219 | Undefined behavior via `nullptr` reference binding in sparse matrix multiplication | TensorFlow is an open source platform for machine learning. In affected versions the code for sparse matrix multiplication is vulnerable to undefined behavior via binding a reference to `nullptr`. This occurs whenever the dimensions of `a` or `b` are 0 or less. In the case on one of these is 0, an empty output tensor should be allocated (to conserve the invariant that output tensors are always allocated when the operation is successful) but nothing should be written to it (that is, we should return early from the kernel implementation). Otherwise, attempts to write to this empty tensor would result in heap OOB access. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | [
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.6.0:*:*:*:*:*:*:*"
] |
GHSA-gvjh-5h39-4px4 | The Shopwarden – Automated WooCommerce monitoring & testing plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.11. This is due to missing or incorrect nonce validation on the save_setting() function. This makes it possible for unauthenticated attackers to update arbitrary options and achieve privilege escalation via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] |
|
GHSA-2hx7-84c2-vv8q | The WebBrowser ActiveX control, or the Internet Explorer HTML rendering engine (MSHTML), as used in Internet Explorer 6, allows remote attackers to execute arbitrary code in the Local Security context by using the showModalDialog method and modifying the location to execute code such as Javascript, as demonstrated using (1) delayed HTTP redirect operations, and an HTTP response with a Location: header containing a "URL:" prepended to a "ms-its" protocol URI, or (2) modifying the location attribute of the window, as exploited by the Download.ject (aka Scob aka Toofer) using the ADODB.Stream object. | [] |
|
CVE-2020-5757 | Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via HTTP. An authenticated remote attacker can bypass command injection mitigations and execute commands as the root user by sending a crafted HTTP POST to the UCM's "New" HTTPS API. | [
"cpe:2.3:o:grandstream:ucm6202_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:grandstream:ucm6202:-:*:*:*:*:*:*:*",
"cpe:2.3:o:grandstream:ucm6204_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:grandstream:ucm6204:-:*:*:*:*:*:*:*",
"cpe:2.3:o:grandstream:ucm6208_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:grandstream:ucm6208:-:*:*:*:*:*:*:*"
] |
|
GHSA-9q7v-rrcv-j2hh | The WP Courses LMS – Online Courses Builder, eLearning Courses, Courses Solution, Education Courses plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the wpc_update_user_meta_option() function in all versions up to, and including, 3.2.21. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary user's metadata which can be levereged to block an administrator from accessing their site when wp_capabilities is set to 0. | [] |
|
CVE-2025-26671 | Windows Remote Desktop Services Remote Code Execution Vulnerability | Use after free in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network. | [] |
GHSA-9wvm-c92g-hvqg | PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability that allows an unauthenticated attacker to reassign drivers for any printer. | [] |
|
CVE-2019-2268 | Possible OOB read issue in P2P action frames while handling WLAN management frame in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MDM9650, MSM8996AU, MSM8998, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCS405, QCS605, SDA660, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SM6150 | [
"cpe:2.3:o:qualcomm:apq8009_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8009:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8098_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8098:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9207c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9207c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8998:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-37341 | Microsoft SQL Server Elevation of Privilege Vulnerability | Microsoft SQL Server Elevation of Privilege Vulnerability | [
"cpe:2.3:a:microsoft:sql_2016_azure_connect_feature_pack:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*"
] |
GHSA-4783-m498-cppr | Heap-based buffer overflow in Role: Windows Hyper-V allows an authorized attacker to elevate privileges locally. | [] |
|
CVE-2009-3660 | PHP remote file inclusion vulnerability in libraries/database.php in Efront 3.5.4 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the path parameter. NOTE: this is only a vulnerability when the administrator does not follow recommendations in the product's security documentation. | [
"cpe:2.3:a:efrontlearning:efront:*:*:*:*:*:*:*:*",
"cpe:2.3:a:efrontlearning:efront:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:efrontlearning:efront:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:efrontlearning:efront:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:efrontlearning:efront:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:efrontlearning:efront:3.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:efrontlearning:efront:3.5.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:efrontlearning:efront:3.5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:efrontlearning:efront:3.5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:efrontlearning:efront:3.5.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:efrontlearning:efront:3.5.1:*:*:*:*:*:*:*"
] |
|
CVE-2020-2020 | Cortex XDR Agent: Exceptional condition denial-of-service (DoS) | An improper handling of exceptional conditions vulnerability in Cortex XDR Agent allows a local authenticated Windows user to create files in the software's internal program directory that prevents the Cortex XDR Agent from starting. The exceptional condition is persistent and prevents Cortex XDR Agent from starting when the software or machine is restarted. This issue impacts: Cortex XDR Agent 5.0 versions earlier than 5.0.10; Cortex XDR Agent 6.1 versions earlier than 6.1.7; Cortex XDR Agent 7.0 versions earlier than 7.0.3; Cortex XDR Agent 7.1 versions earlier than 7.1.2. | [
"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*"
] |
CVE-2017-0457 | An elevation of privilege vulnerability in the Qualcomm ADSPRPC driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31695439. References: QC-CR#1086123, QC-CR#1100695. | [
"cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.18:*:*:*:*:*:*:*"
] |
|
GHSA-x7j3-rmwr-2rrx | The Buzz Club – Night Club, DJ and Music Festival Event WordPress Theme theme for WordPress is vulnerable to unauthorized modification of data that can lead to a denial of service due to a missing capability check on the 'cmsmasters_hide_admin_notice' function in all versions up to, and including, 2.0.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update option values to 'hide' on the WordPress site. This can be leveraged to update an option that would create an error on the site and deny service to legitimate users or be used to set some values to true such as registration. | [] |
|
CVE-2004-1464 | Cisco IOS 12.2(15) and earlier allows remote attackers to cause a denial of service (refused VTY (virtual terminal) connections), via a crafted TCP connection to the Telnet or reverse Telnet port. | [
"cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*"
] |
|
GHSA-2hq5-5vh4-f96j | Use after free in Web Search in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via profile destruction. | [] |
|
CVE-2024-31177 | Out-of-bounds Read in libfluid_msg library | Out-of-bounds Read vulnerability in Open Networking Foundation (ONF) libfluid (libfluid_msg modules). This vulnerability is associated with program routines fluid_msg::of13::TableFeaturePropActions::unpack.
This issue affects libfluid: 0.1.0. | [
"cpe:2.3:a:open_networking_foundation:libfluid:0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opennetworking:libfluid_msg:0.1.0:*:*:*:*:*:*:*"
] |
CVE-2014-5762 | The Cut the Rope: Time Travel (aka com.zeptolab.timetravel.free.google) application 1.3.4 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:zeptolab:cut_the_rope\\:_time_travel:1.3.4:*:*:*:*:android:*:*"
] |
|
CVE-2016-6662 | Oracle MySQL through 5.5.52, 5.6.x through 5.6.33, and 5.7.x through 5.7.15; MariaDB before 5.5.51, 10.0.x before 10.0.27, and 10.1.x before 10.1.17; and Percona Server before 5.5.51-38.1, 5.6.x before 5.6.32-78.0, and 5.7.x before 5.7.14-7 allow local users to create arbitrary configurations and bypass certain protection mechanisms by setting general_log_file to a my.cnf configuration. NOTE: this can be leveraged to execute arbitrary code with root privileges by setting malloc_lib. NOTE: the affected MySQL version information is from Oracle's October 2016 CPU. Oracle has not commented on third-party claims that the issue was silently patched in MySQL 5.5.52, 5.6.33, and 5.7.15. | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:percona:percona_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] |
|
GHSA-8qf2-p2j7-qp5x | In the Linux kernel, the following vulnerability has been resolved:ice: Fix improper extts handlingExtts events are disabled and enabled by the application ts2phc.
However, in case where the driver is removed when the application is
running, a specific extts event remains enabled and can cause a kernel
crash.
As a side effect, when the driver is reloaded and application is started
again, remaining extts event for the channel from a previous run will
keep firing and the message "extts on unexpected channel" might be
printed to the user.To avoid that, extts events shall be disabled when PTP is released. | [] |
|
CVE-2019-15694 | TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity. | [
"cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
] |
|
GHSA-876p-j7c4-v654 | Cisco TelePresence Video Communication Server (VCS) X8.6 uses the same encryption key across different customers' installations, which makes it easier for local users to defeat cryptographic protection mechanisms by leveraging knowledge of a key from another installation, aka Bug ID CSCuw64516. | [] |
|
CVE-2019-15059 | In Liberty lisPBX 2.0-4, configuration backup files can be retrieved remotely from /backup/lispbx-CONF-YYYY-MM-DD.tar or /backup/lispbx-CDR-YYYY-MM-DD.tar without authentication or authorization. These configuration files have all PBX information including extension numbers, contacts, and passwords. | [
"cpe:2.3:a:lispbx_project:lispbx:2.0-4:*:*:*:*:*:*:*",
"cpe:2.3:a:lispbx_project:lispbx:2.0-5:*:*:*:*:*:*:*"
] |
|
GHSA-gmw9-2jwr-g5m7 | A security feature bypass vulnerability exists in Microsoft Outlook when Office fails to enforce security settings configured on a system, aka 'Microsoft Outlook Security Feature Bypass Vulnerability'. | [] |
|
CVE-2016-5874 | Siemens SIMATIC NET PC-Software before 13 SP2 allows remote attackers to cause a denial of service (OPC UA service outage) via crafted TCP packets. | [
"cpe:2.3:a:siemens:simatic_net_pc-software:*:sp1:*:*:*:*:*:*"
] |
|
CVE-2007-4403 | The mIRC Control Plug-in for Winamp allows user-assisted remote attackers to execute arbitrary code via the '|' (pipe) shell metacharacter in the name of the song in a .mp3 file. | [
"cpe:2.3:a:mirc:plug-in_for_winamp:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-32207 | A missing delay in popup notifications could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-49095 | scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one() | In the Linux kernel, the following vulnerability has been resolved:
scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one()
The error handling path of the probe releases a resource that is not freed
in the remove function. In some cases, a ioremap() must be undone.
Add the missing iounmap() call in the remove function. | [] |
GHSA-5q2r-92f9-4m49 | Improper verification of signature threshold in tough | ImpactThe tough library, prior to 0.7.1, does not properly verify the uniqueness of keys in the signatures provided to meet the threshold of cryptographic signatures. It allows someone with access to a valid signing key to create multiple valid signatures in order to circumvent TUF requiring a minimum threshold of unique keys before the metadata is considered valid.AWS would like to thank Erick Tryzelaar of the Google Fuchsia Team for reporting this issue.PatchesA fix is available in version 0.7.1.WorkaroundsNo workarounds to this issue are known.ReferencesCVE-2020-6174 is assigned to the same issue in the TUF reference implementation.https://github.com/theupdateframework/tuf/pull/974
https://nvd.nist.gov/vuln/detail/CVE-2020-6174For more informationIf you have any questions or comments about this advisory, [contact AWS Security](https://aws.amazon.com/security/vulnerability-reporting/) at [[email protected]](mailto:[email protected]). | [] |
GHSA-cv85-hcw5-w2q9 | The FancyBox for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions 3.0.2 to 3.3.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | [] |
|
CVE-2002-1779 | The "block fragmented IP Packets" option in Symantec Norton Personal Firewall 2002 (NPW) does not properly protect against certain attacks on Windows vulnerabilities such as jolt2 (CVE-2000-0305). | [
"cpe:2.3:a:symantec:norton_personal_firewall:2002:*:*:*:*:*:*:*"
] |
|
CVE-2008-4457 | SQL injection vulnerability in inc/inc_statistics.php in MemHT Portal 3.9.0 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via a stats_res cookie to index.php. | [
"cpe:2.3:a:memht:memht_portal:*:*:*:*:*:*:*:*",
"cpe:2.3:a:memht:memht_portal:1.0:final:*:*:*:*:*:*",
"cpe:2.3:a:memht:memht_portal:1.5:full:*:*:*:*:*:*",
"cpe:2.3:a:memht:memht_portal:1.5:update:*:*:*:*:*:*",
"cpe:2.3:a:memht:memht_portal:2.0:full:*:*:*:*:*:*",
"cpe:2.3:a:memht:memht_portal:2.0:update:*:*:*:*:*:*",
"cpe:2.3:a:memht:memht_portal:2.5:full:*:*:*:*:*:*",
"cpe:2.3:a:memht:memht_portal:2.5:update:*:*:*:*:*:*",
"cpe:2.3:a:memht:memht_portal:2.9:full:*:*:*:*:*:*",
"cpe:2.3:a:memht:memht_portal:2.9:update:*:*:*:*:*:*",
"cpe:2.3:a:memht:memht_portal:3.0:full:*:*:*:*:*:*",
"cpe:2.3:a:memht:memht_portal:3.0:update:*:*:*:*:*:*",
"cpe:2.3:a:memht:memht_portal:3.1:full:*:*:*:*:*:*",
"cpe:2.3:a:memht:memht_portal:3.1:update:*:*:*:*:*:*",
"cpe:2.3:a:memht:memht_portal:3.2:update:*:*:*:*:*:*",
"cpe:2.3:a:memht:memht_portal:3.3:full:*:*:*:*:*:*",
"cpe:2.3:a:memht:memht_portal:3.3:update:*:*:*:*:*:*",
"cpe:2.3:a:memht:memht_portal:3.4:full:*:*:*:*:*:*",
"cpe:2.3:a:memht:memht_portal:3.4:update:*:*:*:*:*:*",
"cpe:2.3:a:memht:memht_portal:3.4.5:full:*:*:*:*:*:*",
"cpe:2.3:a:memht:memht_portal:3.4.5:update:*:*:*:*:*:*",
"cpe:2.3:a:memht:memht_portal:3.5.0:full:*:*:*:*:*:*",
"cpe:2.3:a:memht:memht_portal:3.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:memht:memht_portal:3.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:memht:memht_portal:3.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:memht:memht_portal:3.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:memht:memht_portal:3.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:memht:memht_portal:3.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:memht:memht_portal:3.8.5:*:*:*:*:*:*:*"
] |
|
GHSA-wpp2-f4wp-vr8h | An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system. | [] |
|
CVE-2016-7085 | Untrusted search path vulnerability in the installer in VMware Workstation Pro 12.x before 12.5.0 and VMware Workstation Player 12.x before 12.5.0 on Windows allows local users to gain privileges via a Trojan horse DLL in an unspecified directory. | [
"cpe:2.3:a:vmware:workstation_player:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation_player:12.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation_player:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation_player:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation_pro:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation_pro:12.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation_pro:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation_pro:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] |
|
GHSA-g6xf-3xf8-xjg5 | Cross-site request forgery (CSRF) vulnerability in the Change Group Permissions module in CMS Made Simple 1.7.1 and earlier allows remote attackers to hijack the authentication of arbitrary users for requests that make permission modifications. | [] |
|
CVE-2016-3363 | Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel 2016, Office Compatibility Pack SP3, and Excel Viewer allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3381. | [
"cpe:2.3:a:microsoft:excel:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel_viewer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*"
] |
|
CVE-2008-2162 | Cross-site scripting (XSS) vulnerability in SonicWall Email Security 6.1.1 allows remote attackers to inject arbitrary web script or HTML via the Host header in a request to a non-existent web page, which is not properly sanitized in an error page. | [
"cpe:2.3:a:sonicwall:e-mail_security:6.1.1:*:*:*:*:*:*:*"
] |
|
GHSA-3484-2rvh-885x | NETGEAR ProSAFE Network Management System clearAlertByIds SQL Injection Privilege Escalation Vulnerability. This vulnerability allows remote attackers to escalate privileges on affected installations of NETGEAR ProSAFE Network Management System. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.The specific flaw exists within the clearAlertByIds function. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user. Was ZDI-CAN-19724. | [] |
|
CVE-2005-2482 | The StateToOptions function in msfweb in Metasploit Framework 2.4 and earlier, when running with the -D option (defanged mode), allows attackers to modify temporary environment variables before the "_Defanged" environment option is checked when processing the Exploit command. | [
"cpe:2.3:a:metasploit:metasploit_framework:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:metasploit:metasploit_framework:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:metasploit:metasploit_framework:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:metasploit:metasploit_framework:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:metasploit:metasploit_framework:2.4:*:*:*:*:*:*:*"
] |
|
GHSA-6xrh-8gj2-m92q | Cross-site scripting (XSS) vulnerability in phpgwapi/inc/common_functions_inc.php in eGroupware before 1.8.004.20120405 allows remote attackers to inject arbitrary web script or HTML via the menuaction parameter to etemplate/process_exec.php. NOTE: some of these details are obtained from third party information. | [] |
|
GHSA-94mw-4r68-8h9f | User could gain access to secure memory due to incorrect argument into address range validation api used in SDI to capture requested contents in Snapdragon Industrial IOT, Snapdragon Mobile | [] |
|
GHSA-hp3p-fc9m-xq9w | Directory traversal vulnerability in the SSL server in AEP Smartgate 4.3b allows remote attackers to download arbitrary files via ..\ (dot dot backslash) sequences in an HTTP GET request. | [] |
|
CVE-2018-2439 | The SAP Internet Graphics Server (IGS), 7.20, 7.20EXT, 7.45, 7.49, 7.53, has insufficient request validation (for example, where the request is validated for authenticity and validity) and under certain conditions, will process invalid requests. Several areas of the SAP Internet Graphics Server (IGS) did not require sufficient input validation. Namely, the SAP Internet Graphics Server (IGS) HTTP and RFC listener, SAP Internet Graphics Server (IGS) portwatcher when registering a portwatcher to the multiplexer and the SAP Internet Graphics Server (IGS) multiplexer had insufficient input validation and thus allowing a malformed data packet to cause a crash. | [
"cpe:2.3:a:sap:internet_graphics_server:7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:internet_graphics_server:7.20ext:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:internet_graphics_server:7.45:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:internet_graphics_server:7.49:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:internet_graphics_server:7.53:*:*:*:*:*:*:*"
] |
|
GHSA-722f-qh34-fgj6 | An elevation of privilege vulnerability in Audioserver could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32705429. | [] |
|
GHSA-p53v-8c78-56qf | A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. | [] |
|
CVE-2021-20317 | A flaw was found in the Linux kernel. A corrupted timer tree caused the task wakeup to be missing in the timerqueue_add function in lib/timerqueue.c. This flaw allows a local attacker with special user privileges to cause a denial of service, slowing and eventually stopping the system while running OSP. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.4:-:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] |
|
GHSA-p24f-9hfj-fg7m | An elevation of privilege vulnerability exists in the way that Microsoft COM for Windows handles objects in memory, aka 'Microsoft COM for Windows Elevation of Privilege Vulnerability'. | [] |
|
GHSA-px49-45qp-crhj | Denial of service in Linux 2.0.36 allows local users to prevent any server from listening on any non-privileged port. | [] |
|
GHSA-hxmr-5gv9-6p8v | Cross-site Scripting in librenms | Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.2.0. | [] |
GHSA-q7r2-4w32-9vg9 | Unrestricted file upload vulnerability in pfs.php in Neocrome Seditio 121 and earlier allows remote authenticated users to upload arbitrary PHP code via a filename ending with (1) .php.gif, (2) .php.jpg, or (3) .php.png. | [] |
|
GHSA-9c25-9784-774x | Inappropriate implementation in iframe sandbox in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. | [] |
|
GHSA-8g49-qr25-g5pw | The configuration of NetHack 3.4.3-r1 and earlier, Falcon's Eye 1.9.4a and earlier, and Slash'EM 0.0.760 and earlier on Gentoo Linux allows local users in the games group to modify saved games files to execute arbitrary code via buffer overflows and overwrite arbitrary files via symlink attacks. | [] |
|
GHSA-vgq4-vjqj-j4p9 | In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. | [] |
|
CVE-2023-35861 | A shell-injection vulnerability in email notifications on Supermicro motherboards (such as H12DST-B before 03.10.35) allows remote attackers to inject execute arbitrary commands as root on the BMC. | [
"cpe:2.3:h:supermicro:h12dst-b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h12dst-b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13dai-t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13dai-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13ddw-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13ddw-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13deg-oa_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13deg-oa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13deg-oad_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13deg-oad:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13deg-pvc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13deg-pvc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13deg-qt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13deg-qt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13dei_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13dei:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13dei-t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13dei-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13dem_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13dem:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13det-b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13det-b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13dgu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13dgu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13dsf-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13dsf-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13qeh\\+_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13qeh\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13sae_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13sae:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13sae-f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13sae-f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13san-c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13san-c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13san-c-wohs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13san-c-wohs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13san-e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13san-e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13san-e-wohs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13san-e-wohs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13san-h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13san-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13san-h-wohs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13san-h-wohs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13san-l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13san-l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13san-l-wohs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13san-l-wohs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13saq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13saq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13sav-lvds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13sav-lvds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13sav-ps_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13sav-ps:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13saz-f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13saz-f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13saz-q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13saz-q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13sedw-f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13sedw-f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13seed-f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13seed-f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13seed-sf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13seed-sf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13sefr-a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13sefr-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13sei-f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13sei-f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13sei-tf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13sei-tf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13sem-f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13sem-f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13sem-tf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13sem-tf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13set-g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13set-g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13set-gc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13set-gc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13sew-f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13sew-f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13sew-tf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13sew-tf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13sra-tf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13sra-tf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13srn-e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13srn-e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13srn-e-wohs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13srn-e-wohs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13srn-h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13srn-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13srn-h-wohs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13srn-h-wohs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x13swa-tf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x13swa-tf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h13dsg-o-cpu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h13dsg-o-cpu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h13dsg-o-cpu-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h13dsg-o-cpu-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h13dsh_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h13dsh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h13sae-mf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h13sae-mf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h13srd-f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h13srd-f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h13ssf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h13ssf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h13ssh_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h13ssh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h13ssl-n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h13ssl-n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h13ssl-nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h13ssl-nt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h13sst-g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h13sst-g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h13sst-gc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h13sst-gc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h13ssw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h13ssw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12dai-n6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12dai-n6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12ddw-a6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12ddw-a6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12dgo-6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12dgo-6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12dgq-r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12dgq-r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12dgu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12dgu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12dhm-6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12dhm-6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12dpd-a6m25_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12dpd-a6m25:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12dpfr-an6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12dpfr-an6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12dpg-ar_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12dpg-ar:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12dpg-oa6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12dpg-oa6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12dpg-oa6-gd2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12dpg-oa6-gd2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12dpg-qbt6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12dpg-qbt6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12dpg-qr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12dpg-qr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12dpg-qt6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12dpg-qt6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12dpg-u6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12dpg-u6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12dpi-n6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12dpi-n6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12dpi-nt6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12dpi-nt6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12dpl-i6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12dpl-i6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12dpl-nt6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12dpl-nt6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12dpt-b6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12dpt-b6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12dpt-pt46_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12dpt-pt46:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12dpt-pt6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12dpt-pt6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12dpu-6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12dpu-6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12dsc-6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12dsc-6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12qch\\+_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12qch\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12sae_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12sae:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12sae-5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12sae-5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12sca-5f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12sca-5f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12sca-f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12sca-f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12scq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12scq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12scv-lvds_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12scv-lvds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12scv-w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12scv-w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12scz-f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12scz-f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12scz-qf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12scz-qf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12scz-tln4f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12scz-tln4f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12sdv-10c-sp6f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12sdv-10c-sp6f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12sdv-10c-spt4f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12sdv-10c-spt4f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12sdv-14c-spt8f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12sdv-14c-spt8f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12sdv-16c-spt8f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12sdv-16c-spt8f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12sdv-20c-spt8f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12sdv-20c-spt8f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12sdv-4c-sp6f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12sdv-4c-sp6f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12sdv-4c-spt4f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12sdv-4c-spt4f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12sdv-4c-spt8f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12sdv-4c-spt8f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12sdv-8c-sp6f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12sdv-8c-sp6f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12sdv-8c-spt4f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12sdv-8c-spt4f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12sdv-8c-spt8f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12sdv-8c-spt8f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12sdv-8ce-sp4f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12sdv-8ce-sp4f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12spa-tf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12spa-tf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12sped-f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12sped-f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12spg-nf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12spg-nf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12spi-tf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12spi-tf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12spl-f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12spl-f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12spl-ln4f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12spl-ln4f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12spm-ln4f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12spm-ln4f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12spm-ln6tf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12spm-ln6tf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12spm-tf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12spm-tf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12spo-f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12spo-f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12spo-ntf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12spo-ntf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12spt-g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12spt-g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12spt-gc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12spt-gc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12spt-pt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12spt-pt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12spw-f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12spw-f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12spw-tf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12spw-tf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12spz-ln4f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12spz-ln4f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12spz-spln6f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12spz-spln6f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12std-f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12std-f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12ste-f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12ste-f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12sth-f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12sth-f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12sth-ln4f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12sth-ln4f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12sth-sys_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12sth-sys:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12stl-f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12stl-f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12stl-if_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12stl-if:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12stn-c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12stn-c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12stn-c-wohs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12stn-c-wohs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12stn-e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12stn-e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12stn-e-wohs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12stn-e-wohs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12stn-h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12stn-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12stn-h-wohs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12stn-h-wohs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12stn-l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12stn-l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12stn-l-wohs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12stn-l-wohs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12stw-f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12stw-f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:x12stw-tf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x12stw-tf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h12ssw-ntr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h12ssw-ntr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h12ssw-ntl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h12ssw-ntl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h12ssw-nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h12ssw-nt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h12ssw-inr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h12ssw-inr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h12ssw-inl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h12ssw-inl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h12ssw-in_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h12ssw-in:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h12ssw-an6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h12ssw-an6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h12sst-ps_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h12sst-ps:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h12ssl-nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h12ssl-nt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h12ssl-i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h12ssl-i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h12ssl-ct_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h12ssl-ct:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h12ssl-c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h12ssl-c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h12ssg-anp6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h12ssg-anp6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h12ssg-an6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h12ssg-an6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h12ssfr-an6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h12ssfr-an6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h12ssff-an6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h12ssff-an6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h12dsu-inr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h12dsu-inr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h12dsu-in_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h12dsu-in:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h12dst-b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h12dsi-nt6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h12dsi-nt6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h12dsi-n6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h12dsi-n6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h12dsg-q-cpu6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h12dsg-q-cpu6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h12dsg-o-cpu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h12dsg-o-cpu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h12dgq-nt6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h12dgq-nt6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:supermicro:h12dgo-6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:h12dgo-6:-:*:*:*:*:*:*:*"
] |
|
GHSA-xf3m-4rm6-x2hr | PQI AirCard has persistent XSS | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.