id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
57.2k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2022-31645 | Potential vulnerabilities have been identified in the system BIOS of certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure. | [
"cpe:2.3:o:hp:dragonfly_folio_g3_2-in-1_firmware:01.01.03:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:dragonfly_folio_g3_2-in-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_dragonfly_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_dragonfly:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_dragonfly_g3_firmware:01.03.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_dragonfly_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_dragonfly_g2_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_dragonfly_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_dragonfly_max_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_dragonfly_max:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_folio_2-in-1_firmware:not_impacted:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_folio_2-in-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x2_1012_g1_firmware:1.57:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x2_1012_g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x2_1012_g2_firmware:1.43:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x2_1012_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x2_1013_g3_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x2_1013_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x2_g4_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x2_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x2_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x2_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x360_1040_g9_2-in-1_firmware:01.03.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x360_1040_g9_2-in-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x360_830_g9_2-in-1_firmware:01.03.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x360_830_g9_2-in-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_1030_g1_firmware:1.57:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_1030_g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_1040_g9_firmware:01.03.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_1040_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_1040_g3_firmware:1.57:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_1040_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_1040_g4_firmware:1.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_1040_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_1050_g1_firmware:01.22.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_1050_g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_630_g9_firmware:01.04.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_630_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_640_g9_firmware:01.04.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_640_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_645_g9_firmware:01.08.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_645_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_650_g9_firmware:01.04.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_650_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_655_g9_firmware:01.08.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_655_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_735_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_735_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_735_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_735_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_745_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_745_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_745_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_745_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_755_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_755_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_830_g9_firmware:01.03.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_830_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_830_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_830_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_830_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_830_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_830_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_830_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_830_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_830_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_835_g9_firmware:01.02.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_835_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_835_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_835_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_835_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_835_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_836_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_836_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_836_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_836_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g9_firmware:01.03.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_aero_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_aero_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840r_g4_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840r_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_845_g9_firmware:01.02.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_845_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_845_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_845_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_845_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_845_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_846_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_846_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_850_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_850_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_850_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_850_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_850_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_850_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_850_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_850_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_855_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_855_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_855_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_855_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_860_g9_firmware:01.03.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_860_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_865_g9_firmware:01.02.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_865_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1030_g3_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1030_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1030_g4_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1030_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1030_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1030_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1030_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1030_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1040_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1040_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1040_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1040_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1040_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1040_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1040_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1040_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_830_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_830_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_830_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_830_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_830_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_830_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_830_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_830_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_x360_fortis_g10_firmware:01.03.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_x360_fortis_g10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_x360_fortis_g9_firmware:01.03.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_x360_fortis_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_430_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_430_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_430_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_430_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_430_g7_firmware:01.14.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_430_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_430_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_430_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g9_firmware:01.04.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g7_firmware:01.14.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_445_g9_firmware:01.08.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_445_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_445_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_445_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_445_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_445_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_445_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_445_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_445r_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_445r_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g9_firmware:01.04.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g7_firmware:01.14.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_455_g9_firmware:01.08.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_455_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_455_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_455_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_455_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_455_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_455_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_455_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_455_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_455_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_455r_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_455r_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_470_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_470_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_630_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_630_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_635_aero_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_635_aero_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_640_g4_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_640_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_640_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_640_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_640_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_640_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_640_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_640_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_645_g4_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_645_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_650_g4_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_650_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_650_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_650_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_650_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_650_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_650_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_650_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_fortis_g10_firmware:01.03.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_fortis_g10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_fortis_g9_firmware:01.03.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_fortis_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_11_g3_ee_firmware:01.20.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_11_g3_ee:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_11_g4_ee_firmware:01.16.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_11_g4_ee:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_11_g5_ee_firmware:01.11.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_11_g5_ee:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_11_g6_ee_firmware:01.12.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_11_g6_ee:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_11_g7_ee_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_11_g7_ee:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_435_g7_firmware:01.10.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_435_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_435_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_435_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_440_g1_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_440_g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_14u_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_14u_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_14u_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_14u_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15_g5_firmware:01.21.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15_g6_firmware:01.21.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15u_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15u_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15u_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15u_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_17_g5_firmware:01.21.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_17_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_17_g6_firmware:01.21.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_17_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_create_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_create_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_firefly_14_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_firefly_14_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_firefly_14_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_firefly_14_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_firefly_14_g9_firmware:01.03.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_firefly_14_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_firefly_15_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_firefly_15_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_firefly_15_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_firefly_15_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_firefly_16_g9_firmware:01.03.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_firefly_16_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_fury_15_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_fury_15_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_fury_15_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_fury_15_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_fury_16_g9_firmware:01.03.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_fury_16_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_fury_17_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_fury_17_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_fury_17_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_fury_17_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_power_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_power_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_power_g9_firmware:01.03.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_power_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_power_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_power_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_studio_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_studio_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_studio_g9_firmware:01.03.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_studio_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_studio_g5_firmware:01.21.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_studio_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_studio_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_studio_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_studio_x360_g5_firmware:01.21.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_studio_x360_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_13_g2_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_13_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_14_g2_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_14_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_14_g3_firmware:01.14.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_14_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_14_g4_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_14_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_g5_firmware:01.04.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_15_g2_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_15_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_15_g3_firmware:01.14.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_15_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_a_14_g3_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_a_14_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_a_14_g4_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_a_14_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_a_14_g5_firmware:01.08.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_a_14_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_g1_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_x_13_g2_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_x_13_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_mini_600_g9_firmware:02.05.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_mini_600_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_mini_800_g9_firmware:02.05.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_mini_800_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_sff_600_g9_firmware:02.05.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_sff_600_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_sff_800_g9_firmware:02.05.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_sff_800_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_slice_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_slice:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_slice_g2_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_slice_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_tower_600_g9_firmware:02.05.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_tower_600_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_tower_680_g9_firmware:02.05.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_tower_680_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_tower_800_g9_firmware:02.05.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_tower_800_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_tower_880_g9_firmware:02.05.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_tower_880_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_705_g3_firmware:2.41:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_705_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_705_g4_desktop_mini_firmware:02.20.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_705_g4_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_705_g4_microtower_firmware:02.20.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_705_g4_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_705_g4_small_form_factor_firmware:02.20.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_705_g4_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_705_g4_workstation_firmware:02.19.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_705_g4_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_705_g5_desktop_mini_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_705_g5_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_705_g5_small_form_factor_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_705_g5_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_35w_g2_desktop_mini_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_35w_g2_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_35w_g3_desktop_mini_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_35w_g3_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_35w_g4_desktop_mini_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_35w_g4_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_65w_g2_desktop_mini_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_65w_g2_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_65w_g3_desktop_mini_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_65w_g3_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_65w_g4_desktop_mini_firmware:02.20.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_65w_g4_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_95w_g4_desktop_mini_firmware:02.20.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_95w_g4_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g2_small_form_factor_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g2_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g3_small_form_factor_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g3_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g3_tower_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g3_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g4_small_form_factor_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g4_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g4_tower_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g4_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g4_workstation_firmware:02.20.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g4_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g5_desktop_mini_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g5_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g5_small_form_factor_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g5_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g5_tower_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g5_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g6_desktop_mini_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g6_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g6_small_form_factor_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g6_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g6_tower_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g6_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g8_desktop_mini_firmware:02.09.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g8_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g8_small_form_factor_firmware:02.09.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g8_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g8_tower_firmware:02.09.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g8_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_805_g6_desktop_mini_firmware:02.09.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_805_g6_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_805_g6_small_form_factor_firmware:02.09.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_805_g6_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_805_g8_desktop_mini_firmware:02.05.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_805_g8_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_805_g8_small_form_factor_firmware:02.05.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_805_g8_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_880_g3_tower_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_880_g3_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_880_g4_tower_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_880_g4_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_880_g5_tower_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_880_g5_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_880_g6_tower_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_880_g6_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_880_g8_tower_firmware:02.09.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_880_g8_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g1_23.8-in_all-in-one_business_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g1_23.8-in_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g1_23.8-in_touch_all-in-one_business_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g1_23.8-in_touch_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g1_27-in_4k_uhd_all-in-one_business_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g1_27-in_4k_uhd_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g1_34-in_curved_all-in-one_business_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g1_34-in_curved_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g2_23.8-in_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g2_23.8-in_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g2_23.8-in_touch_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g2_23.8-in_touch_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g2_27-in_4k_uhd_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g2_27-in_4k_uhd_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g2_34-in_curved_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g2_34-in_curved_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g2_23-inch_non-touch_all-in-one_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g2_23-inch_non-touch_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g2_23-inch_touch_all-in-one_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g2_23-inch_touch_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g3_23.8_non-touch_all-in-one_business_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g3_23.8_non-touch_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g3_23.8-inch_non-touch_all-in-one_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g3_23.8-inch_non-touch_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g3_23.8-inch_non-touch_gpu_all-in-one_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g3_23.8-inch_non-touch_gpu_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g3_23.8-inch_touch_all-in-one_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g3_23.8-inch_touch_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g3_23.8-inch_touch_gpu_all-in-one_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g3_23.8-inch_touch_gpu_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g4_23.8-in_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g4_23.8-in_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_non-touch_all-in-one_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_non-touch_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_touch_all-in-one_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_touch_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_touch_gpu_all-in-one_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_touch_gpu_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g5_23.8-in_all-in-one_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g5_23.8-in_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g5_23.8-inch_all-in-one_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g5_23.8-inch_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g6_24_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g6_24_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g6_27_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g6_27_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g8_24_all-in-one_firmware:02.09.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g8_24_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g8_27_all-in-one_firmware:02.09.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g8_27_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_840_23.8_inch_g9_all-in-one_firmware:02.06.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_840_23.8_inch_g9_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_mini_400_g9_firmware:02.05.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_mini_400_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_sff_400_g9_firmware:02.05.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_sff_400_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_tower_400_g9_firmware:02.05.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_tower_400_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_tower_480_g9_firmware:02.05.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_tower_480_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g3_desktop_mini_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g3_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g4_desktop_mini_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g4_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g4_microtower_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g4_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g4_small_form_factor_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g4_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g5_desktop_mini_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g5_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g5_microtower_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g5_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g5_small_form_factor_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g5_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g6_desktop_mini_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g6_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g6_microtower_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g6_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g6_small_form_factor_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g6_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g7_microtower_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g7_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g7_small_form_factor_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g7_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_405_g4_desktop_mini_firmware:02.20.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_405_g4_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_405_g4_small_form_factor_firmware:02.20.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_405_g4_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_405_g6_desktop_mini_firmware:02.09.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_405_g6_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_405_g6_small_form_factor_firmware:02.09.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_405_g6_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_405_g8_desktop_mini_firmware:02.05.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_405_g8_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_405_g8_small_form_factor_firmware:02.05.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_405_g8_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_480_g4_microtower_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_480_g4_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_480_g5_microtower_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_480_g5_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_480_g6_microtower_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_480_g6_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_480_g7_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_480_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g2_desktop_mini_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g2_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g2_microtower_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g2_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g2_small_form_factor_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g2_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g3_desktop_mini_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g3_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g3_microtower_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g3_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g3_small_form_factor_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g3_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g4_desktop_mini_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g4_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g4_microtower_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g4_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g4_small_form_factor_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g4_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g5_desktop_mini_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g5_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g5_microtower_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g5_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g5_small_form_factor_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g5_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g6_desktop_mini_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g6_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g6_microtower_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g6_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g6_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g6_small_form_factor_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g6_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_680_g2_microtower_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_680_g2_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_680_g3_microtower_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_680_g3_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_680_g4_microtower_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_680_g4_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_680_g6_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_680_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g2_20-inch_non-touch_all-in-one_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g2_20-inch_non-touch_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g2_20-inch_touch_all-in-one_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g2_20-inch_touch_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g3_20-inch_non-touch_all-in-one_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g3_20-inch_non-touch_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g3_20-inch_touch_all-in-one_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g3_20-inch_touch_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g4_20-inch_non-touch_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g4_20-inch_non-touch_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g4_23.8-inch_non-touch_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g4_23.8-inch_non-touch_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g5_20-inch_all-in-one_business_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g5_20-inch_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g5_23.8-inch_all-in-one_business_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g5_23.8-inch_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g6_20_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g6_20_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g6_24_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g6_24_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_440_23.8_inch_g9_all-in-one_firmware:02.05.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_440_23.8_inch_g9_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_440_g4_23.8-inch_non-touch_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_440_g4_23.8-inch_non-touch_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_440_g5_23.8-in_all-in-one_business_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_440_g5_23.8-in_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_440_g6_24_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_440_g6_24_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_480_g3_20-inch_non-touch_all-in_one_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_480_g3_20-inch_non-touch_all-in_one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_600_g2_21.5-inch_non-touch_all-in-one_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_600_g2_21.5-inch_non-touch_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_600_g2_21.5-inch_touch_all-in-one_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_600_g2_21.5-inch_touch_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_600_g3_21.5-inch_non-touch_all-in-one_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_600_g3_21.5-inch_non-touch_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_600_g4_21.5-inch_touch_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_600_g4_21.5-inch_touch_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_600_g5_21.5-in_all-in-one_business_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_600_g5_21.5-in_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_600_g6_22_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_600_g6_22_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z1_g8_tower_firmware:02.09.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z1_g8_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z1_g9_tower_firmware:02.05.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z1_g9_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_g3_22_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_g3_22_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_g3_24_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_g3_24_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_flex_mini_retail_system_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_flex_mini_retail_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_flex_pro_retail_system_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_flex_pro_retail_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_flex_pro-c_retail_system_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_flex_pro-c_retail_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_go_10_mobile_system_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_go_10_mobile_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_go_mobile_system_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_go_mobile_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_one_aio_system_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_one_aio_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_one_pro_aio_system_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_one_pro_aio_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mp9_g2_retail_system_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mp9_g2_retail_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mp9_g4_retail_system_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mp9_g4_retail_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:rp9_g1_retail_system_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:rp9_g1_retail_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z1_entry_tower_g5_workstation_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z1_entry_tower_g5_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z1_entry_tower_g6_workstation_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z1_entry_tower_g6_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_mini_g4_workstation_firmware:01.08.03:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_mini_g4_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_mini_g5_workstation_firmware:01.04.07:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_mini_g5_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_small_form_factor_g4_workstation_firmware:01.08.03:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_small_form_factor_g4_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_small_form_factor_g5_workstation_firmware:01.04.07:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_small_form_factor_g5_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_small_form_factor_g8_workstation_firmware:01.06.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_small_form_factor_g8_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_tower_g4_workstation_firmware:01.08.03:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_tower_g4_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_tower_g5_workstation_firmware:01.04.07:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_tower_g5_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_tower_g8_workstation_firmware:01.06.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_tower_g8_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mt44_mobile_thin_client_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt44_mobile_thin_client:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mt45_mobile_thin_client_firmware:01.21.10:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt45_mobile_thin_client:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mt46_mobile_thin_client_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt46_mobile_thin_client:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2024-35183 | wolfictl leaks GitHub tokens to remote non-GitHub git servers | wolfictl is a command line tool for working with Wolfi. A git authentication issue in versions prior to 0.16.10 allows a local user’s GitHub token to be sent to remote servers other than `github.com`. Most git-dependent functionality in wolfictl relies on its own `git` package, which contains centralized logic for implementing interactions with git repositories. Some of this functionality requires authentication in order to access private repositories. A central function `GetGitAuth` looks for a GitHub token in the environment variable `GITHUB_TOKEN` and returns it as an HTTP basic auth object to be used with the `github.com/go-git/go-git/v5` library. Most callers (direct or indirect) of `GetGitAuth` use the token to authenticate to github.com only; however, in some cases callers were passing this authentication without checking that the remote git repository was hosted on github.com. This behavior has existed in one form or another since commit 0d06e1578300327c212dda26a5ab31d09352b9d0 - committed January 25, 2023. This impacts anyone who ran the `wolfictl check update` commands with a Melange configuration that included a `git-checkout` directive step that referenced a git repository not hosted on github.com. This also impacts anyone who ran `wolfictl update <url>` with a remote URL outside of github.com. Additionally, these subcommands must have run with the `GITHUB_TOKEN` environment variable set to a valid GitHub token. Users should upgrade to version 0.16.10 to receive a patch. | [
"cpe:2.3:a:wolfi-dev:wolfictl:*:*:*:*:*:*:*:*"
] | null | 4.4 | null | null |
CVE-2025-39989 | x86/mce: use is_copy_from_user() to determine copy-from-user context | In the Linux kernel, the following vulnerability has been resolved:
x86/mce: use is_copy_from_user() to determine copy-from-user context
Patch series "mm/hwpoison: Fix regressions in memory failure handling",
v4.
## 1. What am I trying to do:
This patchset resolves two critical regressions related to memory failure
handling that have appeared in the upstream kernel since version 5.17, as
compared to 5.10 LTS.
- copyin case: poison found in user page while kernel copying from user space
- instr case: poison found while instruction fetching in user space
## 2. What is the expected outcome and why
- For copyin case:
Kernel can recover from poison found where kernel is doing get_user() or
copy_from_user() if those places get an error return and the kernel return
-EFAULT to the process instead of crashing. More specifily, MCE handler
checks the fixup handler type to decide whether an in kernel #MC can be
recovered. When EX_TYPE_UACCESS is found, the PC jumps to recovery code
specified in _ASM_EXTABLE_FAULT() and return a -EFAULT to user space.
- For instr case:
If a poison found while instruction fetching in user space, full recovery
is possible. User process takes #PF, Linux allocates a new page and fills
by reading from storage.
## 3. What actually happens and why
- For copyin case: kernel panic since v5.17
Commit 4c132d1d844a ("x86/futex: Remove .fixup usage") introduced a new
extable fixup type, EX_TYPE_EFAULT_REG, and later patches updated the
extable fixup type for copy-from-user operations, changing it from
EX_TYPE_UACCESS to EX_TYPE_EFAULT_REG. It breaks previous EX_TYPE_UACCESS
handling when posion found in get_user() or copy_from_user().
- For instr case: user process is killed by a SIGBUS signal due to #CMCI
and #MCE race
When an uncorrected memory error is consumed there is a race between the
CMCI from the memory controller reporting an uncorrected error with a UCNA
signature, and the core reporting and SRAR signature machine check when
the data is about to be consumed.
### Background: why *UN*corrected errors tied to *C*MCI in Intel platform [1]
Prior to Icelake memory controllers reported patrol scrub events that
detected a previously unseen uncorrected error in memory by signaling a
broadcast machine check with an SRAO (Software Recoverable Action
Optional) signature in the machine check bank. This was overkill because
it's not an urgent problem that no core is on the verge of consuming that
bad data. It's also found that multi SRAO UCE may cause nested MCE
interrupts and finally become an IERR.
Hence, Intel downgrades the machine check bank signature of patrol scrub
from SRAO to UCNA (Uncorrected, No Action required), and signal changed to
#CMCI. Just to add to the confusion, Linux does take an action (in
uc_decode_notifier()) to try to offline the page despite the UC*NA*
signature name.
### Background: why #CMCI and #MCE race when poison is consuming in
Intel platform [1]
Having decided that CMCI/UCNA is the best action for patrol scrub errors,
the memory controller uses it for reads too. But the memory controller is
executing asynchronously from the core, and can't tell the difference
between a "real" read and a speculative read. So it will do CMCI/UCNA if
an error is found in any read.
Thus:
1) Core is clever and thinks address A is needed soon, issues a
speculative read.
2) Core finds it is going to use address A soon after sending the read
request
3) The CMCI from the memory controller is in a race with MCE from the
core that will soon try to retire the load from address A.
Quite often (because speculation has got better) the CMCI from the memory
controller is delivered before the core is committed to the instruction
reading address A, so the interrupt is taken, and Linux offlines the page
(marking it as poison).
## Why user process is killed for instr case
Commit 046545a661af ("mm/hwpoison: fix error page recovered but reported
"not
---truncated--- | [] | null | null | null | null |
RHSA-2022:1566 | Red Hat Security Advisory: container-tools:2.0 security update | podman: Default inheritable capabilities for linux container should be empty buildah: Default inheritable capabilities for linux container should be empty | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.8 | null | null |
GHSA-9f58-q6j7-m5vv | In the Linux kernel, the following vulnerability has been resolved:drm/msm/dpu: check dpu_plane_atomic_print_state() for valid ssppSimilar to the r_pipe sspp protect, add a check to protect
the pipe state prints to avoid NULL ptr dereference for cases when
the state is dumped without a corresponding atomic_check() where the
pipe->sspp is assigned.Patchwork: https://patchwork.freedesktop.org/patch/628404/ | [] | null | 5.5 | null | null |
|
RHSA-2019:0275 | Red Hat Security Advisory: rh-haproxy18-haproxy security update | haproxy: Mishandling of priority flag in short HEADERS frame by HTTP/2 decoder allows for crash | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 7.5 | null |
CVE-2020-4183 | IBM Security Guardium 11.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 174739. | [
"cpe:2.3:a:ibm:security_guardium:11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | null | 6.1 | null |
|
GHSA-v5gv-3mwr-6223 | An issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow. | [] | null | 8.8 | null | null |
|
GHSA-9pcm-jqv9-fpv6 | Sliced Invoices plugin for WordPress 3.8.2 and earlier allows unauthenticated information disclosure and authenticated SQL injection via core/class-sliced.php. | [] | null | null | null | null |
|
GHSA-4qxg-68vm-h4qh | Vulnerabilities in the web-based management interface of ClearPass Policy Manager could allow an authenticated remote attacker to conduct SQL injection attacks against the ClearPass Policy Manager instance. An attacker could exploit these vulnerabilities to obtain and modify sensitive information in the underlying database potentially leading to complete compromise of the ClearPass Policy Manager cluster in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x: 6.10.7 and below and ClearPass Policy Manager 6.9.x: 6.9.12 and below. | [] | null | 8.8 | null | null |
|
GHSA-fmr7-cqjx-qmxg | An issue was discovered in Jave2 version 3.3.1, allows attackers to execute arbitrary code via the FFmpeg function. | [] | null | 8.8 | null | null |
|
GHSA-cgfw-8cxg-3rx5 | ARM Trusted Firmware-A allows information disclosure. | [] | null | 5.3 | null | null |
|
CVE-2023-7236 | Backup Bolt <= 1.3.0 - Sensitive Data Exposure | The Backup Bolt WordPress plugin through 1.3.0 is vulnerable to Information Exposure via the unprotected access of debug logs. This makes it possible for unauthenticated attackers to retrieve the debug log which may contain information like system errors which could contain sensitive information. | [] | null | 4.7 | null | null |
GHSA-wqw3-6p9p-84x8 | Insufficient input validation in the Marvin Minsky 1967 implementation of the Universal Turing Machine allows program users to execute arbitrary code via crafted data. For example, a tape head may have an unexpected location after the processing of input composed of As and Bs (instead of 0s and 1s). NOTE: the discoverer states "this vulnerability has no real-world implications." | [] | null | null | null | null |
|
GHSA-x989-5p93-53qj | Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | 5.5 | null | null |
|
RHSA-2020:0851 | Red Hat Security Advisory: python-virtualenv security update | python-requests: Redirect from HTTPS to HTTP does not remove Authorization header python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
CVE-2014-4801 | Cross-site scripting (XSS) vulnerability in IBM Rational Quality Manager 2.x through 2.0.1.1, 3.x before 3.0.1.6 iFix 4, 4.x before 4.0.7 iFix 2, and 5.x before 5.0.1 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL. | [
"cpe:2.3:a:ibm:rational_quality_manager:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:3.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:3.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:3.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:3.0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:3.0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:3.0.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:5.0.0:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
GHSA-qj3r-x7hh-xq49 | In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, existing checks in place on partition size are incomplete and can lead to heap overwrite vulnerabilities while loading a secure application from the boot loader. | [] | null | null | 7.8 | null |
|
GHSA-qc4p-7g72-jqrq | An uninitialized memory use vulnerability exists in Tinyproxy 1.11.1 while parsing HTTP requests. In certain configurations, a specially crafted HTTP request can result in disclosure of data allocated on the heap, which could contain sensitive information. An attacker can make an unauthenticated HTTP request to trigger this vulnerability. | [] | null | 5.9 | null | null |
|
CVE-2025-42599 | Active! mail 6 BuildInfo: 6.60.05008561 and earlier contains a stack-based buffer overflow vulnerability. Receiving a specially crafted request created and sent by a remote unauthenticated attacker may lead to arbitrary code execution and/or a denial-of-service (DoS) condition. | [] | null | null | 9.8 | null |
|
GHSA-9m9w-fffc-45mm | The login routine of the web console in the Zoom On-Premise Meeting Connector before version 4.6.239.20200613, Zoom On-Premise Meeting Connector MMR before version 4.6.239.20200613, Zoom On-Premise Recording Connector before version 3.8.42.20200905, Zoom On-Premise Virtual Room Connector before version 4.4.6344.20200612, and Zoom On-Premise Virtual Room Connector Load Balancer before version 2.5.5492.20200616 fails to validate that a NULL byte was sent while authenticating. This could lead to a crash of the login service. | [] | null | null | null | null |
|
CVE-2014-0482 | The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors related to the REMOTE_USER header. | [
"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.6:-:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.6:beta2:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.6:beta3:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.6:beta4:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.7:beta4:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.7:rc1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.7:rc2:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.5.8:*:*:*:*:*:*:*"
] | null | null | null | 6 |
|
CVE-2014-1670 | The Microsoft Bing application before 4.2.1 for Android allows remote attackers to install arbitrary APK files via vectors involving a crafted DNS response. | [
"cpe:2.3:a:microsoft:bing:*:-:-:*:-:android:*:*"
] | null | null | null | 6.8 |
|
RHSA-2024:3203 | Red Hat Security Advisory: systemd security update | systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.9 | null | null |
CVE-2021-36668 | URL injection in Driva inSync 6.9.0 for MacOS, allows attackers to force a visit to an arbitrary url via the port parameter to the Electron App. | [
"cpe:2.3:a:druva:insync_client:*:*:*:*:*:linux:*:*",
"cpe:2.3:a:druva:insync_client:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:druva:insync_client:*:*:*:*:*:windows:*:*"
] | null | 7.8 | null | 4.6 |
|
GHSA-7p4q-fv59-h67q | Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, and Office Web Apps Server 2010 SP2 and 2013 SP1 allow remote attackers to execute arbitrary code via a crafted RTF document, aka "Microsoft Office Memory Corruption Vulnerability." | [] | null | 7.8 | null | null |
|
CVE-2021-38353 | Dropdown and scrollable Text <= 2.0 Reflected Cross-Site Scripting | The Dropdown and scrollable Text WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the content parameter found in the ~/index.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.0. | [
"cpe:2.3:a:webodid:dropdown_and_scrollable_text:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null |
CVE-2009-0463 | PHP remote file inclusion vulnerability in includes/header.php in Groone GLinks 2.1 allows remote attackers to execute arbitrary PHP code via a URL in the abspath parameter. | [
"cpe:2.3:a:groonesworld:glinks:2.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2022-42139 | Delta Electronics DVW-W02W2-E2 1.5.0.10 is vulnerable to Command Injection via Crafted URL. | [
"cpe:2.3:o:deltaww:dvw-w02w2-e2_firmware:2.42:*:*:*:*:*:*:*",
"cpe:2.3:h:deltaww:dvw-w02w2-e2:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-vx4j-8qgw-52j3 | Integer overflow in the systrace_preprepl function (STRIOCREPLACE) in systrace in OpenBSD 3.9 and NetBSD 3 allows local users to cause a denial of service (crash), gain privileges, or read arbitrary kernel memory via large numeric arguments to the systrace ioctl. | [] | null | null | null | null |
|
GHSA-v842-8rq8-6j89 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Key4ce osTicket Bridge allows Reflected XSS. This issue affects Key4ce osTicket Bridge: from n/a through 1.4.0. | [] | null | 7.1 | null | null |
|
GHSA-7r5q-7rq4-xmm9 | A crafted NTFS image can trigger an out-of-bounds access, caused by an unsanitized attribute length in ntfs_inode_lookup_by_name, in NTFS-3G < 2021.8.22. | [] | null | 7.8 | null | null |
|
CVE-2017-8082 | concrete5 8.1.0 has CSRF in Thumbnail Editor in the File Manager, which allows remote attackers to disable the entire installation by merely tricking an admin into viewing a malicious page involving the /tools/required/files/importers/imageeditor?fID=1&imgData= URI. This results in a site-wide denial of service making the site not accessible to any users or any administrators. | [
"cpe:2.3:a:concretecms:concrete_cms:8.1.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
GHSA-vp2x-m8xv-v82v | Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . | [] | null | null | 9.8 | null |
|
GHSA-495g-cj2m-hr56 | A vulnerability in Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability is due to improper inclusion of sensitive information in downloadable files. An attacker could exploit this vulnerability by authenticating to an affected device and issuing a specific set of commands. A successful exploit could allow the attacker to obtain hashed credentials of system users. To exploit this vulnerability an attacker would need to have valid user credentials with elevated privileges. | [] | null | 4.9 | null | null |
|
CVE-2005-1754 | JavaMail API 1.1.3 through 1.3, as used by Apache Tomcat 5.0.16, allows remote attackers to read arbitrary files via a full pathname in the argument to the Download parameter. NOTE: Sun and Apache dispute this issue. Sun states: "The report makes references to source code and files that do not exist in the mentioned products. | [
"cpe:2.3:a:apache_tomcat:apache_tomcat:5.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:javamail:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:javamail:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:javamail:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:javamail:1.3.2:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-g5x4-6wrj-6j37 | Missing Authorization vulnerability in Tips and Tricks HQ, wptipsntricks Stripe Payments allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Stripe Payments: from n/a through 2.0.79. | [] | null | 8.2 | null | null |
|
RHSA-2023:3394 | Red Hat Security Advisory: pki-core:10.6 security update | pki-core: When using the caServerKeygen_DirUserCert profile, user can get certificates for other UIDs by entering name in Subject field pki-core: access to external entities when parsing XML can lead to XXE | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
CVE-2018-0294 | A vulnerability in the write-erase feature of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, local attacker to configure an unauthorized administrator account for an affected device. The vulnerability exists because the affected software does not properly delete sensitive files when certain CLI commands are used to clear the device configuration and reload a device. An attacker could exploit this vulnerability by logging into an affected device as an administrative user and configuring an unauthorized account for the device. The account would not require a password for authentication and would be accessible only via a Secure Shell (SSH) connection to the device. A successful exploit could allow the attacker to configure an unauthorized account that has administrative privileges, does not require a password for authentication, and does not appear in the running configuration or the audit logs for the affected device. This vulnerability affects Firepower 4100 Series Next-Generation Firewalls, Firepower 9300 Security Appliance, Nexus 1000V Series Switches, Nexus 1100 Series Cloud Services Platforms, Nexus 2000 Series Fabric Extenders, Nexus 3500 Platform Switches, Nexus 4000 Series Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, UCS 6100 Series Fabric Interconnects, UCS 6200 Series Fabric Interconnects, UCS 6300 Series Fabric Interconnects. Cisco Bug IDs: CSCvd13993, CSCvd34845, CSCvd34857, CSCvd34862, CSCvd34879, CSCve35753. | [
"cpe:2.3:o:cisco:nx-os:7.3\\(2\\)n1\\(0.354\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.10\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:o:cisco:nx-os:8.8\\(3.5\\)s0:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_n9k-c9508-fm-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_n9k-x9636c-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_n9k-x9636q-r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i2\\(4a\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_172tq-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064-32t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3100-v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_c36180yc-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6120xp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6140xp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6248up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6296up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6324:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6332:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:fxos:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_9300_security_appliance:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:4.1\\(2\\)e1\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_4001:-:*:*:*:*:*:*:*"
] | null | null | 6.7 | 7.2 |
|
GHSA-8wp6-p8r2-jh2m | Missing Authorization vulnerability in HM Plugin WordPress Stripe Donation and Payment Plugin allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WordPress Stripe Donation and Payment Plugin: from n/a through 3.2.3. | [] | null | 5.3 | null | null |
|
CVE-2022-20357 | In writeToParcel of SurfaceControl.cpp, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12LAndroid ID: A-214999987 | [
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
GHSA-f6mr-g7jq-gx82 | Improper Input Validation vulnerability in The Document Foundation LibreOffice allows Windows Executable hyperlink targets to be executed unconditionally on activation.This issue affects LibreOffice: from 24.8 before < 24.8.5. | [] | 7.2 | null | null | null |
|
GHSA-f775-fgwg-5qvw | Memory safety bugs present in Firefox 60. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 61. | [] | null | null | 9.8 | null |
|
CVE-2012-1084 | Cross-site scripting (XSS) vulnerability in the BE User Switch (beuserswitch) extension 0.0.1 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:typo3:beuserswitch:0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-9vc6-7j3x-7x4v | neon before 0.28.6, when expat is used, does not properly detect recursion during entity expansion, which allows context-dependent attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564. | [] | null | null | null | null |
|
CVE-2020-26534 | An issue was discovered in Foxit Reader and PhantomPDF before 10.1. There is an Opt object use-after-free related to Field::ClearItems and Field::DeleteOptions, during AcroForm JavaScript execution. | [
"cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-3p9p-h6x6-85gg | The issue was addressed with improved memory handling. This issue is fixed in Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously crafted web content may result in the disclosure of process memory. | [] | null | 6.5 | null | null |
|
GHSA-j5xg-f9fp-j9cm | In telephony, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06511058; Issue ID: ALPS06511058. | [] | null | 5.5 | null | null |
|
GHSA-cf89-r95f-3mf7 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, and CVE-2016-6931. | [] | null | null | 9.8 | null |
|
CVE-2000-1082 | The xp_enumresultset function in SQL Server and Microsoft SQL Server Desktop Engine (MSDE) does not properly restrict the length of a buffer before calling the srv_paraminfo function in the SQL Server API for Extended Stored Procedures (XP), which allows an attacker to cause a denial of service or execute arbitrary commands, aka the "Extended Stored Procedure Parameter Parsing" vulnerability. | [
"cpe:2.3:a:microsoft:data_engine:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:data_engine:2000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:2000:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
GHSA-wmcm-5h3j-97jg | Stored XSS in EspoCRM before 5.6.4 allows remote attackers to execute malicious JavaScript and inject arbitrary source code into the target pages. The attack begins by storing a new stream message containing an XSS payload. The stored payload can then be triggered by clicking a malicious link on the Notifications page. | [] | null | null | 6.1 | null |
|
CVE-2023-40177 | XWiki Platform privilege escalation (PR) from account through AWM content fields | XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any registered user can use the content field of their user profile page to execute arbitrary scripts with programming rights, thus effectively performing rights escalation. This issue is present since version 4.3M2 when AppWithinMinutes Application added support for the Content field, allowing any wiki page (including the user profile page) to use its content as an AWM Content field, which has a custom displayer that executes the content with the rights of the ``AppWithinMinutes.Content`` author, rather than the rights of the content author. The vulnerability has been fixed in XWiki 14.10.5 and 15.1RC1. The fix is in the content of the AppWithinMinutes.Content page that defines the custom displayer. By using the ``display`` script service to render the content we make sure that the proper author is used for access rights checks. | [
"cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:4.3:milestone2:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:15.0:-:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:15.0:rc1:*:*:*:*:*:*"
] | null | 9.9 | null | null |
CVE-2000-0697 | The administration interface for the dwhttpd web server in Solaris AnswerBook2 allows interface users to remotely execute commands via shell metacharacters. | [
"cpe:2.3:a:sun:solaris_answerbook2:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:solaris_answerbook2:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:solaris_answerbook2:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:solaris_answerbook2:1.4.2:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-g4q8-qvc6-px3p | Dell BSAFE Crypto-C Micro Edition, versions before 4.1.5, and Dell BSAFE Micro Edition Suite,
versions before 4.6, contain a Use of Insufficiently Random Values Vulnerability. | [] | null | 9.8 | null | null |
|
RHSA-2013:1843 | Red Hat Security Advisory: Red Hat JBoss Portal 6.1.0 security update | GateIn: XSS due to improper url escaping | [
"cpe:/a:redhat:jboss_enterprise_portal_platform:6.1.0"
] | null | null | null | null |
CVE-2024-44217 | A permissions issue was addressed by removing vulnerable code and adding additional checks. This issue is fixed in iOS 18 and iPadOS 18. Password autofill may fill in passwords after failing authentication. | [
"cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*"
] | null | 9.1 | null | null |
|
CVE-2015-6064 | Microsoft Internet Explorer 10 and 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Browser Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6084 and CVE-2015-6085. | [
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2022-28808 | An issue was discovered in Open Design Alliance Drawings SDK before 2023.3. An Out-of-Bounds Read vulnerability exists when reading DWG files in a recovery mode. An attacker can leverage this vulnerability to execute code in the context of the current process. | [
"cpe:2.3:a:opendesign:drawings_sdk:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2017-1277 | IBM Rational Quality Manager and IBM Rational Collaborative Lifecycle Management 5.0 through 5.0.2 and 6.0 through 6.0.5 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 124752. | [
"cpe:2.3:a:ibm:rational_quality_manager:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.5:*:*:*:*:*:*:*"
] | null | null | 5.4 | null |
|
GHSA-2322-g7g4-r84v | Unspecified vulnerability in MyBB (aka MyBulletinBoard) 1.1.4, related has unspecified impact and attack vectors related to "user group manipulation." | [] | null | null | null | null |
|
GHSA-jv4p-f6mv-66w4 | The CClient::ProcessServerPacket method in engine/client/client.cpp in Teeworlds before 0.6.4 allows remote servers to write to arbitrary physical memory locations and possibly execute arbitrary code via vectors involving snap handling. | [] | null | 9.8 | null | null |
|
GHSA-2w87-6hh6-mqrj | On Windows a directory returned by tempfile.mkdtemp() would not always have permissions set to restrict reading and writing to the temporary directory by other users, instead usually inheriting the correct permissions from the default location. Alternate configurations or users without a profile directory may not have the intended permissions.If you’re not using Windows or haven’t changed the temporary directory location then you aren’t affected by this vulnerability. On other platforms the returned directory is consistently readable and writable only by the current user.This issue was caused by Python not supporting Unix permissions on Windows. The fix adds support for Unix “700” for the mkdir function on Windows which is used by mkdtemp() to ensure the newly created directory has the proper permissions. | [] | null | 7.1 | null | null |
|
GHSA-w825-9xqr-f6q3 | In the Linux kernel, the following vulnerability has been resolved:bpf: Track subprog poke descriptors correctly and fix use-after-freeSubprograms are calling map_poke_track(), but on program release there is no
hook to call map_poke_untrack(). However, on program release, the aux memory
(and poke descriptor table) is freed even though we still have a reference to
it in the element list of the map aux data. When we run map_poke_run(), we then
end up accessing free'd memory, triggering KASAN in prog_array_map_poke_run():[...]
[ 402.824689] BUG: KASAN: use-after-free in prog_array_map_poke_run+0xc2/0x34e
[ 402.824698] Read of size 4 at addr ffff8881905a7940 by task hubble-fgs/4337
[ 402.824705] CPU: 1 PID: 4337 Comm: hubble-fgs Tainted: G I 5.12.0+ #399
[ 402.824715] Call Trace:
[ 402.824719] dump_stack+0x93/0xc2
[ 402.824727] print_address_description.constprop.0+0x1a/0x140
[ 402.824736] ? prog_array_map_poke_run+0xc2/0x34e
[ 402.824740] ? prog_array_map_poke_run+0xc2/0x34e
[ 402.824744] kasan_report.cold+0x7c/0xd8
[ 402.824752] ? prog_array_map_poke_run+0xc2/0x34e
[ 402.824757] prog_array_map_poke_run+0xc2/0x34e
[ 402.824765] bpf_fd_array_map_update_elem+0x124/0x1a0
[...]The elements concerned are walked as follows:The access to size_poke_tab is a 4 byte read, verified by checking offsets
in the KASAN dump:[ 402.825004] The buggy address belongs to the object at ffff8881905a7800
which belongs to the cache kmalloc-1k of size 1024
[ 402.825008] The buggy address is located 320 bytes inside of
1024-byte region [ffff8881905a7800, ffff8881905a7c00)The pahole output of bpf_prog_aux:struct bpf_prog_aux {
[...]
/* --- cacheline 5 boundary (320 bytes) --- */
u32 size_poke_tab; /* 320 4 */
[...]In general, subprograms do not necessarily manage their own data structures.
For example, BTF func_info and linfo are just pointers to the main program
structure. This allows reference counting and cleanup to be done on the latter
which simplifies their management a bit. The aux->poke_tab struct, however,
did not follow this logic. The initial proposed fix for this use-after-free
bug further embedded poke data tracking into the subprogram with proper
reference counting. However, Daniel and Alexei questioned why we were treating
these objects special; I agree, its unnecessary. The fix here removes the per
subprogram poke table allocation and map tracking and instead simply points
the aux->poke_tab pointer at the main programs poke table. This way, map
tracking is simplified to the main program and we do not need to manage them
per subprogram.This also means, bpf_prog_free_deferred(), which unwinds the program reference
counting and kfrees objects, needs to ensure that we don't try to double free
the poke_tab when free'ing the subprog structures. This is easily solved by
NULL'ing the poke_tab pointer. The second detail is to ensure that per
subprogram JIT logic only does fixups on poke_tab[] entries it owns. To do
this, we add a pointer in the poke structure to point at the subprogram value
so JITs can easily check while walking the poke_tab structure if the current
entry belongs to the current program. The aux pointer is stable and therefore
suitable for such comparison. On the jit_subprogs() error path, we omit
cleaning up the poke->aux field because these are only ever referenced from
the JIT side, but on error we will never make it to the JIT, so its fine to
leave them dangling. Removing these pointers would complicate the error path
for no reason. However, we do need to untrack all poke descriptors from the
main program as otherwise they could race with the freeing of JIT memory from
the subprograms. Lastly, a748c6975dea3 ("bpf: propagate poke des
---truncated--- | [] | null | 7.8 | null | null |
|
RHSA-2019:1880 | Red Hat Security Advisory: curl security and bug fix update | curl: NTLM password overflow via integer overflow | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
GHSA-q97v-2cp6-jv6p | Transient DOS as modem reset occurs when an unexpected MAC RAR (with invalid PDU length) is seen at UE. | [] | null | 7.5 | null | null |
|
GHSA-jq64-pj79-mg78 | Intellian Satellite TV antennas t-Series and v-Series, firmware version 1.07, uses non-random default credentials of: ftp/ftp or intellian:12345678. A remote network attacker can gain elevated access to a vulnerable device. | [] | null | null | 9.8 | null |
|
RHSA-2013:0241 | Red Hat Security Advisory: xen security update | xen: Xen domain builder Out-of-memory due to malicious kernel/ramdisk | [
"cpe:/a:redhat:rhel_virtualization:5::server",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
GHSA-4pjg-3rwx-hmxx | An issue was discovered on URayTech IPTV/H.264/H.265 video encoders through 1.97. Attackers can log in as root via the password that is hard-coded in the executable file. | [] | null | null | null | null |
|
CVE-2018-12930 | ntfs_end_buffer_async_read in the ntfs.ko filesystem driver in the Linux kernel 4.15.0 allows attackers to trigger a stack-based out-of-bounds write and cause a denial of service (kernel oops or panic) or possibly have unspecified other impact via a crafted ntfs filesystem. | [
"cpe:2.3:o:linux:linux_kernel:4.15:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:lts:*:*:*"
] | null | null | 7.8 | 7.2 |
|
CVE-2021-46990 | powerpc/64s: Fix crashes when toggling entry flush barrier | In the Linux kernel, the following vulnerability has been resolved:
powerpc/64s: Fix crashes when toggling entry flush barrier
The entry flush mitigation can be enabled/disabled at runtime via a
debugfs file (entry_flush), which causes the kernel to patch itself to
enable/disable the relevant mitigations.
However depending on which mitigation we're using, it may not be safe to
do that patching while other CPUs are active. For example the following
crash:
sleeper[15639]: segfault (11) at c000000000004c20 nip c000000000004c20 lr c000000000004c20
Shows that we returned to userspace with a corrupted LR that points into
the kernel, due to executing the partially patched call to the fallback
entry flush (ie. we missed the LR restore).
Fix it by doing the patching under stop machine. The CPUs that aren't
doing the patching will be spinning in the core of the stop machine
logic. That is currently sufficient for our purposes, because none of
the patching we do is to that code or anywhere in the vicinity. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-7hgf-pcvc-hj4r | Unspecified vulnerability on Cisco Adaptive Security Appliances (ASA) 5500 Series and PIX Security Appliances 7.2 before 7.2(4)26, 8.0 before 8.0(4)22, and 8.1 before 8.1(2)12, when SQL*Net inspection is enabled, allows remote attackers to cause a denial of service (traceback and device reload) via a series of SQL*Net packets. | [] | null | null | null | null |
|
CVE-2022-35136 | Boodskap IoT Platform v4.4.9-02 allows attackers to make unauthenticated API requests. | [
"cpe:2.3:a:boodskap:iot_platform:4.4.9-02:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
CVE-2018-18211 | PbootCMS 1.2.1 has SQL injection via the HTTP POST data to the api.php/cms/addform?fcode=1 URI. | [
"cpe:2.3:a:pbootcms:pbootcms:1.2.1:*:*:*:*:*:*:*"
] | null | null | 8.1 | 6.8 |
|
CVE-2023-45688 | Information leak via path traversal in Titan MFT and Titan SFTP servers | Lack of sufficient path validation in South River Technologies' Titan MFT and Titan SFTP servers on Linux allows an authenticated attacker to get the size of an arbitrary file on the filesystem using path traversal in the ftp "SIZE" command | [
"cpe:2.3:a:southrivertech:titan_mft_server:*:*:*:*:*:linux:*:*",
"cpe:2.3:a:southrivertech:titan_sftp_server:*:*:*:*:*:linux:*:*"
] | null | 4.3 | null | null |
CVE-2024-8553 | Foreman: read-only access to entire db from templates | A vulnerability was found in Foreman's loader macros introduced with report templates. These macros may allow an authenticated user with permissions to view and create templates to read any field from Foreman's database. By using specific strings in the loader macros, users can bypass permissions and access sensitive information. | [
"cpe:/a:redhat:satellite:6.13::el8",
"cpe:/a:redhat:satellite_capsule:6.13::el8",
"cpe:/a:redhat:satellite_utils:6.13::el8",
"cpe:/a:redhat:satellite_maintenance:6.13::el8",
"cpe:/a:redhat:satellite_capsule:6.14::el8",
"cpe:/a:redhat:satellite:6.14::el8",
"cpe:/a:redhat:satellite_utils:6.14::el8",
"cpe:/a:redhat:satellite_utils:6.15::el8",
"cpe:/a:redhat:satellite:6.15::el8",
"cpe:/a:redhat:satellite_capsule:6.15::el8",
"cpe:/a:redhat:satellite_capsule:6.16::el8",
"cpe:/a:redhat:satellite_maintenance:6.16::el8",
"cpe:/a:redhat:satellite_utils:6.16::el8",
"cpe:/a:redhat:satellite_maintenance:6.16::el9",
"cpe:/a:redhat:satellite:6.16::el9",
"cpe:/a:redhat:satellite_capsule:6.16::el9",
"cpe:/a:redhat:satellite:6.16::el8",
"cpe:/a:redhat:satellite_utils:6.16::el9"
] | null | 6.3 | null | null |
GHSA-c2jj-rr3q-vvv8 | The Admin side data storage for Contact Form 7 plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.1. This is due to missing or incorrect nonce validation on the settings update function. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] | null | 4.3 | null | null |
|
GHSA-cvj5-pqcm-39fq | SQL injection vulnerability in modules/myalbum/viewcat.php in the myAlbum-P 2.0 and earlier module for Xoops allows remote attackers to execute arbitrary SQL commands via the cid parameter. | [] | null | null | null | null |
|
RHSA-2020:3868 | Red Hat Security Advisory: SDL security update | SDL: buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c SDL: heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c SDL: heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c SDL: heap-based buffer overflow in MS_ADPCM_decode in audio/SDL_wave.c SDL: heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c SDL: buffer over-read in SDL_LoadWAV_RW in audio/SDL_wave.c SDL: heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c SDL: heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c SDL: heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c SDL: heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c SDL: heap-based buffer over-read in Map1toN in video/SDL_pixels.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.4 | null |
GHSA-79jx-q243-6wc7 | An issue in Univention UCS v.5.0 allows a local attacker to execute arbitrary code and gain privileges via the check_univention_joinstatus function. | [] | null | 7.9 | null | null |
|
CVE-2024-12475 | WP Multi Store Locator <= 2.4.1 - Authenticated (Contributor+) Stored Cross-Site Scripting | The WP Multi Store Locator plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 2.4.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
GHSA-3pww-pqg2-m2hm | A Use-After-Free vulnerability in the management of an SNP guest context page may allow a malicious hypervisor to masquerade as the guest's migration agent resulting in a potential loss of guest integrity. | [] | null | 3.3 | null | null |
|
GHSA-33c2-986r-8vm4 | A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. If the user has administrative privileges, the attacker could alter the configuration, execute commands, or cause a denial of service (DoS) condition on an affected device. | [] | null | null | null | null |
|
GHSA-5mqx-6pmx-647m | vox2mesh 1.0 has stack-overflow in main.cpp, this is stack-overflow caused by incorrect use of memcpy() funciton. The flow allows an attacker to cause a denial of service (abort) via a crafted file. | [] | null | 5.5 | null | null |
|
GHSA-489v-cqqf-vxgv | The vmx_set_uc_mode function in Xen 3.3 through 4.3, when disabling caches, allows local HVM guests with access to memory mapped I/O regions to cause a denial of service (CPU consumption and possibly hypervisor or guest kernel panic) via a crafted GFN range. | [] | null | null | null | null |
|
GHSA-5prg-h6vm-wxcf | A post-authenticated server-side request forgery (SSRF) vulnerability in Trend Micro Apex Central 2019 (lower than build 6481) could allow an attacker to interact with internal or local services directly.Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.This is a similar, but not identical vulnerability as CVE-2023-38625. | [] | null | 5.4 | null | null |
|
CVE-2024-1901 | Denial of service in PAM password rotation during the check-in process in Devolutions Server 2023.3.14.0 allows an authenticated user with specific PAM permissions to make PAM credentials unavailable.
| [] | null | 4.3 | null | null |
|
ICSA-18-114-01 | Vecna VGo Robot (Update A) | An attacker may be able to capture firmware updates through the adjacent network.CVE-2018-8860 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). User accounts may be able to execute commands that are outside the scope of their privileges and within the scope of an admin account. If an attacker has access to VGo XAMPP Client credentials, they may be able to execute admin commands on the connected robot.CVE-2018-17933 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). If an attacker has physical access to the VGo Robot they may be able to alter scripts, which may allow code execution with root privileges.CVE-2018-17931 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). If an attacker has access to the firmware they may be able to extract credentials.CVE-2018-8858 has been assigned to this vulnerability. A CVSS v3 base score of 4.7 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N) | [] | null | null | 4.7 | null |
GHSA-g7cg-jg33-rrhv | IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to a denial of service as the server may crash when using a specially crafted subquery. IBM X-Force ID: 249196. | [] | null | 5.3 | null | null |
|
CVE-2022-2870 | laravel deserialization | A vulnerability was found in laravel 5.1 and classified as problematic. This issue affects some unknown processing. The manipulation leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-206501 was assigned to this vulnerability. | [
"cpe:2.3:a:laravel:laravel:*:*:*:*:*:*:*:*"
] | null | 4.1 | null | null |
CVE-2021-45613 | Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR40 before 2.5.0.24, CBR750 before 4.6.3.6, D7000v2 before 1.0.0.74, LAX20 before 1.1.6.28, MK62 before 1.0.6.116, MR60 before 1.0.6.116, MS60 before 1.0.6.116, MR80 before 1.1.2.20, MS80 before 1.1.2.20, RAX15 before 1.0.3.96, RAX20 before 1.0.3.96, RAX200 before 1.0.4.120, RAX45 before 1.0.3.96, RAX50 before 1.0.3.96, RAX43 before 1.0.3.96, RAX40v2 before 1.0.3.96, RAX35v2 before 1.0.3.96, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, RBS850 before 3.2.17.12, and XR1000 before 1.0.0.58. | [
"cpe:2.3:o:netgear:cbr40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:cbr40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:cbr750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:cbr750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d7000v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d7000v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:lax20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:lax20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:mk62_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:mk62:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:mr60_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:mr60:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ms60_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ms60:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax15_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax15:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax35v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax35v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax40v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax40v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax43_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax43:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax45_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax45:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax75_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax75:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax80_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax80:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk752_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk752:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk852_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk852:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:xr1000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:xr1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:mr80_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:mr80:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ms80_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ms80:-:*:*:*:*:*:*:*"
] | null | 9.6 | null | null |
|
GHSA-c6ch-8c92-7xrf | In Artica Pandora FMS version 7.0, an Attacker with write Permission can create an agent with an XSS Payload; when a user enters the agent definitions page, the script will get executed. | [] | null | null | 5.4 | null |
|
CVE-2024-46263 | cute_png v1.05 was discovered to contain a stack overflow via the cp_dynamic() function at cute_png.h. | [
"cpe:2.3:a:cute_png:cute_png:1.05:*:*:*:*:*:*:*",
"cpe:2.3:a:randygaul:cute_png:1.05:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-75gp-f39c-g44v | Tenda AC6 v2.0 V15.03.06.50 was discovered to contain a buffer overflow in the function 'formSetPPTPServer'. | [] | null | 8.8 | null | null |
|
CVE-2021-43786 | API token verification can be bypassed | Nodebb is an open source Node.js based forum software. In affected versions incorrect logic present in the token verification step unintentionally allowed master token access to the API. The vulnerability has been patch as of v1.18.5. Users are advised to upgrade as soon as possible. | [
"cpe:2.3:a:nodebb:nodebb:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
CVE-2019-10018 | An issue was discovered in Xpdf 4.01.01. There is an FPE in the function PostScriptFunction::exec at Function.cc for the psOpIdiv case. | [
"cpe:2.3:a:xpdfreader:xpdf:4.01.01:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
GHSA-v783-rccm-cpr3 | Atos Unify OpenScape UC Web Client 1.0 allows remote attackers to obtain sensitive information. By iterating the value of conferenceId to getMailFunction in the JSON API, one can enumerate all conferences scheduled on the platform, with their numbers and access PINs. | [] | null | 7.5 | null | null |
|
CVE-2024-0130 | NVIDIA UFM Enterprise, UFM Appliance, and UFM CyberAI contain a vulnerability where an attacker can cause an improper authentication issue by sending a malformed request through the Ethernet management interface. A successful exploit of this vulnerability might lead to escalation of privileges, data tampering, denial of service, and information disclosure. | [] | null | 8.8 | null | null |
|
CVE-2024-0399 | WooCommerce Customers Manager < 29.7 - Subscriber+ SQL Injection | The WooCommerce Customers Manager WordPress plugin before 29.7 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to an SQL injection exploitable by Subscriber+ role. | [
"cpe:2.3:a:woocommerce:woocommerce_customers_manager:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
GHSA-qhc8-285g-r82q | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in DonnellC Global Gateway e4 | Payeezy Gateway.This issue affects Global Gateway e4 | Payeezy Gateway: from n/a through 2.0. | [] | null | 8.6 | null | null |
|
CVE-2002-1221 | BIND 8.x through 8.3.3 allows remote attackers to cause a denial of service (crash) via SIG RR elements with invalid expiry times, which are removed from the internal BIND database and later cause a null dereference. | [
"cpe:2.3:a:isc:bind:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:3.2:*:*:*:*:*:*:*"
] | null | null | null | 5 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.